PC PReTech
PC PReTech
Just remember, if you fail to write something down, that's no guarantee that it won't be on a test.
All examples, documents, and images used in this course are available for download from:
http://pctalk.info/Classes/Spock/Tech/
Combined Class Lecture and Lab time will be 2.5 hours per class. If Lecture ends early, remaining time will be
used for Lab.
# Topics Notes/Chapter Workbook
1 Intro Workbook Case edges may be sharp, electrical
A. General Safety Guidelines safety. Get forum registration
B. Fire Safety information.
C. Computer Equipment Disposal
2 A+ Fundamentals Workbook
A. What do A+ Exams Cover? Chapter 1-1
3 Internet Access Workbook Register for forum. Talk about search
http://pctalk.info/ and education.
http://google.com/
http://www.hardwarecentral.com/
4 Fundamentals Workbook Numbering Systems are sometimes hard
A. Numbering Systems 1 Chapter 1-2 to understand, so extra time has been
B. When to/not to upgrade allowed for teaching them.
C. Identifying components
5 Fundamentals Workbook An understanding of this lesson is
A. Numbering Systems 2 Chapter 1-2 essential to understanding later lessons.
B. Basic Electronics
6 Fundamentals Workbook Talk about a UPS.
A. Basic Electronics Chapter 1-2 Student tools will be shown.
B. Tools
7 Inside the Box Workbook
A. Motherboard Chapter 1-3
B. BIOS Chapter 1-4
8 Inside the Box Workbook
A. Bus Structures Chapter 1-5
B. Microprocessors Chapter 1-6
9 Lab Class Talk about drawing diagrams and why it
A. Intro to the console internals is important.
10 Inside the Box Chapter 1-7
A. Memory Systems
11 Inside the Box Workbook Bring SuperDisk and FlashDrive for
A. Storage Systems Chapter 1-8 demo.
12 Inside the Box Workbook
A.Power Chapter 1-9
13 Outside the Box Workbook
A. Ports Chapter 1-10
14 Outside the Box Chapter 1-11 Bring camera to class.
A. Input Devices Chapter 1-12
B. Output Devices
15 Disassembly Workbook
Students disassemble and reassemble
practice computers.
16 Outside the Box Workbook Bring Notebook computer to class.
A. Printers Chapter 1-13
B. Portable Systems Chapter 1-14
1) Each student will be responsible for supplying his or her own pens or pencils and notebook. Text used is “A+
Certification for Dummies”. Each student should make every attempt to purchase their own copy, as they will
find highlighting sections of the reading to be most helpful. Your instructor can get the books and is willing to
collect money and purchase the books as requested if anyone is interested. Books may also be checked out of
a library or borrowed from others if possible, but you would not be able to use it as effectively. There is also a
class workbook that will cost $10 for materials. These books are required.
2) The Chapters listed next to each lesson are those recommended for reading prior to the start of that class.
“Workbook” indicates that some of the material presented will not be from the book. All chapters in the book
will be covered and thorough knowledge of their contents is encouraged.
3) It is the instructor’s job (and desire) to teach and therefore must be easy to understand. It is the student’s job
to ensure they get the required information. If you have any questions pertaining to the lecture content during
the lecture, please ask. There will be others, not nearly as brave, who will appreciate your questions.
4) Attendance will be taken each class and the presentation of a certificate of completion depends upon at least
80% attendance, good quiz scores, and a passing Final Exam grade. This course will be extremely challenging
and any student who must miss a class will be expected to arrange an immediate one-on-one make up session
with the instructor. Though not guaranteed, the students who do well and apply themselves may be able to
pass the A+ Certification test. A+ Certified Technicians with some work experience can expect to earn
anywhere from $25,000 to $40,000 a year.
6) Students must all have their own email addresses and Internet access. All lab computers that are set up along
the walls have Internet access. Students may use classroom computers already connected to the Internet to
search for required hardware information.
7) The instructor will do his best to stay on-track with the syllabus but will also try not to discourage spirited
classroom discussions that pertain to learning anything important having to do with basic computer repair. If a
student has an immediate need for certain information, ask. The question can easily be worked into the course
material.
8) Pre-Tech Students are expected to learn how to use the available forum as a means of getting and giving
technical help. This can prove to be a valuable resource even after the class is over. One new post, either
asking or answering a tech question, will be required for each class day.
9) Students tool kits are for use in the classroom only. Since there are only a few sets, some students may be
required to share. Tools will be inventoried and returned to the storage drawer at the end of each class.
10) Students are expected to practice outside of the classroom to help them gain the additional skills they need.
There are computers in the lab that have been left there specifically for the students to work on and learn
from. They should not be touched, though, until the students have learned proper procedures.
11) Quizzes will normally be given every week. The quizzes are to assist the instructor in determining how well
you are doing with the material. Some are open book, open notes, so well thought out and legible notes will
help you to do well on these quizzes. Some are from memory only. All quizzes and both finals must be taken.
A Certificate of Completion will not be issued if one is missing. Any missed Quizzes must be taken as soon
as possible.
12) Students may desire to obtain a Flashdrive. If they do not have one and wish to purchase one, the instructor
has access to Sam's Club where they are available far cheaper than anywhere else locally. Several students
may wish to pool their resources to purchase a card of 4 and then divide them amongst themselves.
13) How to create an Emergency Boot Disk using floppies will be demonstrated by the instructor. If students wish
to create one of their own, they need to bring a 3½” HD floppy disk to class. You may also download one
from bootdisk.com
14) Students should do their best to arrive on time for class 14 and may want to dress up a bit as the instructor
will bring a Digital Camera to class to demonstrate Digital Photography by taking class pictures which will be
made available to the students at the end of the course.
A. Assist any person in immediate danger, to get to safety, if it can be accomplished without risk to yourself.
B. Call the Fire brigade by dialing 000 (Australia) or 911 (United States), and activate the building fire alarm
system (or designating someone else to do this for you).
C. Ensure people in the building are aware of the emergency and are starting to move out.
D. Only after having done these three things, and if the fire is small, should you attempt to use an extinguisher to
put it out.
PASS It's easy to remember how to use a fire extinguisher if you can remember the
acronym PASS, which stands for Pull, Aim, Squeeze, and Sweep.
[ http://www.rocknet.net.au/~sollittr/ohs/Fire_exting/fe_use.html ]
Pull the pin. This will allow you to operate the extinguisher.
Aim at the base of the fire. This is where the fuel is.
You should always test the extinguisher briefly, to ensure that it operates correctly, before taking
it to the fire.
If you are in a position where there is a high fire risk (e.g. working with flammable materials or heat),
then you should arrange to attend a hands-on fire extinguisher training program.
Four things must be present at the same time in order to produce fire:
• FUEL - any combustible material - solid, liquid or gas. Most solids and liquids must vaporize
before they will burn.
• OXYGEN - Sufficient oxygen must be present in the atmosphere surrounding the fuel for fire to
burn.
• HEAT - Sufficient heat energy must be applied to raise the fuel to its ignition temperature
• Chemical, exothermic reaction - This reaction can occur when all three of the above elements
are present in the proper conditions and proportions. Fire (rapid oxidization) is the result of this
chemical reaction.
Fire safety, at its most basic, is based upon the principle of keeping fuel sources and ignition sources
separate.
Fires are classified according to the material that is being burned. The four classes of fires, with the
American and International symbols, are as follows:
http://www.computerhope.com/disposal.htm
Below are a few of the Recycle/disposal companies that can help provide you with information or help
you recycle your computer equipment.
Exam details
The A+ certification exam was updated in late 2006, so the structure of the exam is different than it had
been for the three years prior to the update. The good news is the old 2003 exams had an average pass
rate of between 3% --> 10% depending on your sources. The new A+ exam has been redesigned to have
a 30% pass rate. A+ certification currently entails two tests: A+ Essentials (220-601) and one of three
elective exams, IT Technician (220-602), Remote Support Technician (220-603), or Depot
Technician (220-604). Both of these tests must be passed in order to receive A+ certification. CompTIA
suggests that one take the A+ Essentials exam before the other, but they can be taken in either order.
For the 2006 exam, the total cost was $158.00 for each test. If you are a student check with your school's
Career Tech program, most public schools are Jobs+ sites. If your school is a Jobs+ site you can get the
A+ voucher for half the price as you would retail. Also a lot of companies that offer training are
CompTIA affiliate which can sell you the voucher to take the exam for less than retail. The CompTIA
A+ Essentials consists of 100 questions, and the elective consists of 90 questions. A passing score on the
CompTIA A+ Essentials exam is 675, on any of the electives is 700.
Illustration 3: Register
4) Click on the Before button to indicate the date you were born. If you are 13 or under (not too likely
Illustration 4: Before
5) Read the Registration agreement and click on the "I agree to these terms" button,
Illustration 5: I agree
7) The Username may be anything you wish it to be but I recommend you do not use anything that
might enable anyone to know your identity, i.e., do not use your real name. My Username is Spock
for various reasons that I will explain in class. You should start with a capital letter and should make
it short enough to be convenient for you. Remember, you will have to type it in every time you login.
Write it down on the Student Forum Information sheet at the end of this workbook,
8) The Email address will have to be entered twice for verification,
9) Your password may again be anything you wish it to be but it should be easy for you to remember. If
you do forget, there will be a link you can click on that will send an email to your registration Email
reminding you what your Username and Password is. Write it down on the Student Forum
Information sheet at the end of this workbook,
You should receive an email shortly welcoming you to the forum and repeating for you the Username
and Password you used to register. Keep it in a safe place for future reference in case you forget your
password. Once you receive your registration email, there will be a link in the email you must click on
to activate your new account. Once that is done, you may now login to the forum.
