Professional Documents
Culture Documents
Computer Maintenance
& Troubleshooting
Notes
211
Developed by
Interactive Training Division
IDM Computer Studies (Pvt) Ltd.
http://www.idm.edu
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
CHAPTER 1.................................................................................................................4
General System Architecture.........................................................................................4
Structural Organization ..................................................................................................7
CHAPTER 2...............................................................................................................12
Instruction Set Architecture..........................................................................................12
Addressing Modes .......................................................................................................12
Register File .................................................................................................................20
CHAPTER 3...............................................................................................................31
Different Parts of PC....................................................................................................31
Printers.........................................................................................................................46
Bus Designs .................................................................................................................47
ASSIGNMENT 1 .......................................................................................................79
Safety from Statis Electricity........................................................................................79
ASSIGNMENT 2 .......................................................................................................81
Computer Performances..............................................................................................81
ASSIGNMENT 3 ......................................................................................................82
Troubleshooting Tools .................................................................................................82
CHAPTER 1
Flynn's Classification
Flynn uses the stream concept for describing a machine's structure .A stream simply
means a sequence of items (data or instructions). Four main types of machine
organizations can be found.
SISD
(Singe-Instruction stream, Singe-Data stream)
SISD corresponds to the traditional mono-processor (von Neumann
computer). A single data stream is being processed by one instruction stream
SIMD
(Singe-Instruction stream, Multiple-Data streams)
In this organization, multiple processing units of the same type process on
multiple-data streams. This group is dedicated to array processing machines.
Sometimes , vector processors can also be seen as a part of this group.
MISD
(Multiple-Instruction streams, Singe-Data stream)
In case of MISD computers, multiple processing units operate on one single-
data stream (Figure c). In practice, this kind of organization has never been
used.
MIMD
(Multiple-Instruction streams, Multiple-Data streams)
This last machine type builds the group for the traditional multi-processors.
Several processing units operate on multiple-data streams (Figure d). One
example of this group is the SGI Origin 2000
Stored-program Concept
Stored-program computer is a term similar to but not synonymous to with the term
Von-Neumann Architecture. In a computer of this type programs are stored and
executed in main memory -- often but not always after having been loaded in from
some storage mechanism.
Although this term was often used in computing literature until the 1960s and 1970s it
is now rare as it is assumed that all computers are of this type unless stated
otherwise.
1. Fetch the next instruction from memory at the address in the program
counter.
2. Add the length of the instruction to the program counter.
3. Decode the instruction using the control unit. The control unit commands the
rest of the computer to perform some operation. The instruction may change
the address in the program counter, permitting repetitive operations. The
instruction may also change the program counter only if some arithmetic
condition is true, giving the effect of a decision, which can be calculated to
any degree of complexity by the preceding arithmetic and logic.
4. Go back to step 1.
Very few computers have a pure von Neumann architecture. Most computers add
another step to check for interrupts, electronic events that could occur at any time.
An interrupt resembles the ring of a telephone, calling a person away from some
lengthy task. Interrupts let a computer do other things while it waits for events.
Von Neumann computers spend a lot of time moving data to and from the memory,
and this slows the computer (this problem is called von Neumann bottleneck) So,
engineers often separate the bus into two or more busses, usually one for
instructions, and the other for data.
Structural Organization
CPU
Abbreviation of central processing unit, and pronounced as separate letters. The
CPU is the brains of the computer. Sometimes referred to simply as the processor or
central processor, the CPU is where most calculations take place. In terms of
computing power, the CPU is the most important element of a computer system.
On large machines, CPUs require one or more printed circuit boards. On personal
computers and small workstations, the CPU is housed in a single chip called a
microprocessor.
• The arithmetic logic unit (ALU), which performs arithmetic and logical
operations.
• The control unit, which extracts instructions from memory and decodes and
executes them, calling on the ALU when necessary.
The cache is a very high speed and very expensive piece of memory, which is used
to speed up the memory retrieval process. Due to its expensive CPU's come with a
relatively small amount of cache compared with the main system memory. Budget
CPU's have even less cache, this is the main way that the top processor
manufacturers take the cost out of their budget CPU's.
Without the cache memory every time the CPU requested data it would send a
request to the main memory which would then be sent back across the memory bus
to the CPU. This is a slow process in computing terms. The idea of the cache is that
this extremely fast memory would store and data that is frequently accessed and
also if possible the data that is around it. This is to achieve the quickest possible
response time to the CPU. Its based on playing the percentages. If a certain piece
of data has been requested 5 times before, its likely that this specific piece of data
will be required again and so is stored in the cache memory.
Lets take a library as an example o how caching works. Imagine a large library but
with only one librarian (the standard one CPU setup). The first person comes into
the library and asks for Lord of the Rings. The librarian goes off follows the path to
the bookshelves (Memory Bus) retrieves the book and gives it to the person. The
book is returned to the library once its finished with. Now without cache the book
would be returned to the shelf. When the next person arrives and asks for Lord of
the Rings, the same process happens and takes the same amount of time.
If this library had a cache system then once the book was returned it would have
been put on a shelf at the librarian’s desk. This way once the second person comes
in and asks for Lord of the Rings, the librarian only has to reach down to the shelf
and retrieve the book. This significantly reduces the time it takes to retrieve the
book. Back to computing this is the same idea, the data in the cache is retrieved
much quicker. The computer uses its logic to determine which data is the most
frequently accessed and keeps them books on the shelf so to speak.
That is a one level cache system which is used in most hard drives and other
components. CPU's however use a 2 level cache system. The principles are the
same. The level 1 cache is the fastest and smallest memory, level 2 cache is larger
and slightly slower but still smaller and faster than the main memory. Going back to
the library, when Lord of the Rings is returned this time it will be stored on the shelf.
This time the library gets busy and lots of other books are returned and the shelf
soon fills up. Lord of the Rings hasn't been taken out for a while and so gets taken
off the shelf and put into a bookcase behind the desk. The bookcase is still closer
than the rest of the library and still quick to get to. Now when the next person comes
in asking for Lord of the Rings, the librarian will firstly look on the shelf and see that
the book isn't there. They will then proceed to the bookcase to see if the book is in
there. This is the same for CPU's. They check the L1 cache first and then check the
L2 cache for the data they require .
Main memory
Refers to physical mem ory that is internal to the computer. The word main is used to
distinguish it from external mass storage devices such as disk drives. Another term
for main memory is RAM.
The computer can manipulate only data that is in main memory. Therefore, every
program you execute and every file you access must be copied from a storage
device into main memory. The amount of main memory on a computer is crucial
because it determines how many programs can be executed at one time and how
much data can be readily available to a program.
Because computers often have too little main memory to hold all the data they need,
computer engineers invented a technique called swapping, in which portions of data
are copied into main memory as they are needed. Swapping occurs when there is no
room in memory for needed data. When one portion of data is copied into memory,
an equal-sized portion is copied (swapped) out to make room.
Now, most PCs come with a minimum of 32 megabytes of main memory. You can
usually increase the amount of memory by inserting extra memory in the form of
chips.
Secondary memory
Secondary memory (or secondary storage) is the slowest and cheapest form of
memory. It cannot be processed directly by the CPU. It must first be copied into
primary storage (also known as RAM).
Secondary memory devices include magnetic disks like hard drives and floppy disks ;
optical disks such as CDs and CD ROMs ; and magnetic tapes, which were the first
forms of secondary memory.
I/O Units.
Short for input/output (pronounced "eye-oh"). The term I/O is used to describe any
program, operation or device that transfers data to or from a computer and to or from
a peripheral device. Every transfer is an output from one device and an input into
another. Devices such as keyboards and mice are input-only devices while devices
such as printers are output-only. A writable CD-ROM is both an input and an output
device.
A fourth class of metrics, utilization metrics, can only be observed inside a system.
Utilization information is vital for understanding and predicting system performance.
The remainder of this page discusses each class of metrics in more detail.
Latency
Latency or response time metrics are measured in units of (elapsed) time. The
definition of latency metric must specify both a start and stop event: when to begin
measuring the delay, and when to stop. Some examples of latency metrics:
• The round time between typing a new address in a web browser and the time
the requested page is completely displayed.
• Set up time for a cell phone call might be defined as the delay between
pressing the "send" button and hearing the first ring.
• The time a packet is held by a network router before being forwarded.
• Delay between receiving an order for an item at an online store and updating
the "number in stock" that's reported to other customers.
Throughput
The term bandwidth is often used to describe the theoretical maximum throughput of
a date link or other device. For example, a 32-bit wide data bus running at 100 MHz
has a bandwidth of 32 billion bits/second. Since all devices impose some overhead in
terms of packet headers, gaps between data blocks, or control protocols, the
throughput of usable data is always less the bandwidth. Efficiency is defined as the
ratio of usable throughput to the bandwidth. For computer networks, where packets
may be lost or damaged, the term goodput is sometimes used for the arrival rate of
undamaged packets.
For some applications, throughput metrics may be normalized over some other
system characteristic, such as cost or power consumption. It is also a common
practice to specify throughout with latency constraint, or visa versa.
Availability
The term availability is used to describe the fraction of time a system is available. For
example, if an inventory database is down for an hour a day, it has an availability of
about 0.96. However, the availability metric alone doesn't tell the whole story. For
example, if the same inventory database went down for 10 milliseconds each
second, it would have an availability of 0.99 but would probably be useless for any
practical purpose. Therefore, the reliability metric is used to report the mean time
between failures (MTBF), which indicates on average, the period a system is usable.
A related metric is mean time to repair (MTTR), which quantifies how long it takes to
recover from a failure.
Utilization
The fraction of time that a system component, such as CPU, disk, or data link, is
active is its utilization. It follows from this definition that utilization values range
between 0 and 1. The maximum throughput of a system (its throughput capacity) is
reached when the busiest component reaches a utilization of 1. As a practical matter,
response time increases rapidly as utilization approaches 100%, so that many
systems are designed to keep utilization below some threshold such as 70% or 80%.
The path length of a device for specific workload is the device utilization divided by
the throughput. The path length has units of time and it indicates how much time the
device needs to process one unit of work, such as a transaction, packet, etc.
Path length is short for "code path length" or the number of instructions required to
complete a specific task. As CPU design has progressed, the introduction of caches,
virtual memory, pipelining, and concurrent execution of multiple instructions have all
made the relationship between instruction count and CPU time less predictable. For
current technology, it's better to think of path length as "CPU time per transaction."
CHAPTER 2
RISC
Pronounced risk, acronym for reduced instruction set computer, a type of
microprocessor that recognizes a relatively limited number of instructions. Until the
mid-1980s, the tendency among computer manufacturers was to build increasingly
complex CPUs that had ever-larger sets of instructions. At that time, however, a
number of computer manufacturers decided to reverse this trend by building CPUs
capable of executing only a very limited set of instructions. One advantage of
reduced instruction set computers is that they can execute their instructions very fast
because the instructions are so simple. Another, perhaps more important advantage,
is that RISC chips require fewer transistors, which makes them cheaper to design
and produce. Since the emergence of RISC computers, conventional computers
have been referred to as CISCs (complex instruction set computers).
There is still considerable controversy among experts about the ultimate value of
RISC architectures. Its proponents argue that RISC machines are both cheaper and
faster, and are therefore the machines of the future. Skeptics note that by making the
hardware simpler, RISC architectures put a greater burden on the software. They
argue that this is not worth the trouble because conventional microprocessors are
becoming increasingly fast and cheap anyway.
To some extent, the argument is becoming moot because CISC and RISC
implementations are becoming more and more alike. Many of today's RISC chips
support as many instructions as yesterday's CISC chips. And today's CISC chips use
many techniques formerly associated with RISC chips.
CISC
Pronounced sisk, and stands for complex instruction set computer. Most personal
computers use a CISC architecture, in which the CPU supports as many as two
hundred instructions. An alternative architecture, used by many workstations and
also some personal computers, is RISC (reduced instruction set computer), which
supports fewer instructions.
Addressing Modes
Register
A, special, high-speed storage area within the CPU. All data must be represented in
a register before it can be processed. For example, if two numbers are to be
multiplied, both numbers must be in registers, and the result is also placed in a
register. (The register can contain the address of a memory location where data is
stored rather than the actual data itself.)
The number of registers that a CPU has and the size of each (number of bits) help
determine the power and speed of a CPU. For example a 32-bit CPU is one in which
each register is 32 bits wide. Therefore, each CPU instruction can manipulate 32 bits
of data.
• To have the address field refer to the address of a word in memory, this in turn
contains a full-length address of the operand.
• Advantage: is that for a word length of N, an address space of 2 power of N is
now available.
• Disadvantage: is that instruction execution requires two memory references to
fetch the operand: one to get its address and a second to get its value.
• The memory cell referenced by the address field
contains the address of (i.e., the pointer to) the operand
• If A is the value of the address field, then EA is the
Effective Address in memory of the operand and is
EA=(A)
• Large address space
• 2n addressable cells where n is the number of
bits in the address field
• May be nested, multilevel, cascaded
• Multiple memory accesses to find operand
• Hence slower
Indexed Addressing
Operations
An arithmetic and logical unit (ALU) is one of the core components of all central
processing units. It is capable of calculating the results of a wide variety of common
computations. The most common available operations are the integer arithmetic
operations of addition, subtraction, and multiplication, the bitwise logic operations of
AND, NOT, OR, and XOR, and various shift operations. Typically, a standard ALU
does not handle integer division nor any floating point operations. For these
calculations a separate component, such as a divider or floating point unit (FPU), is
often used, although it is also possible that a microcode program may use the ALU to
emulate these operations.
The ALU takes as inputs the data to be operated on and a code from the control unit
indicating which operation to perform, and for output provides the result of the
computation. In some designs it may also take as input and output a set of condition
codes, which can be used to indicate cases such as carry-in or carry-out, overflow, or
other statuses.
Processor operations
Processor Operations helps operators manage more systems with greater efficiency.
One operator, in one location, can initialize, configure, monitor, shut down, and
recover multiple systems -- both local and remote -- and respond to a variety of
detected conditions. The operator, using one standard interface, can do all that
across multiple types of systems. Automated routines for frequently used functions
speed the work of skilled operators and assist less experienced operators to become
more productive.
Processor Operations supports monitoring and control functions for any of the
following processors:
The operating systems that processor operations supports on the target systems are
z/OS, OS/390, MVS, VM, VSE, and Linux for zSeries.
Processor operations allows you to power on and off multiple target processors and
reset them. You can perform IPLs, set the time of day clocks, respond to messages,
monitor status, and detect and resolve wait states.
In complex system, data flow components are almost always mixed with control flow
components, at least at top level. Whenever a systems includes control flow
elements, a simple design strategy is to use the control part as the "skeletton" of the
architecture, and to design the data flow modules as components (dedicated co-
processors). templates is possible.
• For fully compiled languages like C and Fortran, the binary codes
Are executed directly by the target machine. Java stops the translation
At the byte code level. The Java virtual machine, which is at
the assembly language level, interprets the byte codes (hardware
implementations of the JVM also exist, in which Java byte codes
are executed directly.)
PIPE LINE
A Pipeline is a series of stages, where some work is done at each stage. The work is
not finished until it has passed through all stages. Pipelining is an implementation
technique in which multiple instructions are overlapped in execution. Today,
Pipelining is key to making processors fast. A pipeline is like an assembly line: in
both, each step completes one piece of the whole job. Workers on a car assembly
line perform small tasks, such as installing seat covers. The power of the assembly
line comes from many cars per day. On a well-balanced assembly line, a new car
exits the line in the time it takes to perform one of the many steps. Note that the
assembly line does not reduce the time it takes to complete an individual car; it
increases the number of cars being built simultaneously and thus the rate at which
the cars are started and completed. There are two types of pipelines, Instructional
pipeline where different stages of an instruction fetch and execution are handled in a
pipeline and Arithmetic pipeline where different stages of an arithmetic operation are
handled along the stages of a pipeline.
Superpipelined Processors
In contrast to a superscalar processor, a superpipelined one has split the main
computational pipeline into more stages. Each stage is simpler (does less work) and
thus the clock speed can be increased. However the latency, measured in clock
cycles, for any instruction to complete has increased from 4 cycles in early RISC
processors to 8 or more.
Benefit
The major benefit of superpipelining is the increase in the number of instructions
which can be in the pipeline at one time and hence the level of parallelism.
Drawbacks
The larger number of instructions "in flight" (ie in some part of the pipeline) at any
time, increases the potential for data dependencies to introduce stalls. Simulation
studies have suggested that a pipeline depth of more than 8 stages tends to be
counter-productive.
Note that some recent processors, eg the MIPS R10000, can be described as both
superscalar - they have multiple processing units - and superpipelined - there are
more than 5 stages in the pipeline.
Register File
The Register File is the highest level of the memory hierarchy. In a very simple
processor, it consists of a single memory location - usually called an accumulator.
The result of ALU operations was stored here and could be re-used in a subsequent
operation or saved into memory.
A modern processor will have at least 32 integer registers each capable of storing a
word of 32 (or, more recently, 64) bits. A processor with floating point capabilities will
generally also provide 32 or more floating point registers, each capable of holding a
double precision floating point word. These registers are used by programs as
temporary storage for values which will be needed for calculations. Because the
registers are "closest" to the processor in terms of access time - able to supply a
value within a single clock cycle - an optimising compiler for a high level language will
attempt to retain as many frequently used values in the registers as possible. Thus
the size of the register file is an important factor in the overall speed of programs.
Earlier processors with fewer than 32 registers (eg early members of the x86 family)
severely hampered the ability of the compiler to keep frequently referenced values
close to the processor.
Stacks
Hardware implementation of stacks has the obvious advantage that it can be much
faster than software management. In machines that refer to the stack with a large
percentage of instructions, this increased efficiency is vital to maintaining high
system performance.
While any software method of handling stacks can be implemented in hardware, the
generally practiced hardware implementation is to reserve contiguous locations of
memory with a stack pointer into that memory. Usually the pointer is a dedicated
hardware register that can be incremented or decremented as required to push and
pop elements. Sometimes a capability is provided to add an offset to the stack
pointer to nondestructively access the first few elements of the stack without
requiring successive pop operations. Often times the stack is resident in the same
memory devices as the program. Sometimes, in the interest of increased efficiency,
the stacks reside in their own memory devices.
Another approach that may be taken to building stacks in hardware is to use large
shift registers. Each shift register is a long chain of registers with one end of the
Developed by IDM Interactive Training Division for 20
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
chain being visible as a single bit at the top of stack. 32 such shift registers of N bits
each may be placed side-by-side to form a 32 bit wide by N element stack. While this
approach has not been practical in the past, VLSI stack machines may find this a
viable alternative to the conventional register pointing into memory implementation.
Register
Special, high-speed storage area within the CPU. All data must be represented in a
register before it can be processed. For example, if two numbers are to be multiplied,
both numbers must be in registers, and the result is also placed in a register. (The
register can contain the address of a memory location where data is stored rather
than the actual data itself.)
The number of registers that a CPU has and the size of each (number of bits) help
determine the power and speed of a CPU. For example a 32-bit CPU is one in which
each register is 32 bits wide. Therefore, each CPU instruction can manipulate 32 bits
of data.
Register Renaming
There are many solutions to resolve a pipeline stall. One way is to simply add more
registers to the CPU, which should give us more quick storage spaces. That way, we
could store all the values we need within the registers so the CPU would not have to
fetch data directly from memory. As with the case of two instructions trying to write to
a single accumulator, we could eliminate the stall if we added another accumulator.
However, adding more registers is expensive. In addition, a complex program can fill
up all the registers in our CPU within a short period of time.
Many CPU manufacturers use register renaming instead of adding more registers. In
this way, there are more registers available during program execution. Register
renaming dynamically associates physical registers to logical registers.i This is
usually done during the execution phase where an Address Generator Unit (AGU)
within the Arithmetic Logic Unit (ALU) assigns the executed data or instruction into a
specific register, cache or memory.
At the beginning of each cycle the CPU presents the value of the program counter on
the address bus. The CPU then fetches the instruction from main memory (possibly
via a cache and/or a pipeline) via the data bus into the instruction register.
From the instruction register, the data forming the instruction is decoded and passed
to the control unit which sends a sequence of control signals to the relevant function
units of the CPU to perform the actions required by the instruction such as reading
values from registers, passing them to the ALU to add them together and writing the
result back to a register.
The program counter is then incremented to address the next instruction and the
cycle is repeated.
Microprogramming
The microprogram is the essential part of the computer which allows the interaction
between hardware and software. In many processors, the microprogram executes
machine code instructions directly on the hardware, providing a final level of
interpretation between machine language instructions and the basic memory and
arithmetic operations performed by the hardware. However, some new architectures
do not implement a microprogram. Instead, operations in the digital logic level are run
directly by software. In this project, I will examine microprogramming in terms of its
role as the intersection of hardware and software, and in doing so, compare and
contrast microinstruction-rich and microinstruction-deficient architectures, and
examine various new approaches to hardware/software interaction.
The ring counter provides a sequence of six consecutive active signals that cycle
continuously. Synchronized by the system clock, the ring counter first activates its T0
line, then its T1 line, and so forth. After T5 is active, the sequence begins again with
T0.
Memory Hierarchy
Memory Hierarchy
Main Memory
The storage device used by a computer to hold the currently executing program and
its working data. A modern computer's main memory is built from random access
memory integrated circuits. In the old days ferrite core memory was one popular form
of main memory, leading to the use of the term "core" for main memory.
Computers have several other sorts of memory, distinguished by their access time,
storage capacity, cost, and the typical lifetime or rate of change of the data they hold.
Registers in the CPU are fast, few, expensive and typically change every few
machine instructions. Other kinds are cache, PROM, magnetic disk (which may be
used for virtual memory), and magnetic tape.
Cache Memory
a special high-speed storage mechanism. It can be either a reserved section of main
memory or an independent high-speed storage device. Two types of caching are
commonly used in personal computers: memory caching and disk caching.
Some memory caches are built into the architecture of microprocessors. The Intel
80486 microprocessor, for example, contains an 8K memory cache, and the Pentium
has a 16K cache. Such internal caches are often called Level 1 (L1) caches. Most
modern PCs also come with external cache memory, called Level 2 (L2) caches.
These caches sit between the CPU and the DRAM. Like L1 caches, L2 caches are
composed of SRAM but they are much larger.
Disk caching works under the same principle as memory caching, but instead of
using high-speed SRAM, a disk cache uses conventional main memory. The most
recently accessed data from the disk (as well as adjacent sectors) is stored in a
memory buffer. When a program needs to access data from the disk, it first checks
the disk cache to see if the data is there. Disk caching can dramatically improve the
performance of applications, because accessing a byte of data in RAM can be
thousands of times faster than accessing a byte on a hard disk.
When data is found in the cache, it is called a cache hit, and the effectiveness of a
cache is judged by its hit rate. Many cache systems use a technique known as smart
caching, in which the system can recognize certain types of frequently used data.
The strategies for determining which information should be kept in the cache
constitute some of the more interesting problems in computer science.
Secondary Memory
Secondary memory (or secondary storage) is the slowest and cheapest form of
memory. It cannot be processed directly by the CPU. It must first be copied into
primary storage (also known as RAM ).
Secondary memory devices include magnetic disks like hard drives and floppy disks ;
optical disks such as CDs and CDROMs ; and magnetic tapes, which were the first
forms of secondary memory.
I/O Methods
The original MemoryObject class has two I/O methods: the read and write methods.
These methods read and write to the memory object directly. With the integration of
file system caching, these methods are no longer sufficient. At least two sets of I/O
methods are required. The first set of I/O methods does I/O directly from and to
memory objects like the original read and write methods. The revised virtual memory
management system uses these methods to read data into main memory and write
data out of main memory. The second set of I/O methods supports file system I/O.
These methods do I/O through a memory object cache if a memory object is cached.
In the revised virtual memory management system, the original read and write
methods of the MemoryObject class has been renamed rawRead and rawWrite. The
rawRead and rawWrite methods do I/O directly from and to memory objects. Then,
new read and write methods are defined. If a memory object is cached, these
methods invoke the cacheRead and cacheWrite methods of the memory object's
memory object cache. If a memory object is not cached, these methods invoke the
memory object's rawRead and rawWrite methods.
I/O Modules
It is not possible to simply connect I/O devices directly to the system bus for several
reasons.
o There are many different types of device, each with a different method of
operation, e.g. monitors, disk drives, keyboards. It is impracticable for a
CPU to be aware of the operation of every type of device, particularly as
new devices may be designed after the CPU has been produced.
o The data transfer rate of most peripherals is much slower than that of
the CPU. The CPU cannot communicate directly with such devices
without slowing the whole system down.
o Peripherals will often use different data word sizes and formats than
the CPU.
For this reason a computer system must use I/O modules, components which
interface between the CPU and the peripherals. An I/O module has several functions.