2) Click on the Support Forum button in the Navigation Bar on the right,
3) Click on the Login link on the right of the page or, if you prefer, there is a place for your username
and password at the bottom of the page,
When you first access the forum, you will be in a "holding" area called Prospective Members. This is an
area that is hidden to all full forum members and is what I call part of my Spam Trap. You must make at
least one post in there telling me who you are, where you found out about the forum, and why you want
to join before I move you up to full membership. While restricted to the Prospective Members forum,
you will have very limited access to the forum tools.
As members of my class, I will know what your usernames are, so almost anything will be accepted but
your "acceptance post" will be moved out of Prospective Members and into the New Users forum to
introduce you to the other forum members. You should never give out any personal information but you
might want to give enough information so others with similar interests will want to strike up a
friendship.
2) There is a Frequently Asked Questions (FAQ) link that may answer some of your questions about
how to use a forum.
3) Every time I login to the forum, the first link I click on is the "View new posts" link to see what has
been posted since I was last in the forum. I find that if I do that every time I login, I will be able to
keep up with what has been happening. If you login and then logout almost immediately, all posts
will be marked as read, even if you haven't read them. The link should probably indicate, "View new
posts since last login" to be most accurate.
4) There is a User Control Panel (UCP) where you may update certain information about your account
such as changing your password, adding or changing an avatar, etc. If you change your email
address, you will be locked out of the forum until your new email is verified, so it is not a good idea
to change it unless you let me know first as the re-authorization process has to be done manually.
5) There is an area where any new Personal Messages (PM) will appear. Click on the link to access old,
new, and sent. There is a limit to how many of each may be stored on the forum. Once that limit is
reached, old ones will be removed to make room for new ones. If you want to keep any for any
reason, you might want to selectively prune them yourself.
16 65536
65536 32768 16384 8192 4096 2048 1024 512 256 128 64 32 16 8 4 2 1
Hex:
Decimal Binary Octal Hex
N 16N 0 0000 0 0
0 1 1 0001 1 1
1 16 2 0010 2 2
3 0011 3 3
2 256
4 0100 4 4
3 4096 5 0101 5 5
6 0110 6 6
4 65536 7 0111 7 7
65536 4096 256 16 1 8 1000 10 8
9 1001 11 9
10 1010 12 A
11 1011 13 B
12 1100 14 C
13 1101 15 D
1 BIT = 1 Binary digit 14 1110 16 E
1 Nybble = 4 BITs 15 1111 17 F
1 Byte = 8 BITs or 2 Nibbles 16 10000 20 10
7 x 80 =7x 1 = 7
7 x 81 =7x 8 = 56
3 x 82 = 3 x 64 = 192
25510
Most computer hardware is not seen by normal users. It is in embedded systems in automobiles,
microwave ovens, electrocardiograph machines, compact disc players, and other devices. Personal
computers, the computer hardware familiar to most people, form only a small minority of computers
(about 0.2% of all new computers produced in 2003).
Typical PC hardware
A typical personal computer consists of a case or chassis in a tower shape (desktop) and the following
parts:
Motherboard - the "body" of the computer, through which all other components interface.
Central processing unit (CPU) - Performs most of the calculations which enable a computer to
function, sometimes referred to as the "brain" of the computer.
Computer fan - Used to lower the temperature of the computer; a fan is almost always attached
to the CPU, and the computer case will generally have several fans to maintain a constant
airflow. Liquid cooling can also be used to cool a computer, though it focuses more on individual
parts rather than the overall temperature inside the chassis.
Random Access Memory (RAM) - Fast-access memory that is cleared when the computer is
powered-down. RAM attaches directly to the motherboard, and is used to store programs that are
currently running.
Firmware is loaded from the Read only memory ROM run from the Basic Input-Output System
(BIOS) or in newer systems Extensible Firmware Interface (EFI) compliant.
Internal Buses - Connections to various internal components.
PCI
PCI-E
USB
HyperTransport
CSI (expected in 2008)
AGP (being phased out)
VLB (outdated)
External Bus Controllers - used to connect to external peripherals, such as printers and input
devices. These ports may also be based upon expansion cards, attached to the internal buses.
Parallel port (outdated)
Serial port (outdated)
USB
Firewire
SCSI (On Servers and older machines)
PS/2 (For mice and keyboards, being phased out and replaced by USB.)
ISA (outdated)
EISA (outdated)
MCA (outdated)
Power supply
A case that holds a transformer, voltage control, and (usually) a cooling fan, and supplies power to run
the rest of the computer, the most common types of power supplies are AT and BabyAT (old) but the
standard for current PC's are ATX and micro ATX. smps (Switch Mode Power Supply)
Storage controllers
Controllers for hard disk, CD-ROM and other drives like internal Zip and Jaz conventionally for a PC
are IDE/ATA; the controllers sit directly on the motherboard (on-board) or on expansion cards, such as a
Disk array controller. IDE is usually integrated, unlike SCSI which is found in most servers. The Floppy
drive interface is a legacy MFM interface which is now slowly disappearing. All these interfaces are
gradually being phased out to be replaced by SATA (Serial AT Attachment) and SAS.
Internal storage
Hardware that keeps data inside the computer for later use and remains persistent even when the
computer has no power.
Sound card
Enables the computer to output sound to audio devices, as well as accept input from a microphone. Most
modern computers have sound cards built-in to the motherboard, though it is common for a user to
install a separate sound card as an upgrade.
Note that binary and hexadecimal number systems are used in the PC for addressing and data display. You may be asked to
convert a binary number or two on the exam, and you can count on seeing binary and hexadecimal references in several
questions.
Understanding electricity
Everything inside or attached to the PC system unit runs on electricity. Electricity is both the lifeblood
and the mysterious evil of the personal computer. It's a flowing entity, measured in amps, ohms, and
volts that should be approached with respect, if not outright fear.
Nothing helps you understand a complex technical topic better than a real-life analogy that you can
relate to. Electricity flowing through a circuit is very much like water running through a hose. When you
open a water faucet, the pressure in the water line forces the water to flow at some gallons-per-minute
rate into the hose. Friction reduces the force and rate of the water before it exits the hose. When
electricity flows into a wire from a source such as a battery, some of its pressure is lost to resistance in
the wire.
The "electricity is like water in a hose" analogy points out the forces of electricity that can be measured.
These forces are measured in volts, amps, and ohms. At the risk of running the analogy into the ground,
Table 1 lists the water hose analogous element against its electrical equivalent.
Counting electrons
The forces of electricity inside the computer can be measured, and each type of measurement tells you
something different about the computer. The electrical measurements in Table 2 provide you with an
introduction to these units of measurement.
Switching from AC to DC
Current is the flow of electrons in a wire. Electricity has two current types: AC (alternating current) and
DC (direct current). AC is what you get from the outlets in your house or office, and DC is the type used
inside the computer.
In alternating current, the current changes directions about 60 times per second, moving first one-way,
and then the other. The voltage changing rapidly from a positive charge to a negative charge causes the
When the flow of the electricity is in one direction only, it is direct current. What happens in direct
current is that negatively charged particles seek out and flow toward positively charged particles,
creating a direct electrical current flow. DC power maintains a constant level and flows in only one
direction — always, predictably, and measurably, from a negative charge to a positive charge.
For example, wire a light bulb to a battery, and the current flows from the negative terminal to the
positive terminal through the light bulb. Because the current of electricity causes heat and light in the
right materials, the lighter materials in the light bulb glow.
The PC uses DC power. The PC's power supply converts power from the AC wall outlet into DC power
for the computer. Peripheral devices, such as printers, external modems, and storage drives, including
CD-ROM and Zip drives, use an AC power converter to convert AC power into DC power.
Okay, so the computer runs on direct current electricity. What does this fact have to do with the A+
exam?
When answering a question about the power supply, you must know what 3.3V, –5V, +5V, –12V, and +12V represent (3.3
volts, minus 5 volts, plus 5 volts, minus 12 volts, and plus 12 volts, which are DC power levels produced by the power
supply).
The essential feature of this arrangement is that for both polarities of the voltage at the bridge input, the
polarity of the output is constant. The following description uses hole flow rather than electron flow.
Electron flow would show the arrows in the opposite directions.
Basic Operation
When the input
connected at the
left corner of the
diamond is
positive with
respect to the one
connected at the
right hand
corner, current
flows to the right
along the upper
colored path to
the output, and
returns to the Illustration 11: Full-wave Bridge Rectifier, positive cycle
input supply via the lower one.
In each case, the upper right output remains positive with respect to the lower right one. Since this is
true whether the input is AC or DC, this circuit not only produces DC power when supplied with AC
power: it also can provide what is sometimes called "reverse polarity protection". That is, it permits
normal functioning when batteries are installed backwards or DC input-power supply wiring "has its
Prior to availability of integrated electronics, such a bridge rectifier was always constructed from
discrete components. Since about 1950, a single four-terminal component containing the four diodes
connected in the bridge configuration became a standard commercial component and is now available
with various voltage and current ratings.
The simplified circuit shown has a well deserved reputation for being dangerous, because, in some
applications, the capacitor can retain a lethal charge after the AC power source is removed. A
practical circuit should always include an assured way to safely discharge the capacitor. If the normal
load can not be guaranteed to perform this function, perhaps because it can be disconnected, the circuit
should include a so-called bleeder resistor connected as close as practical across the capacitor. Because a
bleeder sets a minimum current drain, the regulation of the circuit, defined as percentage voltage change
from minimum to maximum load, is improved.