Programmed I/O
The simplest strategy for handling communication between the CPU and an I/O
module is programmed I/O. Using this strategy, the CPU is responsible for all
communication with I/O modules, by executing instructions which control the
attached devices, or transfer data.
For example, if the CPU wanted to send data to a device using programmed I/O, it
would first issue an instruction to the appropriate I/O module to tell it to expect data.
The CPU must then wait until the module responds before sending the data. If the
module is slower than the CPU, then the CPU may also have to wait until the transfer
is complete. This can be very inefficient.
Another problem exists if the CPU must read data from a device such as a keyboard.
Every so often the CPU must issue an instruction to the appropriate I/O module to
see if any keys have been pressed. This is also extremely inefficient. Consequently
this strategy is only used in very small microprocessor controlled devices.
A more common strategy is to use interrupt driven I/O. This strategy allows the CPU
to carry on with its other operations until the module is ready to transfer data. When
the CPU wants to communicate with a device, it issues an instruction to the
appropriate I/O module, and then continues with other operations. When the device
is ready, it will interrupt the CPU. The CPU can then carry out the data transfer as
before.
This also removes the need for the CPU to continually poll input devices to see if it
must read any data. When an input device has data, then the appropriate I/O module
can interrupt the CPU to request a data transfer.
An I/O module interrupts the CPU simply by activating a control line in the control
bus. The sequence of events is as follows.
The situation is somewhat complicated by the fact that most computer systems will
have several peripherals connected to them. This means the computer must be able
to detect which device an interrupt comes from, and to decide which interrupt to
handle if several occur simultaneously. This decision is usually based on interrupt
priority. Some devices will require response from the CPU more quickly than others,
for example, an interrupt from a disk drive must be handled more quickly than an
interrupt from a keyboard.
Many systems use multiple interrupt lines. This allows a quick way to assign priorities
to different devices, as the interrupt lines can have different priorities. However, it is
likely that there will be more devices than interrupt lines, so some other method must
be used to determine which device an interrupt comes from.
Most systems use a system of vectored interrupts. When the CPU acknowledges an
interrupt, the relevant device places a word of data (a vector) on the data bus. The
vector identifies the device which requires attention, and is used by the CPU to look
up the address of the appropriate interrupt handing routine.
Many systems therefore use an additional strategy, known as direct memory access
(DMA). DMA uses an additional piece of hardware - a DMA controller. The DMA
controller can take over the system bus and transfer data between an I/O module
and main memory without the intervention of the CPU. Whenever the CPU wants to
transfer data, it tells the DMA controller the direction of the transfer, the I/O module
involved, the location of the data in memory, and the size of the block of data to be
transferred. It can then continue with other instructions and the DMA controller will
interrupt it when the transfer is complete.
The CPU and the DMA controller cannot use the system bus at the same time, so
some way must be found to share the bus between them. One of two methods is
normally used.
Burst mode
The DMA controller transfers blocks of data by halting the CPU and controlling the
system bus for the duration of the transfer. The transfer will be as quick as the
weakest link in the I/O module/bus/memory chain, as data does not pass through the
CPU, but the CPU must still be halted while the transfer takes place.
Cycle Stealing
The DMA controller transfers data one word at a time, by using the bus during a part
of an instruction cycle when the CPU is not using it, or by pausing the CPU for a
single clock cycle on each instruction. This may slow the CPU down slightly overall,
but will still be very efficient.
CHAPTER 3
Different Parts of PC
Computer Monitor
The computer monitor is an output device that is part of your computer's display
system. A cable connects the monitor to a video adapter (video card) that is
installed in an expansion slot on your computer’s motherboard. This system converts
signals into text and pictures and displays them on a TV-like screen (the monitor).
The computer sends a signal to the video adapter, telling it what character, image or
graphic to display. The video adapter converts that signal to a set of instructions that
tell the display device (monitor) how to draw the image on the screen.
The CRT, or Cathode Ray Tube, is the "picture tube" of your monitor. Although it is a
large vacuum tube, it's shaped more like a bottle. The tube tapers near the back
where there's a negatively charged cathode, or "electron gun". The electron gun
shoots electrons at the back of the positively charged screen, which is coated with a
phosphorous chemical. This excites the phosphors causing them to glow as
individual dots called pixels (picture elements). The image you see on the monitor's
screen is made up of thousands of tiny dots (pixels). If you've ever seen a child's
LiteBrite toy, then you have a good idea of the concept. The distance between the
pixels has a lot to do with the quality of the image. If the distance between pixels on a
monitor screen is too great, the picture will appear "fuzzy", or grainy. The closer
together the pixels are, the sharper the image on screen. The distance between
pixels on a computer monitor screen is called its dot pitch and is measured in
millimeters. (see sidebar). You should try to get a monitor with a dot pitch of .28 mm
or less.
There are a couple of electromagnets (yokes) around the collar of the tube that
actually bend the beam of electrons. The beam scans (is bent) across the monitor
from left to right and top to bottom to create, or draw the image, line by line. The
number of times in one second that the electron gun redraws the entire image is
called the refresh rate and is measured in Hertz (Hz).
If the scanning beam hits each and every line of pixels, in succession, on each pass,
then the monitor is known as a non-interlaced monitor. A non-interlaced monitor is
preferred over an interlaced monitor. The electron beam on an interlaced monitor
scans the odd numbered lines on one pass, then scans the even lines on the second
pass. This results in an almost imperceivable flicker that can cause eye-strain.
This type of eye-strain can result in blurred vision, sore eyes, headaches and even
nausea. Don't buy an interlaced monitor, they can be a real pain in the ... ask your
optometrist.
Interlaced computer monitors are getting harder to find (good!), but they are still out
there, so keep that in mind when purchasing a monitor and watch out for that "steal
of a deal".
Developed by IDM Interactive Training Division for 31
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
Video Technologies
Video technologies differ in many different ways. However, the major 2 differences
are resolution and the number of colors it can produce at those resolutions .
Resolution
Resolution is the number of pixels that are used to draw an image on the screen. If
you could count the pixels in one horizontal row across the top of the screen, and the
number of pixels in one vertical column down the side, that would properly describe
the resolution that the monitor is displaying. It’s given as two numbers. If there were
800 pixels across and 600 pixels down the side, then the resolution would be 800 X
600. Multiply 800 times 600 and you’ll get the number of pixels used to draw the
image (480,000 pixels in this example). A monitor must be matched with the video
card in the system. The monitor has to be capable of displaying the resolutions and
colors that the adapter can produce. It works the other way around too. If your
monitor is capable of displaying a resolution of 1,024 X 768 but your adapter can only
produce 640 X 480, then that’s all you’re going to get.
When we talk about the different technologies, we’re talking about the video card
and monitor that make up that display system. Also, standards describe the basic
number of colors and resolutions for each technology, but individual manufacturers
always take liberties, providing options and enhancements that are designed to make
their product more appealing to the end user. This is, of course, how new standards
come about.
Monochrome
Monochrome monitors are very basic displays that produce only one color. The basic
text mode in DOS is 80 characters across and 25 down. When graphics were first
introduced, they were fairly rough by today’s standards, and you had to manually
type in a command to change from text mode to graphics mode. A company called
Hercules Graphics developed a video adapter that could do this for you. Not only
could it change from text to graphics, but it could do it on the fly whenever the
application required it. Today’s adapters still basically use the same methods .
CGA/EGA
The Color Graphics Adapter (CGA) introduced color to the personal computer. In
APA mode it can produce a resolution of 320 X 200 and has a palette of 16 colors
but can only display 4 at a time. With the introduction of the IBM Enhanced Graphics
Adapter (EGA), the proper monitor was capable of a resolution of 640 X 350 pixels
and could display 16 colors from a palette of 64.
VGA
Up until VGA, colors were produced digitally. Each electron beam could be either on
or off. There were three electron guns, one for each color, red, green and blue
(RGB). This combination could produce 8 colors. By cutting the intensity of the beam
in half, you could get 8 more colors for a total of 16. IBM came up with the idea of
developing an analog display system that could produce 64 different levels of
intensity. Their new Video Graphics Array adapter was capable of a resolution of 640
X 480 pixels and could display up to 256 colors from a palette of over 260,000. This
technology soon became the standard for almost every video card and monitor being
developed.
SVGA
Once again, manufacturers began to develop video adapters that added features and
enhancements to the VGA standard. Super-VGA is based on VGA standards and
describes display systems with several different resolutions and a varied number of
colors. When SVGA first came out it could be defined as having capabilities of 800 X
600 with 256 colors or 1024 X 768 with 16 colors. However, these cards and
monitors are now capable of resolutions up to 1280 X 1024 with a palette of more
than 16 million colors.
XGA
Extended Graphics Array was developed by IBM. It improved upon the VGA standard
(also developed by IBM) but was a proprietary adapter for use in Micro Channel
Architecture expansion slots. It had its own coprocessor and bus-mastering ability,
which means that it had the ability to execute instructions independent of the CPU. It
was also a 32-bit adapter capable of increased data transfer speeds. XGA allowed
for better performance, could provide higher resolution and more colors than the
VGA and SVGA cards at the time. However, it was only available for IBM machines.
Many of these features were later incorporated by other video card manufacturers.
Video Adapter
A board that plugs into a personal computer to give it display capabilities. The display
capabilities of a computer, however, depend on both the logical circuitry (provided in
the video adapter) and the display monitor. A monochrome monitor, for example,
cannot display colors no matter how powerful the video adapter. Many different types
of video adapters are available for PCs. Most conform to one of the video standards
defined by IBM or VESA.
Each adapter offers several different video modes. The two basic categories of video
modes are text and graphics. In text mode, a monitor can display only ASCII
characters. In graphics mode, a monitor can display any bit-mapped image. Within
the text and graphics modes, some monitors also offer a choice of resolutions. At
lower resolutions a monitor can display more colors.
Modern video adapters contain memory, so that the computer's RAM is not used for
storing displays. In addition, most adapters have their own graphics coprocessor for
performing graphics calculations. These adapters are often called graphics
accelerators.
Like most parts of the PC, the video card had very humble beginnings--it was only
responsible for taking what the processor produced as output and displaying it on the
screen. Early on, this was simply text, and not even color at that. Video cards today
are much more like coprocessors; they have their own intelligence and do a lot of
processing that would otherwise have to be done by the system processor. This is a
necessity due to the enormous increase both in how much data we send to our
monitors today, and the sophisticated calculations that must be done to determine
what we see on the screen. This is particularly so with the rise of graphical operating
systems, and 3D computing.
The video card in your system plays a significant role in the following important
aspects of your computer system:
• Performance: The video card is one of the components that has an impact
on system performance. For some people (and some applications) the impact
is not that significant; for others, the video card's quality and efficiency can
impact on performance more than any other component in the PC! For
example, many games that depend on a high frame rate (how many times per
second the screen is updated with new information) for smooth animation, are
impacted far more by the choice of video card than even by the choice of
system CPU.
• Software Support: Certain programs require support from the video card.
The software that normally depends on the video card the most includes
games and graphics programs. Some programs (for example 3D-enhanced
games) will not run at all on a video card that doesn't support them.
• Comfort and Ergonomics: The video card, along with the monitor,
determines the quality of the image you see when you use your PC. This has
an important impact on how comfortable the PC is to use. Poor quality video
cards don't allow for sufficiently high refresh rates, causing eyestrain and
fatigue.
This section discusses the video card and its characteristics in detail, including its
components, performance factors, video modes and resolution, and multimedia. I
also discuss different memory technologies used in video cards today.
The first mainstream video card to support color graphics on the PC was IBM's Color
Graphics Adapter (CGA) standard. The CGA supports several different modes; the
highest quality text mode is 80x25 characters in 16 colors. Graphics modes range
from monochrome at 640x200 (which is worse than the Hercules card) to 16 colors at
160x200. The card refreshes at 60 Hz.
Note that the maximum resolution of CGA is actually significantly lower than MDA:
640x200. These dots are accessible individually when in a graphics mode but in text
each character was formed from a matrix that is 8x8, instead of the MDA's 9x14,
resulting in much poorer text quality. CGA is obsolete, having been replaced by EGA.
One weakness of the original MDA display was that it did not support graphics of any
kind. A company named Hercules created in the early 80s an MDA-compatible video
card that supported monochrome graphics in addition to the standard text modes.
The Hercules card was actually a very widely-accepted standard in the mid-80s;
eventually Hercules clones even appeared on the market. Support for the card was
included in popular software packages such as Lotus 1-2-3 to allow the display of
graphs and charts on the computer screen. It has of course been replaced by later,
color, graphics adapters.