The capacitor and the load resistance have a typical time constant τ = RC where C and R are the
capacitance and load resistance respectively. As long as the load resistor is large enough so that this time
The idealized waveforms shown above are seen for both voltage and current when the load on the bridge
is resistive. When the load includes a smoothing capacitor, both the voltage and the current waveforms
will be greatly changed. While the voltage is smoothed, as described above, current will flow through
the bridge only during the time when the input voltage is greater than the capacitor voltage. For
example, if the load draws an average current of n Amps, and the diodes conduct for 10% of the time,
the average diode current during conduction must be 10n Amps. This non-sinusoidal current leads to
harmonic distortion and a poor power factor in the AC supply.
In a practical circuit, when a capacitor is directly connected to the output of a bridge, the bridge diodes
must be sized to withstand the current surge that occurs when the power is turned on at the peak of the
AC voltage and the capacitor is fully discharged. Sometimes a small series resistor is included before the
capacitor to limit this current.
Output can also be smoothed using a choke, a coil of conductor enclosed by an iron frame (similar to a
transformer in construction). This tends to keep the current (rather than the voltage) constant. Due to the
relatively high cost of an effective choke compared to a resistor and capacitor this is not employed in
modern equipment. Some early console radios created the speaker's constant field with the current from
the high voltage ("B +") power supply, which was then routed to the consuming circuits, rather than
using a permanent magnet to create the speaker's constant magnetic field. The speaker field coil thus
acted as a choke.
ATX - A single, keyed connector. Supplies +/-12V, +/-5V, and +3.3V. The fan sucks air into the case
thereby semi-pressurizing the case, which helps to keep the internal components cleaner. There are also
additional voltage and power lines used to signal and control the power supply. It is turned on and off
electronically, not with a power switch. Should be unplugged because the power supply applies power to
the motherboard even when turned off. It must be unplugged while servicing. Power is still applied to
the motherboard even if the PC is turned off.
Connectors:
Molex - standard peripheral connector for powering internal hard drives, CD-ROM drives, and DVD
drives. Used for devices that need more power.
Berg - a small, flat connector typically used for powering floppy drives and internal Zip and SuperDisk
drives. Used in devices that need less power.
Color or Voltage
component
Yellow wire +12
Blue wire -12
Red wire +5
Purple wire +5VSB
White wire -5
Orange wire +3.3VDC
Brown wire +3.3VDC default Sense
Grey wire PWR_OK
Motor +/-12
Circuitry +/-5
Misc.
• ESD (electrostatic discharge) can destroy circuits, memory, processors, and transistors.
• ESD is very high in dry non-humid environments.
• Don’t wear ESD wrist strap when working on CRT monitor.
• You should use an (UPS) uninterruptable power supply, it protects against power interruptions
(brownouts and failures), overvoltages (spikes), and undervoltages (sags).
• Be aware of EMI (electromagnetic interference) and RFI (Radio Frequency Interference).
• These cause spikes that exceed the computer’s capability.
• Use a line conditioner to control against EMI and RFI (not blackouts).
• To protect against damage from lightning-disconnect all external cables.
Most motherboards produced today are designed for so-called IBM-compatible computers, which held
over 96% of the global personal computer market in 2005.
A motherboard, like a backplane, provides the electrical connections by which the other components of
the system communicate, but unlike a backplane also contains the central processing unit and other
subsystems such as real time clock, and some peripheral interfaces.
A typical desktop computer is built with the microprocessor, main memory, and other essential
components on the motherboard. Other components such as external storage, controllers for video
display and sound, and peripheral devices are typically attached to the motherboard via edge connectors
and cables, although in modern computers it is increasingly common to integrate these "peripherals" into
the motherboard.
Given the high thermal design power of high-speed computer CPUs and components, modern
motherboards nearly always include heatsinks and mounting points for fans to dissipate excess heat.
AT - A motherboard patterned after the original IBM AT motherboard. It only has a single on-board
connector, the 5-pin DIN keyboard connector, uses CMOS for configuration, and early versions only
used DIP memory chips and DIP CPUs and co-processors. Later versions might be configured with any
or all of the following: ISA (16 bit)/EISA (32 bit) slots, PCI slots, AGP slot, PGA CPU socket, AT and/
or ATX power connector, I/O connectors, SDRAM slots, SIMM slots, and DIMM slots. Any ports are
on the motherboard but must be connected internally, using the proper cables, to either internal devices
or to connectors attached to the card-edge connectors. Usually 12” x 13.8”
Baby AT - A smaller version of the AT motherboard used in clone machines. These boards can be
found in a wide variety of configurations just as with the AT motherboards. Since they are smaller they
do not have as many expansion slots as a full sized board would have.
LPX (low profile or slimline) - Developed about the same time as the Baby AT boards, the LPX uses a
riser card to install expansion cards into so the case could be lower than the expansion cards. Also uses
the PS/2 style keyboard connector instead of the 5-pin DIN connector. The LPX and mini-LPX were
developed for use in the Slimline and low-profile desktop cases. (Video, parallel, and 2 serial ports are at
the rear of the board).
NLX - Replacement for the LPX board designed around the Pentium II processor. IT supports DIMM
and AGP technology.
ATX - Smaller like the Baby AT board, but installed with a 90-degree rotation. This motherboard allows
for easier installation of full-length expansion cards and cables because the CPU is positioned out of the
path of long expansion cards and is easier to cool. It is also extremely easy to identify even when the
case is on the computer. It is the only board, so far, that has most of the basic peripheral connectors
attached to the motherboard at the board edge. On the board edge you will find:
• PS/2 keyboard and mouse (6-pin mini din),
• At least 1 (possibly 2) serial DB-9,
• A Parallel DB-25,
• Sometimes even a pair of USB connectors, and
• Sound card I/O.
Expansion cards to support all of these functions would have cost hundreds of dollars even a decade ago,
however as of April 2007 such highly-integrated motherboards are available for as little as $30 in the
USA.
Enclosure Styles:
Desktop, Full tower, Mid tower, Micro tower
BIOS refers to the firmware code run by an IBM PC when first powered on. The primary function of the
BIOS is to identify and initiate component hardware (such as hard disk, floppy and optical disk drives).
This is to prepare the machine so other software programs stored on various media can load, execute,
and assume control of the PC. This process is known as booting, or booting up, which is short for
bootstrapping.
BIOS can also be said to be a coded program embedded on a chip that recognizes and controls various
devices that make up x86 personal computers. Among other classes of computers, the generic terms boot
monitor, boot loader or boot ROM were commonly used. Some Sun and Macintosh PowerPC computers
used Open Firmware for this purpose. There are a few proposed alternatives for Legacy BIOS in the x86
world: Extensible Firmware Interface, Open Firmware (used on the OLPC XO-1) and coreboot.
The term first appeared in the CP/M operating system, describing the part of CP/M loaded during boot
time that interfaced directly with the hardware (CP/M machines usually had a simple boot loader in
ROM, and nothing else). Most versions of DOS have a file called "IBMBIO.COM" or "IO.SYS" that is
analogous to the CP/M disk BIOS.
EEPROM chips are advantageous because they can be easily updated by the user; hardware
manufacturers frequently issue BIOS updates to upgrade their products, improve compatibility and
remove bugs. However, this advantage had the risk that an improperly executed or aborted BIOS update
could render the computer or device unusable. To avoid these situations, more recent BIOSes use a
"boot block"; a portion of the BIOS which runs first and can not be altered by updates. This code
verifies if the rest of the BIOS is intact (using hash checksums or other methods), before transferring
control to it. If the boot block detects any corruption in the main BIOS, it will typically warn the user
that a recovery process must be initiated by booting from removable media (floppy, CD or USB
memory) so the user can try flashing the BIOS again. Some motherboards have a backup BIOS
(sometimes referred to as DualBIOS boards) to recover from BIOS corruptions. In 2007, Gigabyte
began offering motherboards with a QuadBIOS recovery feature.
Due to the limitation on the number of times flash memory media can be flashed, a flash-based BIOS is
vulnerable to "flash-burn" viruses that repeatedly write to the flash, permanently corrupting chip content.
Such attacks can be prevented by some form of write-protection, the ultimate protection being the
replacement of the flash memory with a true ROM.
The size of the BIOS, and the capacities of the ROM, EEPROM and other media it may be stored on,
has increased over time as new features have been added to the code; BIOS versions now exist with
sizes up to 8 megabytes.
Major BIOS vendors include American Megatrends (AMI), General Software, Insyde Software, and
Phoenix Technologies (which bought Award Software International in 1998).
CMOS
CMOS (Complimentary Metal Oxide Semiconductor) is a special memory area with battery backup
used to store system configuration and set up settings that the PC refers to every time it’s turned on.
• You can write new information to CMOS.
• You can configure/store information about physical memory and new drives, etc. (usually
automatically detected during POST).
• CMOS still has power when PSU is off due to the on-motherboard battery.
• If you remove the CMOS battery, the system goes back to system defaults.
• Settings stored in CMOS are:
Password-2 types:
• System (User) password-allows user to access system
• Set-up (Supervisor)-restricts access to CMOS set-up, can also set a User password and set
User Setup to “View Only”
Drive order (boot sequence)-checked by POST
Memory-how much RAM is installed
Drive types and size
Display or monitor type
Hard Drive Space
Date/Time
Port settings
ROM BIOS
• Acts as an interface between hardware (CPU and chips) and the OS (DOS, Windows 95, etc.)