IBM's next standard after CGA was the Enhanced Graphics Adapter or EGA. This
standard offered improved resolutions and more colors than CGA, although the
capabilities of EGA are still quite poor compared to modern devices. EGA allowed
graphical output up to 16 colors (chosen from a palette of 64) at screen resolutions of
640x350, or 80x25 text with 16 colors, all at a refresh rate of 60 Hz.
You will occasionally run into older systems that still use EGA; EGA-level graphics
are the minimum requirement for Windows 3.x and so some very old systems still
using Windows 3.0 may be EGA. There is of course no reason to stick with EGA
when it is obsolete and VGA cards are so cheap and provide much more
performance and software compatibility.
The replacement for EGA was IBM's last widely-accepted standard: the Video
Graphics Array or VGA. VGA, supersets of VGA, and extensions of VGA form today
the basis of virtually every video card used in PCs. Introduced in the IBM PS/2 model
line, VGA was eventually cloned and copied by many other manufacturers. When
IBM fell from dominance in the market, VGA continued on and was eventually
extended and adapted in many different ways.
Most video cards today support resolutions and color modes far beyond what VGA
really is, but they also support the original VGA modes, for compatibility. Most call
themselves "VGA compatible" for this reason. Many people don't realize just how
limited true VGA really is; VGA is actually pretty much obsolete itself by today's
standards, and 99% of people using any variant of Windows are using resolution that
exceeds the VGA standards. True VGA supports 16 colors at 640x480 resolution, or
256 colors at 320x200 resolution (and not 256 colors at 640x480, even though many
people think it does). VGA colors are chosen from a palette of 262,144 colors (not
16.7 million) because VGA uses 6 bits to specify each color, instead of the 8 that is
the standard today.
VGA (and VGA compatibility) is significant in one other way as well: they use output
signals that are totally different than those used by older standards. Older displays
sent digital signals to the monitor, while VGA (and later) send analog signals. This
change was necessary to allow for more color precision. Older monitors that work
with EGA and earlier cards use so-called "TTL" (transistor-transistor logic) signaling
and will not work with VGA. Some monitors that were produced in the late 80s
actually have a toggle switch to allow the selection of either digital or analog inputs.
VGA was the last well-defined and universally accepted standard for video. After IBM
faded from leading the PC world many companies came into the market and created
new cards with more resolution and color depths than standard VGA (but almost
always, backwards compatible with VGA).
Most video cards (and monitors for that matter) today advertise themselves as being
Super VGA (SVGA). What does a card saying it is SVGA really mean? Unfortunately,
it doesn't mean much of anything. SVGA refers collectively to any and all of a host of
resolutions, color modes and poorly-accepted pseudo-standards that have been
created to expand on the capabilities of VGA. Therefore, knowing that a card that
supports "Super VGA" really tells you nothing at all. In the current world of multiple
video standards you have to find out specifically what resolutions, color depths and
refresh rates each card supports. You must also make sure that the monitor you are
using supports the modes your video card produces; here too "Super VGA
compatible" on the monitor doesn't help you.
To make matters more confusing, another term is sometimes used: Ultra VGA or
UVGA. Like SVGA, this term really means nothing also. :^) Some people like to refer
to VGA as 640x480 resolution, SVGA as 800x600, and UVGA as 1024x768. This is
overly simplistic however, and really is not something that you can rely upon.
The proliferation of video chipsets and standards has created the reliance on
software drivers that PC users have come to know so well. While Microsoft Windows,
for example, has a generic VGA driver that will work with almost every video card out
there, using the higher resolution capabilities of your video card requires a specific
driver written to work with your card. (The VESA standards have changed this
somewhat, but not entirely).
IBM did create several new video standards after VGA that expanded on its
capabilities. Compared to VGA, these have received very limited acceptance in the
market, mainly because they were implemented on cards that used IBM's proprietary
Micro Channel Architecture (which received no acceptance in the market). You may
hear these acronyms bandied about from time to time:
8514/A: This standard was actually introduced at the same time as standard VGA,
and provides both higher resolution/color modes and limited hardware acceleration
capabilities as well. By modern standards 8514/A is still rather primitive: it supports
1024x768 graphics in 256 colors but only at 43.5 Hz (interlaced), or 640x480 at 60
Hz (non-interlaced).
XGA: This acronym stands for Extended Graphics Array. XGA cards were used in
later PS/2 models; they can do bus mastering on the MCA bus and use either 512
KB or 1 MB of VRAM. In the 1 MB configuration XGA supports 1,024x768 graphics in
256 colors, or 640x480 at high color (16 bits per pixel).
XGA-2: This graphics mode improves on XGA by extending 1,024x768 support to
high color, and also supporting higher refresh rates than XGA or 8514/A.
Keyboard
The set of typewriter-like keys that enables you to enter data into a computer.
Computer keyboards are similar to electric-typewriter keyboards but contain
additional keys. The keys on computer keyboards are often classified as follows:
In addition to these keys, IBM keyboards contain the following keys: Page Up, Page
Down, Home, End, Insert, Pause, Num Lock, Scroll Lock, Break, Caps Lock, Print
Screen.
There are several different types of keyboards for the Apple Macintosh. All of them
are called ADB keyboards because they connect to the Apple Desktop bus (ADB).
The two main varieties of Macintosh keyboards are the standard keyboard and the
extended keyboard, which has 15 additional special-function keys.
Mouse
A device that controls the movement of the cursor or pointer on a display screen. A
mouse is a small object you can roll along a hard, flat surface. Its name is derived
from its shape, which looks a bit like a mouse, its connecting wire that one can
imagine to be the mouse's tail, and the fact that one must make it scurry along a
surface. As you move the mouse, the pointer on the display screen moves in the
same direction. Mice contain at least one button and sometimes as many as three,
which have different functions depending on what program is running. Some newer
mice also include a scroll wheel for scrolling through long documents.
1. mechanical: Has a rubber or metal ball on its underside that can roll in all
directions. Mechanical sensors within the mouse detect the direction the ball
is rolling and move the screen pointer accordingly.
3. optical: Uses a laser to detect the mouse's movement. You must move the
mouse along a special mat with a grid so that the optical mechanism has a
frame of reference. Optical mice have no mechanical moving parts. They
respond more quickly and precisely than mechanical and optomechanical
mice, but they are also more expensive.
1. Serial mice connect directly to an RS-232C serial port or a PS/2 port. This is
the simplest type of connection.
2. PS/2 mice connect to a PS/2 port.
3. USB mice.
Cordless mice aren't physically connected at all. Instead they rely on infrared or radio
waves to communicate with the computer. Cordless mice are more expensive than
both serial and bus mice, but they do eliminate the cord, which can sometimes get in
the way
Computer case
PC Power Supplies
The power supply converts electricity received from a wall outlet(120V AC in the
U.S.A.) into DC current amounts that are needed by the various components of the
system. There are 2 different types of power supplies that correspond to 2 different
types of motherboards, and hence, case designs.
AT - This is an older design in which the connector to the system board uses 2 6-
pin(P8/P9) connections. It is important that the 2 connectors are plugged into the
system board correctly and not switched. P8 should be plugged into P1 on the
system board and P9 should be connected to P2.
ATX - A newer specification that uses a single 20 pin connection to the system
board. These connectors are keyed to make sure that the connector is plugged in
properly.
Both models provide 4 levels of DC voltage. ATX power supplies add an additional
voltage of +3.3V. The wires coming out of the power supply are color coded with the
black one as the ground wire.
• Yellow: +12
• Blue: -12
• Red: +5
• White: -5
• Circuitry: +/- 5 volts
• Motor: +/- 12 volts
Laptops and portables utilize an external power supply and rechargeable battery
system. Batteries were typically nickel-cadmium, but newer technologies have
introduced nickel metal-hydride and lithium-ion batteries that provide extended life
and shorter recharge times. Lithium batteries are also used to power a computer's
CMOS ROM.
Installation/Removal
To remove a power supply from a PC, follow these steps:
Motherboard
On most PCs, it is possible to add memory chips directly to the motherboard. You
may also be able to upgrade to a faster PC by replacing the CPU chip. To add
additional core features, you may need to replace the motherboard entirely.
Sound Card
An expansion board that enables a computer to manipulate and output sounds.
Sound cards are necessary for nearly all CD-ROMs and have become commonplace
on modern personal computers. Sound cards enable the computer to output sound
through speakers connected to the board, to record sound input from a microphone
connected to the computer, and manipulate sound stored on a disk.
Nearly all sound cards support MIDI, a standard for representing music electronically.
In addition, most sound cards are Sound Blaster-compatible, which means that they
can process commands written for a Sound Blaster card, the de facto standard for
PC sound.
Sound cards use two basic methods to translate digital data into analog sounds:
Video adapter
A board that plugs into a personal computer to give it display capabilities. The display
capabilities of a computer, however, depend on both the logical circuitry (provided in
the video adapter) and the display monitor. A monochrome monitor, for example,
cannot display colors no matter how powerful the video adapter.
Many different types of video adapters are available for PCs. Most conform to one of
the video standards defined by IBM or VESA.
Each adapter offers several different video modes. The two basic categories of video
modes are text and graphics. In text mode, a monitor can display only ASCII
characters. In graphics mode, a monitor can display any bit-mapped image. Within
the text and graphics modes, some monitors also offer a choice of resolutions. At
lower resolutions a monitor can display more colors.
Modern video adapters contain memory, so that the computer's RAM is not used for
storing displays. In addition, most adapters have their own graphics coprocessor for
performing graphics calculations. These adapters are often called graphics
accelerators.
The hard disk drive in your system is the "data center" of the PC. It is here that all of
your programs and data are stored between the occasions that you use the
computer. Your hard disk (or disks) are the most important of the various types of
permanent storage used in PCs (the others being floppy disks and other storage
media such as CD-ROMs, tapes, removable drives, etc.) The hard disk differs from
the others primarily in three ways: size (usually larger), speed (usually faster) and
permanence (usually fixed in the PC and not removable).
Your hard disk plays a significant role in the following important aspects of your
computer system:
• Performance: The hard disk plays a very important role in overall system
performance, probably more than most people recognize (though that is
changing now as hard drives get more of the attention they deserve). The
speed at which the PC boots up and programs load is directly related to hard
disk speed. The hard disk's performance is also critical when multitasking is
being used or when processing large amounts of data such as graphics work,
editing sound and video, or working with databases.
• Storage Capacity: This is kind of obvious, but a bigger hard disk lets you
store more programs and data.
• Software Support: Newer software needs more space and faster hard disks
to load it efficiently. It's easy to remember when 1 GB was a lot of disk space;
heck, it's even easy to remember when 100 MB was a lot of disk space! Now
a PC with even 1 GB is considered by many to be "crippled", since it can
barely hold modern (inflated) operating system files and a complement of
standard business software.
• Reliability: One way to assess the importance of an item of hardware is to
consider how much grief is caused if it fails. By this standard, the hard disk is
the most important component by a long shot. As I often say, hardware can
be replaced, but data cannot. A good quality hard disk, combined with smart
maintenance and backup habits, can help ensure that the nightmare of data
loss doesn't become part of your life.
This chapter takes a very detailed look at hard disks and how they work. This
includes a full dissection of the internal components in the drive, a look at how data is
formatted and stored, a discussion of performance issues, and a full analysis of the
two main interfaces used to connect hard disks to the rest of the PC. A discussion is
also included about the many confusing issues regarding hard disks and BIOS
versions, and support for the newer and larger hard disks currently on the market.
Finally, a full description is given of logical hard disk structures and the functioning of
the FAT and NTFS file systems, by far the most popular currently used by PCs.
All information stored on a hard disk is recorded in tracks, which are concentric
circles placed on the surface of each platter, much like the annual rings of a tree. The
tracks are numbered, starting from zero, starting at the outside of the platter and
increasing as you go in. A modern hard disk has tens of thousands of tracks on each
platter.
Data is accessed by moving the heads from the inner to the outer part of the disk,
driven by the head actuator. This organization of data allows for easy access to any
part of the disk, which is why disks are called random access storage devices.
Each track can hold many thousands of bytes of data. It would be wasteful to make a
track the smallest unit of storage on the disk, since this would mean small files
wasted a large amount of space. Therefore, each track is broken into smaller units
called sectors. Each sector holds 512 bytes of user data, plus as many as a few
dozen additional bytes used for internal drive control and for error detection and
correction.
Primary Memory
The main memory stores the program instructions and the data in binary machine
code. The Control Unit deals with the instructions and the arithmetic and logic unit
handles calculations and comparisons with the data. Data and instructions are
moved by buses. There are two types of memory in the Immediate Access Store of
the computer, RAM and ROM:
RAM is Random Access Memory which loses its contents when the computer is
switched off (it is volatile). This memory can be written to, instructions and data can
be loaded into it.
When the programs and data files (known as the software) are not in RAM, they are
stored on backing store such as tapes or discs. The tape or disc drives and any input
and output devices connected to the CPU are known collectively as peripherals.
Floppy disk
A soft magnetic disk. It is called floppy because it flops if you wave it (at least, the
5¼-inch variety does). Unlike most hard disks, floppy disks (often called floppies or
diskettes) are portable, because you can remove them from a disk drive. Disk drives
for floppy disks are called floppy drives. Floppy disks are slower to access than hard
disks and have less storage capacity, but they are much less expensive. And most
importantly, they are portable.
• 8-inch: The first floppy disk design, invented by IBM in the late 1960s
and used in the early 1970s as first a read-only format and then as a
read-write format. The typical desktop/laptop computer does not use
the 8-inch floppy disk.
• 5¼-inch: The common size for PCs made before 1987 and the
predecessor to the 8-inch floppy disk. This type of floppy is generally
capable of storing between 100K and 1.2MB (megabytes) of data. The
most common sizes are 360K and 1.2MB
Floppy drives
While floppy drives still have a useful role in the modern PC, there is no denying their
reduced importance. Very little attention is paid to floppy "performance" any more,
and even choosing makes or models involves a small fraction of the amount of care
and attention required for selecting other components. In essence, the floppy drive
today is a commodity item! For this reason, I examine the floppy drive in this chapter
but do not go into a great level of detail. In addition, since many aspects of floppy
disk construction and logical operation are similar to those of hard disks, and since I
did describe hard disks in a great level of detail, I make frequent references back to
relevant sections in the chapter on hard disks
Developed by IDM Interactive Training Division for 44
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
CD-ROM
A type of optical disk capable of storing large amounts of data -- up to 1GB, although
the most common size is 650MB (megabytes). A single CD-ROM has the storage
capacity of 700 floppy disks, enough memory to store about 300,000 text pages.
CD-ROMs are stamped by the vendor, and once stamped, they cannot be erased
and filled with new data. To read a CD, you need a CD-ROM player. All CD-ROMs
conform to a standard size and format, so you can load any type of CD-ROM into any
CD-ROM player. In addition, CD-ROM players are capable of playing audio CDs,
which share the same technology.
CPU
On large machines, CPUs require one or more printed circuit boards. On personal
computers and small workstations, the CPU is housed in a single chip called a
microprocessor.
• The arithmetic logic unit (ALU), which performs arithmetic and logical
operations.
• The control unit, which extracts instructions from memory and decodes and
executes them, calling on the ALU when necessary
Printers
A device that prints text or illustrations on paper. There are many different types of
printers. In terms of the technology utilized, printers fall into the following categories:
• dot-matrix: Creates characters by striking pins against an ink ribbon. Each pin
makes a dot, and combinations of dots form characters and illustrations.
• ink-jet: Sprays ink at a sheet of paper. Ink-jet printers produce high-quality text
and graphics.
• laser: Uses the same technology as copy machines. Laser printers produce very
high quality text and graphics.
• LCD & LED : Similar to a laser printer, but uses liquid crystals or light-emitting
diodes rather than a laser to produce an image on the drum.
• line printer: Contains a chain of characters or pins that print an entire line at one
time. Line printers are very fast, but produce low-quality print.
• thermal printer: An inexpensive printer that works by pushing heated pins
against heat-sensitive paper. Thermal printers are widely used in calculators and
fax machines.
• quality of type: The output produced by printers is said to be either letter quality
(as good as a typewriter), near letter quality, or draft quality. Only daisy-wheel,
ink-jet, and laser printers produce letter-quality type. Some dot-matrix printers
claim letter-quality print, but if you look closely, you can see the difference.
• speed: Measured in characters per second (cps) or pages per minute (ppm), the
speed of printers varies widely. Daisy-wheel printers tend to be the slowest,
printing about 30 cps. Line printers are fastest (up to 3,000 lines per minute). Dot-
matrix printers can print up to 500 cps, and laser printers range from about 4 to 20 text
pages per minute.
• impact or non-impact: Impact printers include all printers that work by striking
an ink ribbon. Daisy-wheel, dot-matrix, and line printers are impact printers. Non-
impact printers include laser printers and ink-jet printers. The important difference
between impact and non-impact printers is that impact printers are much noisier.
• graphics: Some printers (daisy-wheel and line printers) can print only text. Other
printers can print both text and graphics.
• fonts : Some printers, notably dot-matrix printers, are limited to one or a few
fonts. In contrast, laser and ink-jet printers are capable of printing an almost
unlimited variety of fonts. Daisy-wheel printers can also print different fonts, but
you need to change the daisy wheel, making it difficult to mix fonts in the same
document.
Bus Designs
A computer bus is a method of transmitting data from one part of the computer to
another part of the computer. Generally the computer bus will connect all devices to
the computer CPU and main memory. The computer bus consists of two parts the
address bus and a data bus. The data bus transfers actual data whereas the address
bus transfers information about where the data should go.
Found on this page you will be able to read about the various types of computer
buses found on computers in the past and in the future.
ISA
Introduced by IBM, ISA or Industry Standard Architecture was originally an 8-bit bus
and later expanded to a 16-bit bus in 1984. When this bus was originally released it
was a proprietary bus, which allowed only IBM to create peripherals and the actual
interface. Later however in the early 1980's the bus was being created by other clone
manufacturers.
In 1993, Intel and Microsoft introduced a PnP ISA bus that allowed the computer to
automatically detect and setup computer ISA peripherals such as a modem or sound
card. Using the PnP technology an end-user would have the capability of connecting
a device and not having to configure the device using jumpers or dipswitches.
To determine if an ISA card is an 8-bit or 16-bit card physically look at the card. You
will notice that the first portion of the slot closest to the back of the card is used if the
card is an 8-bit card. However, if both sections of the card are being utilized the card
is a 16-bit card.
Today many manufacturers are trying to eliminate the usage of the ISA slot however
for backwards compatibility you may find 1 or 2 ISA slots with additional PCI slots,
AGP slots, etc. However, you may also not have any ISA slots. We highly
recommend when purchasing any new internal expansion card that you stay away
from ISA as it has for the most part disappeared.
MCA
Short for Micro Channel Architecture, MCA was introduced by IBM in 1987, MCA or
the Micro Channel bus was a competition for ISA BUS. The MCA bus offered several
additional features over the ISA such as a 32-bit bus, automatically configure cards
(similar to what Plug and Play is today), and bus mastering for greater efficiency.
One of the major downfalls of the MCA bus was it being a proprietary BUS and
because of competing BUS designs the MCA BUS never became widely used and
has since been phased out of the desktop computers.
EISA
Short for Extended Industry Standard Architecture, EISA was announced September
of 1988. EISA is a computer bus designed by 9 competitors to compete with IBM's
MCA BUS. These competitors were AST Research, Compaq, Epson, Hewlett
Packard, NEC, Olivetti, Tandy, WYSE, and Zenith Data Systems.
The EISA Bus provided 32-bit slots at an 8.33 MHz cycle rate for the use with
386DX, or higher processors. In addition the EISA can accommodate a 16-bit ISA
card in the first row.
Unfortunately, while the EISA bus is backwards compatible and is not a proprietary
bus the EISA bus never became widely used and is no longer found in computers
today.
VLB
The VESA (Video Electronics Standards Association) a nonprofit organization
founded by NEC, released the VLB or VESA Local Bus 1.0 in 1992. The VLB is a 32-
bit bus that and had direct access to the system memory at the speed of the
processor, commonly the 486 CPU (33 / 40 MHz). VLB 2.0 was later released in
1994 and had a 64-bit bus and a bus speed of 50 MHz. Unfortunately, because the
VLB heavily relied on the 486 processor when the Pentium Processor arose in the
Market place manufacturers began switching to PCI.
PCI
Introduced by Intel in 1992, revised in 1993 to version 2.0, and later revised in 1995
to PCI 2.1. PCI is short for Peripheral Component Interconnect and is a 32-bit
computer bus that is also available as a 64-bit bus today.
The PCI bus is the most found and commonly used bus on computers today for
computer expansion cards.
AGP
Introduced by Intel in 1997, AGP or Advanced Graphic Port is a 32-bit bus designed
for the high demands of 3-D graphics. AGP has a direct line to the computers
memory which allows 3-D elements to be stored in the system memory instead of the
video memory.
For AGP to work in a computer must have the AGP slot which comes with most
Pentium II and Pentium III machines. The computer also needs to be running
Windows 95 OSR2.1, Windows 98, Windows 98 SE, Windows 2000, Windows ME or
higher.
USB
USB or Universal Serial Bus is an external bus that supports transfer rates of 12
Mbps, can support 127 devices and supports hot plugging. Additional information on
USB can be found on our USB page.
MINI PCI
Mini PCI is a new standard which measures at 2.75-inch x 1.81-inch x 0.22-inch is a
new standard developed by leading notebook manufactures. This technology could
allow manufactures to lower their price as the motherboards would be simpler to
design.
Type I - Identical to Type II, except requires extra cables for connectors like the RJ-
11 and RJ-45. However, offers more flexibility to where it can be placed in the
computer.
Type II - Used when size is not important. Type II is able to integrate the RJ-11 and
RJ-45 connectors and due away with extra cables.
Type III - SO-DIMM style connector that can be installed with a mere 5 mm overall
height above the system board. In addition cabling to the I/O connectors allow Type
III cards to be placed anywhere in the system.
PCI-X
PCI-X is a high performance bus that is designed to meet the increased I/O demands
of technologies such as Fibre Channel, Gigabit Ethernet and Ultra3 SCSI. PCI-X
capabilities include:
Up to 133 MHz bus speed
64-Bit bandwidth
1GB/sec throughput
More efficient bus operation for easier interface.
Split Transactions allows an indicator device to make only one data request and
relinquish the bus. Instead of constantly needing to poll the bus for a response.
Byte Count that enables indicator to specify in advance the specific number of bytes
requested, eliminating the inefficiency of speculative prefetches.
Backwards compatibility
AMR
Released September 8, 1998, AMR is short for Audio/Modem Riser. AMR allows an
OEM to create one card that has the functionality of either Modem or Audio or both
Audio and Modem on one card. This new specification allows for the motherboard to
be manufactured at a lower cost and free up industry standard expansion slots in the
system for other additional plug-in peripherals.
CNR
Introduced by Intel February 7, 2000, CNR is short for Communication and Network
Riser and is a specification that supports audio, modem USB and Local Area
Networking interfaces of core logic chipsets.
Developed by IDM Interactive Training Division for 49
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
Computer Maintenance
& Troubleshooting
Practice Labs
211
Developed by
Interactive Training Division
IDM Computer Studies (Pvt) Ltd.
http://www.idm.edu
PRACTICE LAB1
OS
The notion of a process is the abstraction that matches a user's belief to have the
processor exclusively. To an OS a process is some data that can be manipulated.
Since the OS also has to use the processor, this view is the OS's when no other
process is executing. One important aspect of a process is its state in an OS's
representation.
Memory Management
When a user executes a program, the operating system creates an address space
for it to run in. This address space will include the instructions for the program itself,
as well as any data it requires. In a system with memory protection, each process is
restricted by the operating system to accessing only the memory in its own address
space. However, the combined program memory requirements often exceed the
system's amount of physical memory (RAM) installed on a computer. So, modern
operating system’s use a portion of the hard disk called a swap file to extend the
amount of available memory. This technique, called virtual memory, treats physical
memory as a cache of the most recently used data. In a virtual memory system,
memory is divided into units called pages (a page is typically 4-8Kb in size). The set
of addresses that identify locations in virtual memory is called the virtual address
space. Each process is allocated a virtual address space. The virtual address space
can range from 0-4GB on a 32-bit architecture.
A process's address space contains the set of instructions and data that is mapped
into virtual memory when a program is executed. Virtual memory addresses are
translated into physical memory addresses through the use of a look-up table, called
a page table. In addition to mapping the entire process into virtual memory, a subset
of pages is also mapped into physical memory. As each instruction in the process
executes, it is either found in physical memory or is not found (called a page fault).