• Its function is to boot up the system
• ROM BIOS upgrade- in the past-replace chip; now-Flash ROM is re-programmed (need update for
MMX-enabled CPU)
• Top reasons to upgrade BIOS:
Hardware problems,
Video card upgrade
• Boot Block-uneraseable part of flash ROM BIOS.
Undocumented FDISK:
FDISK is a very powerful program. In DOS 5 and later, including Windows 9x/ME, Windows NT, and
Windows 2000, it gained some additional abilities. Unfortunately, these capabilities were never
documented in any of the Microsoft documentation for Windows or DOS. The most important
parameter in FDISK is the /MBR (Master Boot Record) parameter, which causes FDISK to rewrite the
Master Boot Record code area, leaving the partition table area intact.
The /MBR parameter is tailor-made for eliminating boot-sector virus programs that infect the Master
Boot Record (cylinder 0, head 0, sector 1) of a hard disk. To use this feature, enter the following:
FDISK /MBR
FDISK then rewrites the boot record code, leaving the partition tables intact. This should not cause any
problems on a normally functioning system, but just in case, you should back up the partition table
information to floppy disk using a third-party product such as Norton Utilities.
Boot Sequence:
The BOOT process is a cycle that runs from the moment the power switch is turned on to the moment
the DOS command prompt (C:\>) or the Windows Desktop appears. In order for this process to be a
success, all hardware must be working. Below is a list of events the computer runs through during the
BOOT process:
1) Power is turned on or the computer is restarted,
2) A surge of electricity wakes up the Central Processing Unit (CPU),
3) The CPU runs the Power On Self Test (POST) from the Basic Input Output System (BIOS),
6b). The loading of Windows 9x can be broken down into the following steps:
a) Power initialization – The motherboard chipset keeps the CPU off until the power supply
stabilizes.
b) BIOS startup – The processor reads the jump address and starts the BIOS program.
c) POST (Power-On Self Test) – The BIOS checks the hardware system – any errors are signaled
with error beep codes.
d) Video and peripheral BIOS – The video card and any other device BIOS execute.
e) System check – After displaying its startup screen, BIOS checks memory, storage drives, ports,
and other devices – any errors are signaled with error messages on the screen.
f) Plug and Play (PnP) check – If BIOS supports this standard, it detects and configures any Plug
and Play devices.
g) Summary screen – The BIOS displays a summary of the PC’s configuration. On some systems, it
displays long enough to read, but on many others it usually flashes by very quickly and is
unreadable.
h) Boot device – The BIOS scans for the active boot device in the specified order as set in CMOS
and looks for the master boot record (MBR) on drive c: or the volume boot sector (VBS) on any
other defined device.
i) OpSys running – Control passes to the boot sector code and the operating system.
j) DOS Boot Record (DBR) loads the hidden files (IO.SYS and MSDOS.SYS).
k) The first hidden file, IO.SYS, loads all other hidden files.
l) The first hidden file, IO.SYS, loads and interprets CONFIG.SYS, including device drivers.
m) The COMMAND.COM file is then loaded.
n) Finally, COMMAND.COM loads and executes the AUTOEXEC.BAT file.
o) After the Autoexec.bat file executes, COMMAND.COM executes windows.
Early computer buses were literally parallel electrical buses with multiple connections, but the term is
now used for any physical arrangement that provides the same logical function as a parallel electrical
bus. Modern computer buses can use both parallel and bit-serial connections, and can be wired in either
a multidrop (electrical parallel) or daisy chain topology, or connected by switched hubs, as in the case of
USB.
First generation
Early computer buses were bundles of wire that attached memory and peripherals. They were named
after electrical buses, or busbars. Almost always, there was one bus for memory, and another for
peripherals, and these were accessed by separate instructions, with completely different timings and
protocols.
One of the first complications was the use of interrupts. Early computers performed I/O by waiting in a
loop for the peripheral to become ready. This was a waste of time for programs that had other tasks to
do. Also, if the program attempted to perform those other tasks, it might take too long for the program to
check again, resulting in loss of data. Engineers thus arranged for the peripherals to interrupt the CPU.
The interrupts had to be prioritized, because the CPU can only execute code for one peripheral at a time,
and some devices are more time-critical than others.
Second generation
"Second generation" bus systems like NuBus addressed some of these problems. They separated the
computer into two "worlds", the CPU and memory on one side, and the various devices on the other,
with a bus controller in between. This allowed the CPU to increase in speed without affecting the bus.
This also moved much of the burden for moving the data out of the CPU and into the cards and
controller, so devices on the bus could talk to each other with no CPU intervention. This led to much
better "real world" performance, but also required the cards to be much more complex. These buses also
often addressed speed issues by being "bigger" in terms of the size of the data path, moving from 8-bit
parallel buses in the first generation, to 16 or 32-bit in the second, as well as adding software setup (now
standardized as Plug-n-play) to supplant or replace the jumpers.
Third generation
"Third generation" buses are now in the process of coming to market, including HyperTransport and
InfiniBand. They also tend to be very flexible in terms of their physical connections, allowing them to
be used both as internal buses, as well as connecting different machines together. This can lead to
complex problems when trying to service different requests, so much of the work on these systems
concerns software design, as opposed to the hardware itself. In general, these third generation buses tend
to look more like a network than the original concept of a bus, with a higher protocol overhead needed
than early systems, while also allowing multiple devices to use the bus at once.
Buses such as Wishbone have been developed by the open source hardware movement in an attempt to
Techniques of interacting
1. Interrupts - signals CPU that the adapter card, system hardware, or application software needs
attention There are 3 types of interrupts:
a) Hardware interrupt-system hardware (keyboard, system clock) and from adapter cards. Each
adapter has its own IRQ (Interrupt ReQuest) number.
b) Exception interrupt-used mainly by CPU itself to handle error conditions
c) Software interrupts-sent by application that is running on PC
2. I/O addresses - after interrupt is established, the adapter communicates with host by I/O addresses
(Base I/O address, I/O port). Each adapter has its own non-overlapping I/O address which is a range
of conventional memory from 4-32 bits.
3. Base Memory Addresses - memory address of any memory on an adapter card. Ranges from
640KB-1MB in the upper memory bank (UMB) on the host computer. Each adapter card must have
a unique BMA and operate in the same mode (8 bit or 16 bit) (can’t have an 8 bit sound card and a
16 bit video card together).
4. Direct Memory Access (DMA) - DMA controller is on a chip set and relieves the CPU of
responsibility of transferring data between adapter and system memory. Each adapter needs a unique
DMA channel to communicate w/ the DMA controller.
Interface - place on PC where other devices (disk drives, modems, keyboard, mouse, etc.) are
connected. 2 types: 1. Built in, or 2. Interface card (adapter card)-card that is inserted into a slot that
connects to CPU.
Buses - collection of wires that make the connection and the rules that describe how data should flow
through the wires.
• Buses specify the placement of connections, the electric signals that are allowable on each computer,
and what those signals mean.
• Configured with
1. jumpers,
2. switches,
3. software (setup software communicates w/ special circuitry on the adapter card via pulsed
signals. After settings are configured (IRQ, DMA), they are stored in EEPROM on the card), or
4. PnP - configure set up by OS’s. BIOS need to support PnP in order to use PnP. PnP OS’s –
Windows 95, 98, and NT(sort of), Win2k, WinXP, Windows Vista.
• 8-bit bus - Not many (if any) left. Will only support single slot cards using an 8-bit data bus, 8
interrupts, and 4 DMA channels. Should not be on the exam! Presented here just to be complete.
ISA (Industry Standard Architecture) – operates at 8 Mhz, 16-bit data bus, uses a double slot connector
(has 1 notch). The additional connector added 8 more IRQ lines and 4 more DMA lines. Cards
using the slots usually used jumpers or DIP switches to set things like IRQ, memory I/O ranges,
and DMA numbers. ISA also separated the bus clock from the CPU clock to allow the slower
data bus to operate at its own speed. ISA slots are found on anything from 286 systems up
through and including some of the earlier Pentium systems. ISA buses communicate w/ the host
EISA (Extended Industry Standard Architecture) – 32-bit bus but operates at only 8-10 MHz to be
backward compatible with the 16-bit ISA bus that it also uses. More notches than ISA. Offers 3
additional modes of transfer: 1. Burst mode - uses 1 signal for transfer of more than 1 byte of
data, 2. Streaming mode - transfers a block of data at up to 40 Mbps, and 3. Multiplexed
streaming mode - transfer data up to 64 Mbps.
• EISA is more suitable for servers than clients PC. Configurations are saved in CMOS on a (SCI-
System Configuration Information File) and also in on-board ROM.
• EISA allows for bus mastering-1 adapter takes control and bypasses the CPU (if an expansion
card has its own built-in processor, it can operate independently from the CPU. A bus-mastering
board can control the bus and act as if it were the entire system, which allows for very fast
throughput).
MCA (Micro Channel Architecture) – introduced with the IBM PS/2, it was the first 32-bit option and
featured bus mastering and a 10 MHz bus clock for expansion cards. Uses an asynchronous bus-
does not depend on the system timing.
VLB (VESA or Video Local Bus) – first used on 486 systems and used to place a port directly on the
system bus or a processor direct slot. The only difference between this and EISA is the fact that
it is directly on the system bus and can run at the speed of the CPU. They are mostly proprietary
and support only expansion cards from the PC’s manufacturer. Tied to the 486 chip set, limited
to an actual speed of about 33 MHz, and very sensitive to electrical fluctuations. Usually limited
to a maximum of three per motherboard. VESA = Video Electronics Standards Association.