When a page fault occurs, the page that is needed must be moved from the hard disk
into physical memory before the instruction can be executed. To make room for the
new page, the operating system may need to decide which page to move out of
physical memory. This is called swapping. A page fault is time-consuming because
retrieving data from the hard disk is orders of magnitude slower than obtaining it
directly from the physical memory. Operating systems attempt to minimize the
number of page faults by swapping multiple pages at once. This becomes a trade-off
between operating system overhead and the time saved by minimizing page faults,
which is affected by the size of each process's working set.
The operating system takes care of swapping and translating from virtual address
space to physical address space. This means that the developer has a flat address
space at his disposal. With a virtual memory scheme, the amount of memory
available to a developer is seemingly limited only by the amount of hard drive space.
In essence, virtual memory has much more memory available than physical memory
alone because it removes the restriction that an entire process must be loaded into
memory at one time.
1. On UNIX
2. On Linux
3. In Windows(9x,NT,2000,XP)
The operating system is the large, relatively complex, low-level piece of software that
interfaces your hardware to the software applications you want to run. The operating
system you use is closely related to the file system that manages your hard disk
data. The reason is a simple one: different operating systems use different file
systems. Some are designed specifically to work with more than one, for
compatibility reasons; others work only with their own file system.
Hard drives can fail for many reasons and you may be a candidate for hard drive
recovery if you hear clicking, clunking, whirring, or ticking noises coming from your
drive and or absolutely no noise at all. Drives often have read/write head failures
causing that sound and if you hear it shut your system down right away and contact
us for more information. In the interim, do not attempt to restart or power up the drive
again as the read/write heads may touch the sensitive platters (where the data is
stored) inside the drive and cause irreparable damage.
You may also have a failed or failing hard drive if you get a blue screen, see error
codes of "No Operating System Found", "Hard drive not found", "Head select error",
"Drive read failure", "Drive write failure", "Bad track error", "Bad sector error" are
some of the most common but there are many others.
• List the utilities that you can recover the data in this kind of situations.
• What are the fault tolerance methods con be used to protect your data?
PRACTICE LAB 2
Pre-installation Planning
This sounds like a no-brainer, but it happens all the time. Sure, you can squeak
Windows 2000 on a system that has less than the minimum hardware requirements,
but you won't be happy with the performance. You'll want at least a Pentium 133 with
64Mb of RAM and 1GB of free disk space for Windows 2000 Professional. For
Windows 2000 Server and Advanced Server you'll want 256Mb of RAM. Remember:
Windows 2000 was built for tomorrow's hardware, not todays. If you can afford it,
you'll be much happier if you upgrade to a new workstation or server with a 500 MHz
processor and the entire RAM you can afford.
Document your Hardware and see if an updated Windows 2000 driver exists.
If you don't already know every inch of your workstation or server, it's much easier to
figure out your exact hardware configuration when Windows NT/95/98 is still
installed. Do this first, and download the new Windows 2000 drivers before you start
your installation. At the very least, download your SCSI, Video, Network Interface
Card, and Modem drivers so you'll be able to get the rest later.
Many people skip this step and just proceed anyway, but you could be making a big
mistake. Windows NT and Windows 2000 are a lot less flexible when it comes to
hardware than Windows 95/98. The HCL exists for a reason. Check it first.
When upgrading your Operating System, you have a few choices to make and some
pre-configuration to do. First off, try to choose which file system you'll want installed.
Microsoft recommends NTFS over FAT or FAT32, but that's up to you. If you choose
FAT or FAT32 initially, you can upgrade to NTFS after the installation using NT's
CONVERT utility. But you can't go back.
If you’re running NT Server, disable any mirroring during the installation. You can re-
enable it after the installation is complete.
Windows 2000 features plug and play which will attempt to discover the function of
any hardware connected to the system. If your UPS connects to your Workstation or
Server using a serial cable, disconnect it before starting your installation.
Experienced NT Admins swear by this. Give Windows 2000 its own partition of at
least 2 GB, or 4GB if you can afford it. If you install Windows 2000 on C:\, then install
your applications on D:\ with data and other file storage on subsequent drives. This
will simplify some backup strategies, give the registry and system files some
breathing room, and leaves room for Service Packs and updates. It also leaves room
for larger crash dump files, since your dump file will equal your physical memory +
1Mb.
Preventive Maintenance
Much as the name implies, preventive maintenance, often abbreviated PM, refers to
performing proactive maintenance in order to prevent system problems. This is
contrasted to diagnostic or corrective maintenance, which is performed to correct an
already-existing problem. Anyone who has ever owned or cared for a car knows all
about what preventive maintenance is. After all, you don't change your oil and air
filter in response to a problem situation (normally), you do it so that your engine will
last and you won't have car troubles down the road (no pun intended :^)).
Some types of preventive maintenance need to be performed more often than others.
The frequency of preventive maintenance depends on the nature of the activity;
some things just need to be addressed more often than others. It also depends a lot
on what your PC is being used for.
One enemy of preventive maintenance is simply remembering to do. It's one thing to
say "I will clean the read/write heads on my floppy disk every six months", and even
to mean it. But how will you remember when the six months are up? One way to
address this problem is through the use of a preventive maintenance schedule, which
will remind you of when do perform key maintenance activities on your PC.
Click on the Start button;à choose Programs,à then Accessories,à then System
Tools,à then Disk Cleanup.
You will be presented with a screen that shows you exactly which files are no longer
needed and exactly how much room they are taking up on your hard disk. Click on
what you want to delete, and Windows will remove those items when you click on
OK.
You can use the Add/Remove Programs option in the Control Panel to remove the
program. If the program you want to delete is not listed on the Add/Remove Program
screen, you will have to remove it manually. When you install a program, often files
are scattered in many different areas. Therefore the best way to remove a program is
to purchase an uninstall program such as Cleansweep by Quarterdeck. When you
purchase an uninstaller, make sure that you buy the version that is specifically written
for your operating system.
When uninstalling programs, it is always smart to first back up your hard disk. Also,
remove one program at a time. Remove a program, make sure that everything is still
working properly, then go back and delete the next program.
No matter which operating system you use, you must occasionally go through the
documents that you have created, like letters, spreadsheets, pictures, etc., to weed
out unnecessary files. Delete any file you will not need in the future. If you are
hesitant about deleting a file, you can copy it to a floppy disk, delete it from your hard
disk, and keep the floppy as an archival copy.
Many people use the term loosely to cover any sort of program that tries to hide its
(malicious) function and tries to spread onto as many computers as possible. (See
the definition of "Trojan".) Be aware that what constitutes a "program" for a virus to
infect may include a lot more than is at first obvious - don't assume too much about
what a virus can or can't do!
These software "pranks" are very serious; they are spreading faster than they are
being stopped, and even the least harmful of viruses could be fatal. For example, a
virus that stops your computer and displays a message, in the context of a hospital
life-support computer, could be fatal. Even those who created the viruses could not
stop them if they wanted to; it requires a concerted effort from computer users to be
"virus-aware", rather than the ignorance and ambivalence that have allowed them to
grow to such a problem.
PRACTICE LAB 3
Troubleshooting Tools
Microsoft Diagnostics
Software utility named msd.exe that was included with Microsoft Windows 3.x that
listed computer system information. Below is a listing of information available through
Microsoft diagnostics:
Device Manager
First introduced with the release of Microsoft Windows 95 the Windows device
manager is a program that allows a user to view hardware devices and their status.
Developed by IDM Interactive Training Division for 59
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
Device manager is available in Microsoft Windows 95, Windows 98, Windows ME,
Windows 2000 and Windows XP.
Troubleshooting Information
If there is a problem with a device, it is listed in the hardware tree. Also, the problem
device has a symbol that indicates the type of problem:
A black exclamation point (!) on a yellow field indicates the device is in a problem
state. Note that a device that is in a problem state can be functioning.
A red "X" indicates a disabled device. A disabled device is a device that is physically
present in the computer and is consuming resources, but does not have a protected-
mode driver loaded.
A blue "i" on a white field on a device resource in Computer properties indicates that
the Use automatic settings feature is not selected for the device and that the
resource was manually selected. Note that this does not indicate a problem or
disabled state.
A green question mark "?" in Device Manager means that a compatible driver for this
device is installed, indicating the possibility that all of the functionality may not be
available. Note that this applies only to Windows Millennium Edition (Me).
NOTE: Some sound cards and video adapters do not report all of the resources that
they use to Windows. This can cause Device Manager to show only one device in
conflict, or no conflicts at all. This can be verified by disabling the sound card, or by
using the standard VGA video driver to see if the conflict is resolved. Note that this is
a known problem with S3 video adapters and 16-bit Sound Blaster sound cards, or
those sound cards that are using Sound Blaster emulation for Sound Blaster
compatibility.
When you double click a specific device in Device Manager, you see a property
sheet. The property sheet has a General tab.
NOTE: Some devices may have other tabs besides the General tab. Not all property
sheets have the same tabs; some devices may have a Resources tab, Driver tab,
and Settings tab, or some combination of these.
At the top of the property sheet, there is a description of the device. When you click
the Resources tab, the window in the middle of the tab indicates which resource
types are available for the selected device.
The list box at the bottom contains a Conflicting device list. This list indicates a
conflict with an error code.
NOTE: To disable a device in Device Manager, right-click the device, and then click
Disable.
Let the Add New Hardware Wizard resolve your device problems
If you are having problems with a particular device after installing Windows 98 or
other software, try removing it and then let Windows 98 reinstall the device.
Here's how to do it:
1. On the Start menu, point to Settings, point to Control Panel, and then
double-click the System icon.
2. Click the Device Manager tab.
(The problem category should automatically open and a symbol should
indicate which device is faulty. If it's not working properly, there will be a
yellow circle with a black exclamation point inside it; if it's not working at all,
there will be a red X.
3. Click once on the problem item to highlight it, and then click Remove.
4. During start up, Windows 98 should detect as missing the device you just
removed and automatically run the Add New Hardware Wizard. If you recently
downloaded new drivers from any of your hardware manufacturers’ sites, or
from Windows Update, be sure to use the wizard's Have Disk option to
ensure that Windows 98 installs the new drivers and not any old ones.
5. Hint: When you download new drivers from hardware manufacturers or
Windows Update, copy them to a floppy disk and label them. This way, if you
ever need to re-install them, and don't have access to the Internet, they are
right where you need them.
Add/Remove Programs
This control panel is the appropriate place to uninstall programs that did not come
with their own uninstaller. Simply deleting files or folders is not a good way to remove
an unwanted program. This control panel also allows you to control which Windows
Components are installed - you can free up resources by removing unnecessary
components .
Note
• To open a Control Panel item, click Start, point to Settings, click Control
Panel, and then double-click the appropriate icon.
• When using Add/Remove Programs, you can install only programs that
were written for Windows operating systems.
• When you open a program, or try to perform a task within a program, you
may see a dialog box indicating that the program is being installed or
updated by Windows Installer. This can occur if your administrator has set
up the program to install this way, if program files have been deleted or
corrupted, or if you are trying to use a program feature that was not
installed during setup. If the program was installed from a CD-ROM, or if
you are no longer connected to the network, Windows Installer may ask
you for the CD-ROM. When Windows Installer finishes, the program or
feature you are trying to use starts
Caution
Note
• To open a Control Panel item, click Start, point to Settings, click Control
Panel, and then double-click the appropriate icon.
• When using Add/Remove Programs, you can remove only programs that
were written for Windows operating systems. For other programs, check
the documentation to see if other files (such as .ini files) should be
removed.
• When you open a program, or try to perform a task within a program, you
may see a dialog box indicating that the program is being installed or
updated by Windows Installer. This can occur if your administrator has set
up the program to install this way, if program files have been deleted or
corrupted, or if you are trying to use a program feature that was not
installed during setup. If the program was installed from a CD-ROM, or if
you are no longer connected to the network, Windows Installer may ask
you for the CD-ROM. When Windows Installer finishes, the program or
feature you are trying to use starts.
Developed by IDM Interactive Training Division for 63
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
Note
Display
This control panel allows you to control the appearance of your computer. You can
change your background wallpaper and screen saver, select the display resolution
and change the color scheme.
Modems
Also called Phone and Modem Options. Here, you can configure your modem
settings and dialing options (including configuring for long distance or calling card
dialing).
Network
Also called Network Connections. This control panel allows you to configure your
network settings. Please see the section on Networking for Princeton-specific
configuration information.
1. Open the Control Panel (click on Start --> Settings) and double-click on the
Network icon.
2. You need to run Add/Remove Programs and Windows Setup, which are both
available in the Control Panel window, to install network support.
3. Click on the Add button and double-click on Adapter.
4. Select your Ethernet adapter manufacturer and type from the list. If you wish
to use a network adapter that is not listed, contact the manufacturer for a
Windows compliant driver.
5. The Network Control Panel will display several protocols and clients, such as
Client for Microsoft Networks, Client for NetWare Networks, IPX/SPX-
compatible Protocol, and NetBEUI.
1. Click on the Add button from the Network Control Panel again to add a new
Protocol.
2. Select Manufacturer Microsoft and Network Protocol TCP/IP.
3. Click OK to close the Network Control Panel.
4. Unless you did a full installation of Windows, you will be prompted for the
Windows installation disks. In some cases, the installation will require the
Windows disks even if you did a full installation. Be sure to use the
appropriate version of the Windows CD. New hard disks may come with the
"B" version (OSR2) of Windows 95 or with Windows 98. Mixing versions can
render the PC unbootable.
5. When the installation program finishes copying the files, restart your PC
1. Open the Control Panel (click on Start -> Settings) and double-click on the
Network icon.
2. In the Network dialog box, click the Configuration tab if it isn't already
selected.
3. In the list of network components installed, select the entry for the TCP/IP
protocol and your network adapter Then, click the Properties button.
4. Click on the IP Address tab (if it isn't already selected) and verify that the
default Obtain an IP address automatically is selected.
5. Click on the DNS Configuration tab and enter the following information:
1. Click on the Enable DNS option button.
2. In the Host field, enter the host name for your PC which you received
during registration
3. In the Domain field, enter: dur.ac.uk (For this contact your network
Administrator)
4. In the DNS Server Search Order field, enter the following IP
addresses, clicking the Add button after entering each one:
203.115.0.19 and 203.115.0.1(For this contact your network
Administrator)
5. In the Domain Suffix Search Order, enter: dur.ac.uk (For this contact
your network Administrator)
Users
Also called User Accounts. This control panel is used for creating and modifying local
user accounts, setting and changing passwords.
1. Login as Administrator.
2. Select Start/Programs/Administrative Tools/Computer Management.
3. From the Computer Management snap-in open the System Tools/Local
Users and Groups node. Right-click on the Users node and select New
User…. The New User dialog box should appear.
4. Enter your username (first initial lastname, e.g. dglazer), full name and
password/confirm password.
5. Uncheck the default selection of “User must change password at next logon”.
6. Press Create button.
7. Press Close to exit the window. The new user now appears in the right pane
of the Computer Management snap-in.
Power Management
Also called Power Options. In this control panel are the options for power saving
features (which are especially important on a laptop). You can have your computer
go into "sleep" or "hibernate" mode and shut off its monitor or hard drive, saving
power when you are away from the computer.
1. Select Start > Settings > Control Panel from the Start Menu.
2. Double click the Display icon in the Control Panel window.
3. In the Display Properties dialog, click the Screen Saver tab, then click the
Power button in the Energy saving features of monitor box.
4. Under Power Schemes, select Home/Office Desk.
Note: Some of the options shown here, such as System Standby and System
Hibernates, may not appear on your computer. If this is the case, simply skip
the steps that do not apply to you. The options available may vary depending
on your computer's capabilities.
5. Set Turn Off Monitor after 10 minutes.
6. Set Turn Off Hard Drives to Never.
7. Set System Standby to Never.
8. Set System Hibernates to Never.
9. Click OK.
System
This control panel contains the system's general information. It tells you the exact
version of your operating system as well as how much RAM the system has. It also
provides a Device Manager for viewing what hardware or virtual devices may be
causing problems (the Device Manager also allows you to update hardware drivers).
More advanced system configuration tools can be found in this control panel, though
changing them is not recommended without a full understanding of their effects.
PC Tools
List and experience third party tools for
1. Disk defragmenting
2. Disk Cleaning
3. Disk Partitioning.
4. Software and operating system deploying.
5. Operating system restoring.
6. Back up
FDISK is often the tool of choice for ex-DOS users when managing drive partitions.
This tool works great as long as you are working with all primary partitions or only
FAT, FAT32, and OS/2's HPFS. FDISK is not even able to recognize NTFS-
formatted extended partitions. So, if you need to delete such a partition, you either
need to have access to a Windows NT, Windows 2000, or Windows XP OS on the
same system as the hard drive in question, and boot into the setup routines of one of
these three OSes to use the text-based partition configuration tool, or use a third
party tool. I've already mentioned Partition Magic, but there is another tool you may
want to look at: DELPART. DELPART is a DOS based tool from Windows NT 3.51;
you can find it floating around the Internet with a quick search on "delpart". This too
can delete any and all partitions on a hard drive, thus making way for easy re-
partitioning and new OS installation.
Norton Utilities
Norton Utilities is a group of programs that let you do everything from deleting items
so that they cannot be recovered to watching your system for problems. It will find
and fix problems associated with hardware or software, help you recover files you
accidentally erased, and monitor your system at all times. This series will explain to
you how to accomplish all of these tasks and more.
Experience the following Norton utilities.
Step 3: Tabs
There are six different tabs that you can set options for. The tabs are General
Settings, Startup Programs, WipeInfo Settings, System Check Scheduler, Recycle
Bin, and Norton Protection. Click the tab for the one that you want to change the
options for.
Developed by IDM Interactive Training Division for 68
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
Conducting a Checkup
Undoing Fixes
Identifying My Equipment
Anti-Virus Software
1)
• List the New features of Norton Antivirus software.
• List the system requirements of Norton Antivirus .
• Install Norton .
• Update manually downloading the definitions from the web.
• Configure Live updates.
Computer Maintenance
& Troubleshooting
Assignments
211
Developed by
Interactive Training Division
IDM Computer Studies (Pvt) Ltd.
http://www.idm.edu
ASSIGNMENT 1
Ensure that motherboard documentation and layout details are on hand while
working on the board. You should check to make sure that the board layout is the
same as the one you are working on before removing any cables or items from the
motherboard.
To remove a motherboard, first remove the mains power cable. Then remove all
external cables to board connectors. Remove all other parts obstructing clear access
to the board fixings; such as power supply, expansion cards, bus extenders and
chassis bars. Note down where each item was removed and any specific details;
such as which slot an expansion card was removed from.
Before removing any set of cables, ribbon connector or wire going to the
motherboard, note their colour, distinguishing features and their orientation with
board connectors and pins. Be sure to note where the other end of the cable, wire or
ribbon is also attached for reference. This will ensure that all connectors can be
returned to their previous location correctly.
It may be necessary to remove a processor cooling fan. Either choose to just remove
the supply to the internal power, leaving the fan in place, or determine how the fan is
attached to the processor heat conducting fitting. Often there are several screws
located in the cooling fins which you will need to remove before the fan unit can be
taken out.
Once the complete board can be viewed, note down any chip switch settings and the
configuration of jumpers. Moving the board could dislodge one or several jumpers or
switches, take your time.
Physically the board is quite strong when mounted in the computer. Depending on
the motherboard design, there will be a mix of small plastic pillars supporting the
board and a number of screws to give a firm fitting and to ensure a good electrical
connection to the chassis metalwork. By raising the motherboard from the chassis in
this way, none of the electrical contacts resulting from the soldered components can
short circuit through the chassis metalwork.
Task 1
Discuss that how EMI and ESD harmful to your computers.
Task 2
Prepare documentation about your plan.
Including:
• Prevention tools and the way you should use them.
• Justify how practical your proposals
Propose a better EMI prevention procedure that you can follow when you are
repairing a computer
Task 3
Discuss your idea what kind of EMI and ESD prevention methods that can be used
ASSIGNMENT 2
Computer Performances
You are the administrator of four Windows 2000 Server computers in the sales
department. Each server has a single Pentium III-600 processor, 192 MB of RAM,
and a single 30-GB hard disk. All computers have 100-Mbps network adapter cards.
Users in the sales department report that when they attempt to access files or submit
print jobs to a server named ServerA, performance becomes very slow. You use
system Monitor to monitor ServerA and discover the information that is shown in the
following table:
4. Discuss the ways that you can improve the performances in your Server A.
5. How your hard disk performance can effect to the performance of your
machine?
ASSIGNMENT 3
Troubleshooting Tools
Microsoft Diagnostics
Software utility named msd.exe that was included with Microsoft Windows 3.x that
listed computer system information. Below is a listing of information available through
Microsoft diagnostics:
Device Manager
First introduced with the release of Microsoft Windows 95 the Windows device
manager is a program that allows a user to view hardware devices and their status.
Device manager is available in Microsoft Windows 95, Windows 98, Windows ME,
Windows 2000 and Windows XP.
Troubleshooting Information
If there is a problem with a device, it is listed in the hardware tree. Also, the problem
device has a symbol that indicates the type of problem:
A black exclamation point (!) on a yellow field indicates the device is in a problem
state. Note that a device that is in a problem state can be functioning.
A red "X" indicates a disabled device. A disabled device is a device that is physically
present in the computer and is consuming resources, but does not have a protected-
mode driver loaded.
A blue "i" on a white field on a device resource in Computer properties indicates that
the Use automatic settings feature is not selected for the device and that the
resource was manually selected. Note that this does not indicate a problem or
disabled state.
A green question mark "?" in Device Manager means that a compatible driver for this
device is installed, indicating the possibility that all of the functionality may not be
available. Note that this applies only to Windows Millennium Edition (Me).
NOTE: Some sound cards and video adapters do not report all of the resources that
they use to Windows. This can cause Device Manager to show only one device in
conflict, or no conflicts at all. This can be verified by disabling the sound card, or by
using the standard VGA video driver to see if the conflict is resolved. Note that this is
a known problem with S3 video adapters and 16-bit Sound Blaster sound cards, or
those sound cards that are using Sound Blaster emulation for Sound Blaster
compatibility.
When you double click a specific device in Device Manager, you see a property
sheet. The property sheet has a General tab.
NOTE: Some devices may have other tabs besides the General tab. Not all property
sheets have the same tabs; some devices may have a Resources tab, Driver tab,
and Settings tab, or some combination of these.
At the top of the property sheet, there is a description of the device. When you click
the Resources tab, the window in the middle of the tab indicates which resource
types are available for the selected device.
The list box at the bottom contains a Conflicting device list. This list indicates a
conflict with an error code.
NOTE: To disable a device in Device Manager, right-click the device, and then click
Disable.
Let the Add New Hardware Wizard resolve your device problems
If you are having problems with a particular device after installing Windows 98 or
other software, try removing it and then let Windows 98 reinstall the device.
Here's how to do it:
6. On the Start menu, point to Settings, point to Control Panel, and then
double-click the System icon.
7. Click the Device Manager tab.
(The problem category should automatically open and a symbol should
indicate which device is faulty. If it's not working properly, there will be a
yellow circle with a black exclamation point inside it; if it's not working at all,
there will be a red X.
8. Click once on the problem item to highlight it, and then click Remove.
9. During start up, Windows 98 should detect as missing the device you just
removed and automatically run the Add New Hardware Wizard. If you recently
downloaded new drivers from any of your hardware manufacturers’ sites, or
from Windows Update, be sure to use the wizard's Have Disk option to
ensure that Windows 98 installs the new drivers and not any old ones.
10. Hint: When you download new drivers from hardware manufacturers or
Windows Update, copy them to a floppy disk and label them. This way, if you
ever need to re-install them, and don't have access to the Internet, they are
right where you need them.
Add/Remove Programs
This control panel is the appropriate place to uninstall programs that did not come
with their own uninstaller. Simply deleting files or folders is not a good way to remove
an unwanted program. This control panel also allows you to control which Windows
Components are installed - you can free up resources by removing unnecessary
components .
Note
• To open a Control Panel item, click Start, point to Settings, click Control
Panel, and then double-click the appropriate icon.
• When using Add/Remove Programs, you can install only programs that
were written for Windows operating systems.
• When you open a program, or try to perform a task within a program, you
may see a dialog box indicating that the program is being installed or
updated by Windows Installer. This can occur if your administrator has set
up the program to install this way, if program files have been deleted or
corrupted, or if you are trying to use a program feature that was not
installed during setup. If the program was installed from a CD-ROM, or if
you are no longer connected to the network, Windows Installer may ask
you for the CD-ROM. When Windows Installer finishes, the program or
feature you are trying to use starts
Caution
Note
• To open a Control Panel item, click Start, point to Settings, click Control
Panel, and then double-click the appropriate icon.
• When using Add/Remove Programs, you can remove only programs that
were written for Windows operating systems. For other programs, check
the documentation to see if other files (such as .ini files) should be
removed.