PCI (Peripheral Component Interconnect) – introduced with the Pentium processor, it supports either a
32 or 64-bit bus, which allows it to be used with both 486 and Pentium processors. Creates a
high speed data path between the peripheral and the CPU.
AGP (Advanced Graphics Port/Processor) – Similar to the PCI slot but it is located on the system RAM
bus and is designed specifically for video cards only. There will only be one per system. Speeds
up 3-D graphics.
USB (Universal Serial Bus) – newest. Designed to provide PnP capability to peripherals from outside
the case. New peripherals can be “hot-swapped” without installing interface cards or even
turning off the system. Can chain up to 127 serial peripherals to one central hub. Carries power
supply as well. Cables should be 5 meters or less in length, supports up to 127 devices.
Firewire – Will replace SCSI technology because devices do not have to be terminated or assigned ID
numbers. Can chain up to 63 devices and uses a 6 prong connector. *Firewire has an internal
(backplane bus) with speeds of 12.5, 25, and 50 Mbps, external speeds of 100, 200, and 400
Mbps. See Hard drive Interfaces.
PGA - Pin Grid Array, the 486 uses a 169-pin package; the Pentium mounts in either a 273-pin or 296-
pin socket; and the Pentium Pro uses a 387-pin socket. This changes the physical size of the chip. There
is a CPGA (ceramic), a PPGA (plastic), or a FCPGA (flip chip). Socketed.
SECC - Single Edge Contact Cartridge, the processor mounts as a single module into a special slot on
the motherboard.
Cache- area of memory reserved for storing data that the CPU determines it will be using frequently.
Math Co-processor - In the table above the first CPU to incorporate an onboard MPU was the 486DX.
MMX (Multimedia Extensions) - added 57 new instructions to improve video, audio, and graphics
capability; added SIMD (Single Instruction Multiple Data) technology, in which one instruction can
control several data items; and Cache was doubled to 32K.
Chipset - a set of microchips that work as a unit to set or control the amount of memory and the type of
RAM chips that can be used, and provide support for certain types of peripherals. Chipset is commonly
used to mean the basic functions of a motherboard. If the chipset doesn’t support an upgrade you will be
required to change the motherboard.
Thermal grease - a compound used to conduct heat from the CPU to the cooling fins of a heat sink. It is
mercury-based so you should avoid getting any on your skin.
In contemporary usage, memory usually refers to a form of semiconductor storage known as random
access memory (RAM) and sometimes other forms of fast but temporary storage. Similarly, storage
today more commonly refers to mass storage - optical discs, forms of magnetic storage like hard disks,
and other types slower than RAM, but of a more permanent nature. Historically, memory and storage
were respectively called primary storage and secondary storage.
The contemporary distinctions are helpful, because they are also fundamental to the architecture of
computers in general. As well, they reflect an important and significant technical difference between
memory and mass storage devices, which has been blurred by the historical usage of the term storage.
Characteristics of storage
Storage technologies at all levels of the storage hierarchy can be
differentiated by evaluating certain core characteristics as well
as measuring characteristics specific to a particular
implementation. These core characteristics are volatility,
mutability, accessibility, and addressability. For any particular
implementation of any storage technology, the characteristics
worth measuring are capacity and performance.
Volatility
• Non-volatile memory - Will retain the stored information
even if it is not constantly supplied with electric power. It is
suitable for long-term storage of information. Nowadays
used for most of secondary, tertiary, and off-line storage. In
1950s and 1960s, it was also used for primary storage, in the
form of magnetic core memory.
• Volatile memory - Requires constant power to maintain the
stored information. The fastest memory technologies of
today are volatile ones (not a universal rule). Since primary Illustration 19: A 1GB DDR RAM memory
storage is required to be very fast, it predominantly uses module
volatile memory.
Differentation
• Dynamic memory - A form of volatile memory which also requires the stored information to be
periodically re-read and re-written, or refreshed, otherwise it would vanish.
• Static memory - A form of volatile memory similar to DRAM with the exception that it does not
refresh on occasion.
• Side note: most modern PC system developers have gone with DRAM as the standard with SDRAM
and SRAM being slowly phased out of the common marketplace as new motherboards are not being
built to support these styles of chips.
Accessibility
• Random access - Any location in storage can be accessed at any moment in approximately the same
amount of time. Such characteristic is well suited for primary and secondary storage.
• Sequential access - The accessing of pieces of information will be in a serial order, one after the
other; therefore the time to access a particular piece of information depends upon which piece of
information was last accessed. Such characteristic is typical of off-line storage.
Addressability
• Location-addressable - Each individually accessible unit of information in storage is selected with its
numerical memory address. In modern computers, location-addressable storage usually limits to
primary storage, accessed internally by computer programs, since location-addressability is very
efficient, but burdensome for humans.
• File addressable - Information is divided into files of variable length, and a particular file is selected
with human-readable directory and file names. The underlying device is still location-addressable,
but the operating system of a computer provides the file system abstraction to make the operation
more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.
• Content-addressable - Each individually accessible unit of information is selected with a hash value,
or a short identifier with a number pertaining to the memory address where the information is stored.
Content-addressable storage can be implemented using software (computer program) or hardware
(computer device), with hardware being a faster but more expensive option.
Capacity
• Raw capacity - The total amount of stored information that a storage device or medium can hold. It
is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).
• Density - The compactness of stored information. It is the storage capacity of a medium divided with
a unit of length, area or volume (e.g. 1.2 megabytes per square inch).
Performance
• Latency - The time it takes to access a particular location in storage. The relevant unit of
measurement is typically nanosecond for primary storage, millisecond for secondary storage, and
second for tertiary storage. It may make sense to separate read latency and write latency, and in case
of sequential access storage, minimum, maximum and average latency.
• Throughput - The rate at which information can be read from or written to the storage. In computer
data storage, throughput is usually expressed in terms of megabytes per second or MB/s, though bit
rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also
accessing media sequentially, as opposed to randomly, typically yields maximum throughput.
Memory:
• internal storage areas in the computer.
• memory chips are made of up millions of
transistors, which conduct electricity (1) or do not
conduct electricity. (0).
Non-Volatile
• ROM (Read Only Memory)-special permanent
memory used to store programs that boot the PC
and perform diagnostics. It can be re-written.
• PROM (Programmable ROM)-programmed Illustration 20: Common DRAM modules
only once by applying high voltages that alter
circuits and store desired program.
• EPROM (Erasable PROM) is erased by
exposure to ultraviolet light.
• EEPROM/Flash (Electrically Erasable
PROM)-erased electronically-1 bit at a time- Illustration 21: RAMBUS memory with integrated heatsink
used in printers. Most new BIOS are
flashable.
Volatile
• RAM (Random Access Memory)-main
memory. Can be read or written over. Needs
constant source of electricity
• DRAM (Dynamic RAM) – Most common Illustration 22: DDR2 SDRAM Packages
type of RAM, uses 1 transistor and one
capacitor, refreshed every 16 milliseconds.
• SRAM (Static RAM) – Very fast RAM, Used in L1 and L2 Cache, CMOS, etc. Uses 6 transistors,
not refreshed, charged from system board memory.
• SDRAM (Synchronous DRAM) – Faster than DRAM, may operate at the speed of the CPU. On a
DRAM, EDO RAM, WRAM, SDRAM, DDR SDRAM, and SGRAM are also types of video RAM.
Parity Checking
• 9th bit that verifies the integrity of previous byte. It verifies 1 byte at a time w/ no corrections.
• Odd parity-parity bit is 0 and there is an odd number of 1’s; data is valid and the p-bit is removed
and data is sent.
• Even parity-parity bit is 1 and there is an even number of 1’s; data is invalid and a parity error is
generated.
• SIPP (Single Inline Pin Package) – a small circuit board with pins across the bottom. No longer
manufactured.
• SIMM (Single Inline Memory Module) – a group of DRAM memory chips on a small Printed
Circuit (PC) board with a single row of input/output contacts. Only one side of the module makes
contact with the computer. They must be installed in pairs. All SIMM’s run at the speed of the
slowest SIMM.
30-pin – about 9 DIP chips, 256KB to 16MB.
72-pin – about 36 DIP chips, 4MB to 64MB.
SIMM’s transfer data at 32 bits at a time
DIMM (Dual Inline Memory Module) – an array of memory chips on both sides of a small PC board
with two rows of input/output contacts. The contacts are located on both sides of the module board.
They have 168 pins and range in size from 8MB to 256MB. Transfer data 64 bits at a time with a 64
bit or wider memory bus.
• RIMM (Rambus Inline Memory Module) – a 184-pin, 2.5 volt, 600 or 800 MHz, 16-bit and 18-bit
memory module for Direct Rambus Dynamic Random Access Memory (Direct RDRAM). ID
numbers and up to 63 devices can be chained. Uses a 6-prong power connector.
• If memory module is divisible by 8 it’s non-parity; if divisible by 9 it includes parity bit (Parity
checking is set up in CMOS).
and http://en.wikipedia.org/wiki/DDR2_SDRAM
In modern computers, hard disks are usually used as secondary Illustration 23: A hard disk drive with
protective cover removed.
storage. The time taken to access a given byte of information stored
on a hard disk is typically a few thousandths of a second, or milliseconds. By contrast, the time taken to
access a given byte of information stored in random access memory is measured in thousand-millionths
of a second, or nanoseconds. This illustrates the very significant access-time difference which
distinguishes solid-state memory from rotating magnetic storage devices: hard disks are typically about
a million times slower than memory. Rotating optical storage devices, such as CD and DVD drives,
have even longer access times.