• When you open a program, or try to perform a task within a program, you
may see a dialog box indicating that the program is being installed or
updated by Windows Installer. This can occur if your administrator has set
up the program to install this way, if program files have been deleted or
corrupted, or if you are trying to use a program feature that was not
installed during setup. If the program was installed from a CD-ROM, or if
you are no longer connected to the network, Windows Installer may ask
you for the CD-ROM. When Windows Installer finishes, the program or
feature you are trying to use starts.
Developed by IDM Interactive Training Division for 86
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
Note
Display
This control panel allows you to control the appearance of your computer. You can
change your background wallpaper and screen saver, select the display resolution
and change the color scheme.
Modems
Also called Phone and Modem Options. Here, you can configure your modem
settings and dialing options (including configuring for long distance or calling card
dialing).
Network
Also called Network Connections. This control panel allows you to configure your
network settings. Please see the section on Networking for Princeton-specific
configuration information.
6. Open the Control Panel (click on Start --> Settings) and double-click on the
Network icon.
7. You need to run Add/Remove Programs and Windows Setup, which are both
available in the Control Panel window, to install network support.
8. Click on the Add button and double-click on Adapter.
9. Select your Ethernet adapter manufacturer and type from the list. If you wish
to use a network adapter that is not listed, contact the manufacturer for a
Windows compliant driver.
10. The Network Control Panel will display several protocols and clients, such as
Client for Microsoft Networks, Client for NetWare Networks, IPX/SPX-
compatible Protocol, and NetBEUI.
6. Click on the Add button from the Network Control Panel again to add a new
Protocol.
7. Select Manufacturer Microsoft and Network Protocol TCP/IP.
8. Click OK to close the Network Control Panel.
9. Unless you did a full installation of Windows, you will be prompted for the
Windows installation disks. In some cases, the installation will require the
Windows disks even if you did a full installation. Be sure to use the
appropriate version of the Windows CD. New hard disks may come with the
"B" version (OSR2) of Windows 95 or with Windows 98. Mixing versions can
render the PC unbootable.
10. When the installation program finishes copying the files, restart your PC
8. Open the Control Panel (click on Start -> Settings) and double-click on the
Network icon.
9. In the Network dialog box, click the Configuration tab if it isn't already
selected.
10. In the list of network components installed, select the entry for the TCP/IP
protocol and your network adapter Then, click the Properties button.
11. Click on the IP Address tab (if it isn't already selected) and verify that the
default Obtain an IP address automatically is selected.
12. Click on the DNS Configuration tab and enter the following information:
1. Click on the Enable DNS option button.
2. In the Host field, enter the host name for your PC which you received
during registration
3. In the Domain field, enter: dur.ac.uk (For this contact your network
Administrator)
4. In the DNS Server Search Order field, enter the following IP
addresses, clicking the Add button after entering each one:
203.115.0.19 and 203.115.0.1(For this contact your network
Administrator)
5. In the Domain Suffix Search Order, enter: dur.ac.uk (For this contact
your network Administrator)
13. Click OK, and then click OK in the Network dialog box.
14. Click Yes when prompted to restart your PC.
Users
Also called User Accounts. This control panel is used for creating and modifying local
user accounts, setting and changing passwords.
8. Login as Administrator.
9. Select Start/Programs/Administrative Tools/Computer Management.
10. From the Computer Management snap-in open the System Tools/Local
Users and Groups node. Right-click on the Users node and select New
User…. The New User dialog box should appear.
11. Enter your username (first initial lastname, e.g. dglazer), full name and
password/confirm password.
12. Uncheck the default selection of “User must change password at next logon”.
13. Press Create button.
14. Press Close to exit the window. The new user now appears in the right pane
of the Computer Management snap-in.
Power Management
Also called Power Options. In this control panel are the options for power saving
features (which are especially important on a laptop). You can have your computer
go into "sleep" or "hibernate" mode and shut off its monitor or hard drive, saving
power when you are away from the computer.
10. Select Start > Settings > Control Panel from the Start Menu.
11. Double click the Display icon in the Control Panel window.
12. In the Display Properties dialog, click the Screen Saver tab, then click the
Power button in the Energy saving features of monitor box.
13. Under Power Schemes, select Home/Office Desk.
Note: Some of the options shown here, such as System Standby and System
Hibernates, may not appear on your computer. If this is the case, simply skip
the steps that do not apply to you. The options available may vary depending
on your computer's capabilities.
14. Set Turn Off Monitor after 10 minutes.
15. Set Turn Off Hard Drives to Never.
16. Set System Standby to Never.
17. Set System Hibernates to Never.
18. Click OK.
System
This control panel contains the system's general information. It tells you the exact
version of your operating system as well as how much RAM the system has. It also
provides a Device Manager for viewing what hardware or virtual devices may be
causing problems (the Device Manager also allows you to update hardware drivers).
More advanced system configuration tools can be found in this control panel, though
changing them is not recommended without a full understanding of their effects.
PC Tools
List and experience third party tools for
7. Disk defragmenting
8. Disk Cleaning
9. Disk Partitioning.
10. Software and operating system deploying.
11. Operating system restoring.
12. Back up
FDISK is often the tool of choice for ex-DOS users when managing drive partitions.
This tool works great as long as you are working with all primary partitions or only
FAT, FAT32, and OS/2's HPFS. FDISK is not even able to recognize NTFS-
formatted extended partitions. So, if you need to delete such a partition, you either
need to have access to a Windows NT, Windows 2000, or Windows XP OS on the
same system as the hard drive in question, and boot into the setup routines of one of
these three OSes to use the text-based partition configuration tool, or use a third
party tool. I've already mentioned Partition Magic, but there is another tool you may
want to look at: DELPART. DELPART is a DOS based tool from Windows NT 3.51;
you can find it floating around the Internet with a quick search on "delpart". This too
can delete any and all partitions on a hard drive, thus making way for easy re-
partitioning and new OS installation.
Norton Utilities
Norton Utilities is a group of programs that let you do everything from deleting items
so that they cannot be recovered to watching your system for problems. It will find
and fix problems associated with hardware or software, help you recover files you
accidentally erased, and monitor your system at all times. This series will explain to
you how to accomplish all of these tasks and more.
Experience the following Norton utilities.
Step 3: Tabs
There are six different tabs that you can set options for. The tabs are General
Settings, Startup Programs, WipeInfo Settings, System Check Scheduler, Recycle
Bin, and Norton Protection. Click the tab for the one that you want to change the
options for.
Developed by IDM Interactive Training Division for 91
Skills Development Project
National Diploma in Information & Communication Technology
Computer Maintenance & Troubleshooting
Conducting a Checkup
Undoing Fixes
Identifying My Equipment
Anti-Virus Software
1)
• List the New features of Norton Antivirus software.
• List the system requirements of Norton Antivirus .
• Install Norton .
• Update manually downloading the definitions from the web.
• Configure Live updates.
ASSIGNMENT 4
VGA Troubleshooting
You install Windows 2000 Professional on a computer that has a non-plug and play
video adapter. You want to configure the video adapter to use 16-bit color and 1024 x
768 resolution. The color setting for the video adapter is set to 16 colors, and you
cannot change that setting. The video adapter properties are shown in the (default
monitor) and VGA properties dialog box in the
exhibit.
ASSIGNMENT 5
• a grounded rubber mat to place the computer on would be useful with some
clear working area in which to place removed items from the computer.
• Students will need to remove at least one panel from the computer case in
order to access the power supply unit.
Computer Maintenance
& Troubleshooting
Case Studies
211
Developed by
Interactive Training Division
IDM Computer Studies (Pvt) Ltd.
http://www.idm.edu
CASE STUDY 1
Technical Support
Introduction
You are the senior technical support manager at a large multinational company with
over 5,000 users online at any onetime. Over the last few months the workload of the
support department has increased dramatically following the introduction of several
new systems. As a result the users have to wait longer and longer in order to get
their outstanding problems resolved. This is leading to frustration and the
management is concerned that productivity is being adversely affected.
In the circumstances it has been decided that a totally new approach to providing
technical support to users is required and the latest technology should be employed
wherever possible to reduce the waiting times and speed up responses to problems.
Aims
• To produce a feasibility report outlining the case for the installation of a
technical support system within the company.
• To select a suitable solution and to produce a detailed specification.
• To develop a comprehensive project plan for its implementation.
These three documents (feasibility report, detailed specification and project plan) will
form the basis of a presentation to the management in order to convince them that
the proposed Solutions are justifiable and practical.
Task 1
Evaluate the benefits of revising the current technical support infrastructure for the
company in the form of a feasibility report to include the following:
Task 2
Using the Internet and any other resources available, carry out research into what
Help Desk systems are currently available. Select ONE suitable solution and produce
a detailed specification for each of the components (both hardware and software)
required to implement a new Technical Support solution. The specification document
should include the following:
Guidance
Consult with your tutor during and after familiarizing yourself with the tasks required
and producing a formal action plan in order to reach the assignment objective.
During the design stages discuss the reasons for the choices you are making with
your tutor who may give advice on the advantages and limitations of your approach.
CASE STUDY 2
PC Upgrading
The following equipment will be required:
• A PC system with the following minimum specification:
• Motherboard with IDE support or separate IDE expansion card
• Intel Pentium 120Mhz or equivalent processor
• VGA graphics adapter
• 32Mb RAM
• 500Mb hard disk (with a suitable operating system installed)
• floppy disk drive
• parallel port
• monitor
• keyboard
• mouse
• 1 x CD.ROM drive with appropriate driver disks.
• 1 x Motherboard suitable for the proposed processor and memory upgrade.
• 1 x Power Supply Unit of suitable wattage for the proposed upgraded system.
• 1 x Intel Pentium Ill, Celeron, or AMD processor (minimum 500 MHz See note
below.
NOTE: Before commencing this practical assignment the tutor/lecturer must ensure
that the system unit case is appropriate for the Task in hand. In particular, the
tutor/lecturer should check that the motherboards supplied to the candidates are the
correct format and that they can be fined into the system units correctly.
NOTE: The candidates should work in pairs. In order to avoid any health and safety
issues a single candidate should not be allowed to conduct the practical project in
isolation.
Assignment
You are responsible for providing technical support for a medium sized company
which currently has a number of rather old PCs. Rather than replace these with
completely new systems it has been decided to upgrade the system units to enable
them to run the latest software applications more efficiently. The upgrade to each PC
will consist of the installation of faster processors, larger memory and CD-ROM
drives. However, in order to perform such an upgrade the motherboard and Power
Supply Unit (PSU) will need to be replaced as the existing motherboard is incapable
of supporting a higher class of processor.
Task 1
Candidates should start by familiarizing themselves with the equipment supplied and
producing a formal action plan in order to reach the assignment objective. Notes
should be made throughout the project in order to document the procedures carried
out.
Task 2
The candidates will be expected to carry out the following procedures within the
allotted timescale:
• Disassemble the PC system unit and remove the existing motherboard and
PSU.
• Fit the replacement PSU, motherboard and new processor.
• Install new memory modules.
• Install the CD-ROM drive.
• Reassemble the system unit installing the remaining system components as
required.
• Connect all peripherals to system unit.
• Start the PC and enter the system BIOS.
• Adjust any BIOS settings as necessary.
• Install any appropriate driver software for the CD-ROM drive.
• Use the Windows 95 or 98 master disk to re-install or update any operating
system components as necessary.
• Test the system to ensure that all components and peripherals (both new and
old) are working correctly.
Task 3
Produce a formal project report detailing the Tasks carried out and the procedures
followed.
Task 4
Produce suitable test documents printed from each PC s howing the new specification
of the system (processor type and speed, amount of memory installed, and CD-ROM
drive fitted).
Guidance
Consult with your tutor/lecturer during and after familiarizing yourself with the
equipment supplied and producing a formal action plan in order to reach the
assignment objective.
During the practical stages discuss the reasons for the choices you are making with
your tutor/lecturer who may give advice on the advantages and limitations of your
approach.
If you have any doubts about the safety aspects of any particular procedures then
these should be discussed with your tutor before implementation and noted in your
documentation.
Submission Requirements
1. All documentation outlined i.e. a formal action plan of Tasks, a formal project
report, and printed test documents produced should be signed and dated by
your tutor/lecturer.
2. The main assessment criteria for this practical project will be the successful:
1. upgrading of the PC system.
3. The highly practical nature of the project means that tutors/lecturers must
observe the candidates during the exercise in order to be able to carry out a
thorough assessment. In addition, the examiner should be responsible for
overall safety during the exercise and if necessary take appropriate action to
avoid any potential accidents.