Some other examples of secondary storage technologies are: flash memory (e.g. USB sticks or keys),
floppy disks, magnetic tape, paper tape, punch cards, standalone RAM disks, and Zip drives.
The secondary storage is often formatted according to a file system format, which provides the
abstraction necessary to organize data into files and directories, providing also additional information
(called metadata) describing the owner of a certain file, the access time, the access permissions, and
other information.
Most computer operating systems use the concept of virtual memory, allowing utilization of more
primary storage capacity than is physically available in the system. As the primary memory fills up, the
system moves the least-used chunks (pages) to secondary storage devices (to a swap file or page file),
retrieving them later when they are needed. As more of these retrievals from slower secondary storage
are necessary, the more the overall system performance is degraded.
Characteristics of storage
The characteristics of storage for Primary Storage also apply to Secondary Storage.
Magneto-optical disc storage is optical disc storage where the magnetic state on a ferromagnetic surface
stores information. The information is read optically and written by combining magnetic and optical
methods. Magneto-optical disc storage is non-volatile, sequential access, slow write, fast read storage
used for tertiary and off-line storage.
Hard Drives
• have 2 motors
To turn the platters, and
Stepper motor to stop. Also has a voice coil (similar to an audio speaker) which allows data to be
written close together.
• Physical Characteristics
form factor- 8, 5 ¼, and 3 ½ inch disks;
height- full, ½ or 1” height drives.
• Configuring Hard Drives
set jumpers. 1st drive is the master, 2nd drive is the slave,
hook up cables [power (molex) and control (40 pin cable)].
• Setting up Hard Drives
low level format sets up hard drive to accept data,
high level format sets up segments (smallest unit of storage). Uses a File Allocation Table
(FAT).
ESDI (Enhanced Small Device Interface) – Similar to the ST-506 but allowed two drives per controller
card. A termination resistor required for the last drive in the chain.
Single-ended device – one wire per data bit. Noise a problem, 6 Meters max.
HVD (High Voltage Differential) – two wires per data bit, could damage Single-ended devices if put on
the same chain, 25 Meters max.
LVD (Low Voltage Differential) – two wires per data bit, can be used with single-ended devices, 12
Meters max.
Description /Standard Bus Width Transfer rate Max. # Devices Cable Type Max Cable Length
SCSI-1 8-bits 5MBps 8 25-pin 6 Meters
SCSI-2 8-bits 5MBps 8 50-pin 6 Meters
Fast SCS-3 8-bits 10MBps 8 50-pin 3 Meters
Wide SCSI-2 16-bits 10MBps 16 68-pin 3 Meters
Ultra 8-bits 20MBps 8 50-pin 1.5 Meters
Fast Wide 16-bits 20MBps 16 68-pin 3 Meters
Ultra-2 8-bits 40MBps 8 50-pin 3 Meters
Ultra Wide 16-bits 40MBps 16 68-pin 3 Meters
Wide Ultra-2 16-bits 80MBps 16 68-pin 3 Meters
IDE (Integrated Drive Electronics) – also known as the ATA interface, two hard drives max (one master
and one slave), no other devices accepted, 504 MB maximum drive size. (the boot drive should
be on IDE1).
• IDE needs to go through the CPU and chipset.
• IDE connections are made with 40 pin ribbon cable; Max. Cable length is 2 ft.
LBA (Logical Block Addressing/WD) or ECHS (Extended Cylinder Head Sector/Seagate) – procedure
used to bypass the 504MB limitation of IDE drives. Maximum size is 8.4GB. It uses a method of
sector translation that gives the BIOS incorrect information about the devices addresses.
Int13 (Interrupt 13/Phoenix) – New BIOS commands allow hard drive sizes to 137GB.
Firewire – Will eventually replace SCSI technology because devices do not have to be terminated or
assigned.
For a 1.44MB Floppy disk, the Cluster is equivalent to a Sector and is 512
Bytes. 512 Bytes is approximately ½ of an 8½" x 11" sheet of single spaced
typed paper, and there are 2,847 Sectors on a 3½" Floppy Disk. It can hold
an equivalent to over 1423 typed pages in ASCII (American Standard Code
for Information Interchange) format! That would be one BIG book!
A standard Floppy Disk is shown in cut-away form to the right. The components
are as follows:
1) Write-protect tab 5) Paper ring
2) Hub 6) Magnetic disk
3) Shutter 7) Disk Sector
4) Plastic housing
Parallel Transmission - 1 byte at a time is sent over 8 wires. Max. distance for cables 10-15 ft. (for the
test 10 ft.). to keep crosstalk down. Anything over 10 ft, you need good quality cables.
PS/2 port or 6 pin mini DIN - keyboard (IRQ1) and mouse (IRQ12) connections on ATX board; 5 pin
DIN on AT boards. Output voltage is +/- 5 volts DC. On older ports mice were on serial ports.
There is also a MIDI (Musical Instrument Device Interface) port and a SCSI (Small Computer System
Interface) port.
Serial Ports - most common device is the modem (enables 2 computers to communicate over a phone
line).
• In order for 2 computers to communicate, they must use the same settings for: 1 bps (data rate-how
much data is transferred in 1 sec), 2. Data bits, 3. Parity, 4. Stop bus, and 5. flow control.
• data rate vs. baud rate-baud rate is the number of signal changes on a data transmission line in 1 sec.
• Synchronization - receiver must know how frequently to read the data line. If receiving device is not
in synch with signal, then the signal will be misread.
2 types of Synchronization:
1. Synchronous transmission - receiver’s clock and transmitter’s clock must be in synch.
2. Asynchronous transmission - transmitter adds a start, parity, and stop bit to the data line, which is
called a data frame. This process is called framing. Asynch. Transmission also involves flow control
(uses handshaking- rec. sends a signal using a separate wire to let the transmitter know it’s ready to
receive).
Parallel Ports - most common device is the printer (uses Centronics standard (36 pins connector to the
printer and a DB25 pin connector to the computer).
• connectors:-most common DB25 female connector.
• SPP-standard parallel port. Originally data only flowed to the printer (unidirectional) or other
devices
• EPP-Enhanced Parallel Port) was bi-directional. (Needed for CD-ROM’s and network adapters).
ECP-Enhanced Capabilities Port-10x faster, defined by IEEE 1284 Standard-which defines 3 types
of connectors:
1) Type A-DB 25 pin connector,
2) Type B- 36 pin conductor, 0.085 centerline clamp with bale locks, and
3) Type C-36 pin conductor, 0.050 centerline mini connector with clip latches.
Advantages of USB:
1. No new expansion cards need to be installed,
2. Devices can be hot-swapped, no installation of new drivers is needed, or no configuring IRQ and
DMA addresses.
• This is because OS software supports and manages USB host controller and USB hub controller,
which then manages the USB ports.
• The host controller is: 1. on the system board or 2. a PCI slot card can be added to the system The
CPU is totally out of the picture.
• USB has 2 main modules: 1. (SIE-Serial Interface Engine)-responsible for the bus protocol and 2.
The root hub-used to expand the # of USB ports.
• USB cable can be no longer than 5 meters between devices.
• Troubleshooting is done through the BIOS (for Win95-you need Win95 OEM service release 2.1
and 2.5 CD’s).
Firewire Ports - IEEE 1394 specification. Faster than USB and SCSI.
• hot-swappable.
• It has 2 levels of interface: 1. Internal (backplane) bus and2. External bus.
• Firewire runs internally at 12.5, 25, or 50 Mbps and externally at 100, 200, or 400 Mbps.
• IEEE 1394b-speeds up to 800 Mbps, 1.6 Gbps, or higher.
• Advantages of Firewire over SCSI:
1. It automatically assigns addresses
2. It doesn’t require termination
3. It is hot swappable
4. It is PnP because there are no addresses or DMA channels to assign.
Firewire is a viable solution for digital cameras, video cameras, printers, TVs, network cards, and mass
storage devices.
• Cable can only be up to 4.5 meters between devices.
• Firewire uses a 6 conductor cable (2 pair of wires for transporting data and 1 pair for power).
Standards
1. MDA (Monochrome Display Adapter)
2. CGA-(Color Graphics Adapter) - 16 colors in text and graphics mode
3. EGA (Enhanced Graphic Array) - higher resolution
4. VGA (Video Graphics Array) - up to 256 colors at high resolution (800x600). Original VGA
640x480, 16 colors.
5. SVGA (Super VGA) and UVGA (Ultimate VGA) - even higher resolutions
Monitors
1. TTL - transistor to transistor logic (MDA)
2. RGB - red, green, blue (CGA)
3. Enhanced Color Display monitor (EGA)
4. VGA monitor (VGA) - Connectors:-DB15 pin connector, 3 rows
5. Number of monitors per CPU, Win98 = 9, Win 2000 = 10
Sound Cards (IRQ 5) - Convert digital signal to sound waves, Soundblaster is the standard.
Connections
• Mic-in - receive signal from external microphone
• Speaker out - sends signal to speaker/headphone
• Line-in - receives signal from output of an external sound device
• Line-out - sends signal from soundcard to external sound device
• CD-Audio - Receives digital signal audio from audio source
• IDE port - connects an IDE CD ROM drive to sound card
• Game port - Usually a DB-15 is used to connect sound/game/joystick/and MIDI devices.
Types
1. Asynchronous - most common
• uses serial transmission
• more prone to errors and therefore uses a parity bit
2. Synchronous - less errors
Standards
V.42- error checking standard; V.42bis- compression standard; V.34-28K modem; x2, 56 flex, and V.90
– 56 Kbps modem standards
-MNP standards-defines class 1-5
-Each class differs in levels of error correction and detection and data compression
Configuring Modems
1. Start\Settings\Control Panel\Modem Utilities,
2. Select UART (Universal Asynchronous Receiver Transmitter) to set receiver and transmitter buffers.
Cables
Connects - A drive after twist, B drive before twist; set both to B drive (twist reverses setting to A) the
other connector goes to motherboard.
CD-ROM Drives
• Basically use SCSI attached to EIDE drive
• Standard CD-ROM holds 700 MB; after formatted it holds approximately 533MB (direct CD)
• CD-R - read only
• CD-RW - read/write
• Direct CD will only work in CD-RW
• Internal CD-ROM-device is connected to EIDE drive
• External CD-ROM-device is connected to parallel or SCSI port (SCSI is better and faster)
• ASPI (Advanced SCSI Programming Interface) enables use of a singular ASPI device driver for
multiple SCSI devices
• Power connector for CD-ROM drive is a molex because of current required by laser
Syquest Drives
1. SparQ-1GB memory cartridge for PC’s w/ parallel port or EIDE interface. Speed is equivalent to the
hard drive
2. SyJet-1.5 GB cartridge for PC and MAC interface choices include parallel, SCSI, EIDE
3. Average transfer rate is 3.8 MBps
4. EzFlyer-230MB cartridge for PC and MAC. Interface at parallel or SCSI ports (MAC’s only SCSI)
Back up Systems
Types
1. Quarter Inch Cartridge (QIC) technology-oldest, most standardized, and most reliable
• available in 60, 150, 250, 525 MB and larger
• detractions cost and speed
• mm DAT (Digital Audio Tape)-offers higher storage capacities at a lower cost
• memory capacities range from 1-4 GB and more
• detractions are less reliable than QIC and vulnerable to heat and moisture
2. 8mm (Exabyte)
• storage capacity of 2.2-10 GB per cartridge
• tapes are only slightly larger than 4mmDAT tapes and are more reliable
• detractions are expense
• popular w/ UNIX
4. CD-ROM
• 700 MB of storage
• Better than tape drives because tapes have a tendency to lose data over time.
Backup Policy
1. Considerations in choosing Backup method:
2. Appropriate hardware for your environment
3. Who is responsible for backup administering
4. Determining minimal backup frequency
5. Choosing the appropriate backup type
6. Determine the number of tapes or other media (backup set) required to complete a backup
7. Determining when to perform backup
8. Labeling backup media and storing safely (data identification)
9. Occasionally testing backup data
10. Determining hardware and media maintenance (or replacement)
11. Laying out a recovery operation plan for complete recovery of data
12. Structuring how to backup media are rotated in and out of schedule (backup method) - Weekly,
monthly, yearly
Backup Types
1. Full - all information is backed up regardless of whether it was backed up before. Resets archive bit.
2. Incremental - new files and files created/modified since last full or incremental back up are backed
up. Resets archive bit.
3. Differential - All files that were created/modified since the last full backup are backed up. Doesn’t
reset the archive bit.
Storage
1. Move at least 1 full back up set per week offsite.
Settings
• Sticky keys - can only press one key at a time
• Filter keys - ignores common keyboard errors
• Toggle keys - gives an audible signal when keys are pressed while Caps, Num, and Scroll Locks are
set
Preventative Maintenance
• Use mild glass cleaner or isopropyl alcohol
• Do not spray cleaner onto keyboard
Mouse (FRU)
• IRQ 12
• usually plugs into PS/2 mouse port
• how motion is detected-motion detecting rollers are connected to small disks that have evenly spaced
slots cut in them. As these disks spin, the slots repeatedly break a light beam going from an LED to a
photo-detector. The number of times the beam is broken is proportional to the distance the mouse
travels. The rate that the light beams is broken tells the computer how fast the mouse is going.
Preventative Maintenance
• wash ball in warm, soapy water;
• shake any loose dirt from inside mouse;
• remove any dirt or lint from axles,
• keep mouse pad clean.
Alternatives
1. Bus mouse w/ interface card,
2. USB mouse,
3. Trackball,
4. Joystick,
5. Touch pad,
6. Mouth control mouse substitute,
7. Light pens, and
8. gloves to full body suits
Preventative Maintenance
• Turn off monitor
• Used gentle cleaner sprayed onto a lint free cloth
Alternatives
• LCD (liquid Crystal Device)-flat screen
disadvantages - not as bright as CRT’s and must sit directly in front of them
advantages - uses less energy and do not emit electromagnetic radiations
• Virtual Reality games with special glasses as monitors
• Projectors
Printers
Problems can come from many different sources
1. Something physically wrong with the printer.
Types of Printers
1. Impact Daisy wheel
2. Dot Matrix - forms images out of dots that are created by a set of pins that strike an inked ribbon
• heads contain 9 or 24 pins, initially 8 pins.
• Repair-keep a well inked ribbon in the printer and keep mechanical parts free of dust and debris.
• Print quality is Near Letter Quality.
• usually limited to printheads.
3. Ink jet - aka bubble jet.
• major appeal over laser printer. It can print in color for the same price as a B/W laser printer
• ink is forced out of carefully aimed nozzles onto the paper
• Methods of releasing ink:
thermal, or
piezoelectric
• the higher the resolution, the smaller the drop of ink that is sprayed.
• problem - if paper gets wet, color will run
• solution - ink jet printers with wax cartridge
• Repair - replace ink cartridge and use quality paper
4. Laser - print 1 page at a time using a combination of electrostatic charges, toner, and laser light.
• It has several FRU’s-toner cartridge, laser scanning assembly, high voltage power supply, DC
power supply, paper transport assembly, transfer corona assembly, fusing assembly, and the
formatter board.
• use fully formed characters and print in letter quality (LQ)
• Process the laser printer uses to produce the finished page:
1) Cleaning - the Electrostatic Photographic (EP) drum is cleaned with a rubber blade.
2) Charging or Conditioning- the EP drum is given a neg. charge (@-600 volts) by the
primary corona wire.
3) Writing - laser beam write to the EP drum causing portions of the drum to become
almost positively charged (formed characters).
4) Developing - toner is attracted to the areas of the drums that were hit by the laser light
5) Transferring - transfer corona wire charges the paper with a positive charge. The EP
drum turns as the paper runs beneath it and loses its toner to the paper.
6) Fusing -The paper runs through the fusing assembly that is heated to 350 Degrees F. The
fuser’s high temperature and pressure fuses and melts the toner into the paper.
Connecting Printers
• Serial, parallel, USB, or infrared port, also via network.
• parallel port using parallel cable or USB port using USB cable.
• usually uses a 25 pin connector (DB25) to connect to the computer’s parallel port and a Centronics
connector to connect to printer.
• can use the RJ-45 connector on printers that have built-in Ethernet network interface connection.
• network connections need to have NIC on the computer appropriate for the topology of the network.
• data transfer rate for a parallel port is 150 KBps.
types
1. flatbed,
2. hand held,
3. sheet fed,
4. film scanners,
5. photo scanners
interfaces
1. parallel (easy to use , but slow),
2. serial
3. SCSI port,
4. and USB
• Digital Cameras - image is captured digitally and stored as a file on a floppy disk or removable
memory card.
• Still/Video Capture - desktop digital cameras capture still or video images directly through the PC
3D image-provides realistic 3D images through stereo viewing on systems ranging from PC
screens to large screen projections.
• DVD (digital video device) - uses patterns of tiny pits on the disk’s surface to represent data, which
is then read by a laser beam.
Use a shorter wavelength than CD’s so they can store more info.
PCI controller card decodes the information stored on the disc and separates it into sound and
video data. It sends the sound data to be converted to an analog signal for the speakers, while
sending the video data to the video controller card for the monitor.
• Microphones - input to the sound card. Microphones change sound energy to electrical energy that
sound card changes into digital info. Mic’s are useless without a sound card.
• TV tuners - converts TV signal into picture you can see on the computer’s monitor.
• Types
Desktop replacement,
Notebook, and
Sub-notebook.
• Modes
Quick start - power saving mode.
Deep sleep mode - drastically reduced power mode. Entered into after certain conditions
(prolonged activity) have been met.
Speed step - technology that enables 2 different modes (maximum performance mode and
Battery optimized mode.
Maximum mode - processor runs at its highest speed and normal internal voltage.
Battery optimized mode - the processor runs at a reduced speed and reduced internal voltage.
• Storage systems - portable hard drives capable of holding up to 25 GB of memory. Many hard
drives are replaceable. Removable storage can be added to existing port, PCMCIA slot, or to floppy
disk or CD-ROM drive.
• Memory - portables use either SIMM’s or DIMM’s (usually custom designed for each system)
PC cards
• credit card-sized devices connect to and draw power from the portable through a 68 pin male/female
arrangement.
• can be hot-swapped.
• Types of slots
Type I - can hold 1 type I card.
Type II - can hold 1 type II card or 2 type I cards.
Type III - can hold 1 type III card or 2 type II’s.
• Cards
Type I-3.3 mm thick, one row of sockets, used primarily to add to memory (RAM or ROM)
Type II-5 mm thick 2 rows of sockets, typically used for memory, i/o devices, NIC, LAN
adapters, and SCSI connections. These usually have a pop out connection for an RJ-11c or RJ-45
connector.
Type III-10.5 mm thick, has 3 rows of sockets, most commonly used for hard drives or support
adapters for external CD-ROM, DVD, and tape drives.
Extended cards also allow addition of components, which must remain outside the system
(antennas, for wireless applications).
• Start up:
BIOS are permanent firmware. CMOS is controlled by a separate battery, RAM settings changed
by BIOS need the battery to maintain settings.
Power Management
Batteries
1. NiCad (Nickel Cadmium)-lasts 3-4 hrs, up to 12 hrs to recharge, lasts 700-1000charge/recharge
cycles. Memory effect.
2. NiMH (Nickel Metal Hydride)-environmentally friendly, 50% more power than NiCad, 400-500
charge/recharge cycles. No memory loss.
3. Li-Ion (Lithium Ion)-current industry standard.
4. Lithium Polymer-uses jelly like material as an electrolyte instead of liquid.
5. Zinc Air.
2. ACPI (Advanced Configuration and Power Interface) - has 6 states. States S0-S5. S1-S4 are sleeping
states.
Both APM and ACPI are BIOS based interfaces. They interact between OS and hardware
Types
1. LAN (Local Area Network) - usually cable based computers are directly linked together and housed
in a clearly defined geographic area,
2. WAN (Wide Area Network) - usually satellite up link, fiber optic cable, routers, repeaters involved
across the country or around the world (Internet is ultimate WAN),
3. MAN (Metropolitan Area Network) - confined to a single municipality,
4. SAN (Storage Area Network)-specialized LAN. Links several servers that are dedicated to storing
large amounts of data in a central place,
5. VAN (Value Added Network) - provides both network access and additional proprietary services
that are available only to its users,
6. EWN (Enterprise-Wide Network) - private network that connects all of an organization’s computers
no matter what the conditions.
Network Licensing
• Either by seat (each person has a license) or by server (certain number of licenses per server) OS
servers usually do not have client OS, but do have network OS.
• grouping by their capability to do more than 1 thing at a time.
• Multi-user - support 2 or more users at once.
• Multiprocessing - supports running a program on more than 1 CPU.
• Multitasking - supports more than 1 program running concurrently (time slicing).
• Multi-threading - supports different parts of a single program running concurrently.
Network Models
1. Peer to Peer Architecture
a) can be set up in DOS, Win3.1, etc.
b) limited to 10 computers or less.
c) usually uses Net BIOS.
d) one PC can transmit 1 bit of data at a time, which lowers throughput.
e) allows for sharing of expensive peripherals, storage space, as well as having network security
features.
f) limitations: each computer needs to be available to support the needs of the other users, lots of
Network Topologies
1. Point to point - computer to printer or computer to modem, etc.
2. Star topology - LAN
• All nodes are individually connected to a central computer, multi-port repeater, concentrator, or
hub.
• Nodes can be added/removed easily; it will not affect the rest of the network.
• If hub fails-the entire network fails.
3. Bus topology - LAN
• Single main bus cable (backbone) transmits data to all nodes on the network.
• Every node is directly connected to the main bus cable. Each segment of wire goes from NIC
(Network Interface Card) on the computer to the bus cable.
• Bus topology must be terminated on both ends (50 ohm resistor).
• A break or faulty piece of cable anywhere can prevent all of the computers on the segment from
being able to communicate.
4. Ring topology-LAN topology
• All nodes are connected on a continuous loop w/ no end points and no terminators.
• A packet called a token is passed from station to station. Only the machine w/ the token can
transmit data over the network.
• No other machine can send signals that will interfere with the signal from the machine with the
token.
5. Mesh topology
• Every node is connected to every other node in a point to point connection.
• Redundant.
6. Hybrid topology-LAN topology that combines 2 or more or the other topologies.
Ethernet Function
Three basic elements:
1. Physical medium (cables) used to carry signal
2. Set of media access control (MAC), which is a mechanism where rules are embedded in each
Ethernet interface that allow multiple computers to fairly arbitrate access to the shared Ethernet
channel.
• Each MAC mechanism uses a system called CSMA/CD (Carrier Sense Multiple Access w/
Collision Detection).
• Each Ethernet network interface card has a unique 48 bit address assigned to it by manufacturer
(IEEE determines the 1st 24 bits and the company assigns the 2nd 24 bits). The 48 bit address is
called the MAC address.
3. An Ethernet transmission consists of a standardized set of bits used to carry data over the system
• 5-4-3 rule-guideline for limiting network size w/ multiple Ethernet segments.
• Server and node should not be separated by more than 5 segments, 4 repeaters, and 3 populated
segments.
Token Ring
• Type of computer network in which all the computers are connected in a continuous loop (ring
topology).
• All stations on a Token Ring must transmit data at the same speed. If you want to upgrade a ring,
you must update all network cards on the network.
• Token Ring uses MSAUs (Multi Station Access Units) (also MAUs) to connect network stations.
They are similar to hubs w/ 8 port to connect stations and a Ring In and Ring Out port to daisy chain
MSAUs.
• If Ring In or Ring Out ports fail, stations connected to that MSAU won’t be able to communicate .
ARCNet
• Attached Resource Computer Network.
• One of the oldest, simplest, and least expensive LAN technologies.
• Can connect up to 255 nodes in a star topology using twisted pair or coaxial cabling.
• Originally could transmit at 2.5 Mbps; now ARCNet Plus transfers at 20 Mbps.
• Uses token technology.
Network connectivity
The following connection devices fit into the OSI model at layers 1-3 (Network, Data Link, and
Physical).
Hubs
Types:
1. Passive hub - (layer 1) simply forwards network messages. It does not process, modify, or
regenerate signals at all.
2. Active hub (repeater or multi-port repeater-layers 1-2) - regenerates or amplifies in order that data
bits maintain a strong signal that might otherwise deteriorate over a long distance. It allows
computer on a network to be further apart.
3. Intelligent hub - provides intelligent functioning as well as forwarding signals. Provides bridging,
routing, switching, and even more complex functions like network management and LAN.
Firewall
• Control network access both inbound and outbound.
• Used to prevent unauthorized access between Intranets and the Internet or an extra net.
OSI model
The Open System Interconnection has 7 layers with 7 sets of standards:
Coaxial
• Single conductor which is surrounded by insulation and a conductive shield, w/ heavy protective
covering over the shield.
• More expensive, but can carry more data w/ less resistance.
• BNC connector are used to connect coaxial cables (like RG 58 A/U) into a network.
• 10base5 and 10base2 Ethernet standards use coaxial cable.
Wireless Communication
• Networks not connected by wires.
• Enabled by packet radio, spread spectrum, cellular technology, satellites, and microwave towers.
• Infrared is also considered wireless.
• CDPD (Cellular Digital Packet Data)-data transmission technology that uses unused cellular
channels (in the 800-900 MHz range) to transmit data in packets.
• Offers transfer rates up to 19.2 Kbps, quicker call set up, plus better error correction than modems
Classes of IP addresses:
Designated by using varying portions of the IP address to identify network (domain) and host (client).
1. Class A - 1st byte identifies network (domain) address; the other 3 bytes define host (client) address.
• Supports only a small # of network (domain) addresses-254 (2 to the 8th-2); support a lot of host
addresses-16,777,214 (2 to the 24th-2).
• Example: 255.0.0.0
• Range for 1st byte in decimals-1-127.
2. Class B - 1st 2 bytes are for network (domain) address; the other 2 are for host (client) addresses.
• Supports medium # of network-65,534 (2 to the 16th-2) and host addresses (65536-2 to the16th)
• Example: 255.255.0.0
• Range for 1st byte in decimals 128-19.
3. Class C - 1st 3 bytes are for network (domain) address; the other 1 is for host (client) addresses
• Supports a large amount of network addresses-16,777,214 (2 to the 24th-2) and small amount of
host addresses - 254 (2 to the 8th-2).
• Example: 255.255.255.0
• Range for 1st byte in decimals-192-223.
4. There are Classes D and E, but not supported by Microsoft.
Sub-Nets
• Network segments are called subnets if each network segment’s address must be derived from a
Single IP network address.
• Sub-netting (segmenting if not connected to Internet)- subdividing a single network address to allow
for unique network addresses on each subnet (segment).
• Subnet mask-tells you which class network (domain) address you are in.
NetBEUI
(NetBIOS Enhanced User Interface):
• Works at layer 4 (transport layer) of OSI model.
• Not a routable protocol.
Date: ___________________
IRQ IRQ Channels I/O Addresses
0 Timer Circuits 040 - 04B
1 Keyboard/ Mouse Controller 060 - 064
2 2nd 8259 IRQ Controller 0A0 - 0A1
8 Real-time Clock/CMOS RAM 070 - 071
9
10
11
12
13 Math Coprocessor 0F0 - 0FF
14
15
3
4
5
6
7
Devices not using Interrupts I/O Addresses
Mono/EGA/VGA Standard Ports 3B0 - 3BB
EGA/VGA Standard Ports 3C0 - 3CF
CGA/EGA/VGA Standard Ports 3D0 - 3DF
DM DMA Channels
A
0
1
2
3
4 DMA Channel 0 – 3 Cascade
5
6
7
Phone number:___________________________________________________
Please be advised that if the books are not in stock it may take as much as 7 business days before they
are available. I will take orders the first week of class and will pick all books up at the same time. If you
do not place an order but would like to get the books later, you may get them from Barnes and Noble
Booksellers.
Student signature:_________________________________________________
Instructor Signature:_______________________________________________
───────────────Cut here─────────────────
Instructor copy: Student Name:
Book Name Retail Tax Total Class cost Amount given instructor
Price (Both initial)
A+ Certification for Dummies $34.99 $2.10 $37.09 $31.50
Class Workbook $10.00 $10.00
Total $47.09 $41.50
Student signature:_________________________________________________
Instructor Signature:_______________________________________________