Professional Documents
Culture Documents
Theory
Notes on
COMPUTER HARDWARE
MAINTENANCE
[As per the Revised Curriculum (Revision 2014) of Unit
of datapro]
datapro
Computer Hardware 1
Maintenance
© Copyright 2004 reserved with the publishers.
2 Computer Hardware
Maintenance
PREFACE
book can be made as reference for the beginners. The contents include
hoped that the students and teachers concerned with this branch will find this book
useful.
-Author
Computer Hardware 3
Maintenance
CONTENTS
SL. PAGE
TOPIC
NO. NO.
1 Introduction 5
2 Generation and Classification of Computers 8
3 Block Diagram Of computer 11
4 Input / Output Devices 13
5 Memory Systems 16
6 BIOS and its functions 22
7 Secondary Storage Devices 26
8 SMPS 30
9 Motherboard And its Classifications 33
10 Block Diagram of Motherboard 35
11 Chipset 36
12 Microprocessors 39
13 Control Signals in motherboard 50
14 Interconnection Structures 51
15 Motherboard Ports and Expansion Slots 56
16 Computer Virus and Antivirus 62
17 Software 65
18 Operating system
19 DOS Commands
20 LINUX
21 Trouble Shooting 68
22 79
23 References 83
4 Computer Hardware
Maintenance
\
Introduction
Simply computer is an electronic machine that helps us to solve problems.
The problems that can be solved with the aid of Computer are wide varied. They
can be problems relating to industry, medicine, education, scientific research, law,
social sciences, arts etc. In fact a computer can solve any problem that can be
solved through step-by-step procedure.
A computer can be defined as an electronic device, which is capable to
hold, retrieve & manipulate information to get the desired output. Computer will
soon play a significant role in the daily functioning of every individual of our
society. In the beginning the computers were very large and costly, so they were
accessible and affordable only to the large corporations, big universities and
government agencies. Advances in semiconductor technology and development
of micro-chips has given rise to such a level of miniaturization, that computing
power of a room sized computer of earlier days is now available on a desk top
computers affordable even to a common individual. These two factors have played
important role in the development of the personal computer (PC), which has
completely invaded our day-to-day life.
A computer is basically a tool to assist man in performing various tasks.
But it differs from other types of tools and machines; the same computer can
perform i.e. many different types of jobs. E.g. computers are used in offices, may
be for word processing or administrative works or accounts; factories - production
planning; education institutions; banking institutions; publishing house; arts and
animation studios; advertising agencies; architects; airlines and railway
reservations; military and police; doctors and hospitals, The ability to do different
jobs on the same machine distinguishes computers from other machines.
Computer Hardware 5
Maintenance
The Evolution of Computers
Computers were invented as a result of man’s search for fast and accurate
calculating devices. The earliest device that qualifies as the digital computer is the
“ABACUS”. This device permits the user to represent numbers by the positions of
beads on a rack.
In the 19th century Charles Babbage (father of modern digital computer),
Professor at the Cambridge University invented the “Differential Engine” and the
“Analytical Engine” the principle of which has been the fundamentals of modern
digital computers.
COMPUTER GENERATION
After the II World war rapid developments took place in the growth of
computer in five distinct phases known as the Computer Generation.
First Generation (1942-1955)
The first generation computers were the voluminous computers with large
frame. ENIAC (Electronic Numerical Integrator and Calculator) was the first all
electronic computer.
It was developed at MOORE School of the University of Pennsylvania in
USA by a team led by Professors J.P. Eckert and J.W. Mauchley. It was
developed as a result of military need.
The computer of this generation used 18,000 vacuum tubes and took up
the wall space of 20 x 40 sq. ft room.
The main disadvantages were
(1) Slow operating speed and restricted computing capabilities,
(2) High power consumption and short life span,
(3) Huge space requirement and
(4) Limited programming capabilities.
Second Generation (1955-1964)
6 Computer Hardware
Maintenance
In this generation the computers used the solid-state devices known as
‘Transistors’ (Transfer Resistors) in the place of vacuum tubes (valves). These
transistors were smaller in size. Use of transistors reduced the size of computers,
increased its speed and also minimized power consumption.
Third Generation (1964-1975)
The third generation computers were introduced in the year 1964. During
this period transistors were replaced by the ‘Integrated Circuits’ (I.C.’s). Each of
these I.C.’s consisted of number of circuits consisting of transistors and capacitors
fabricated in a single chip of silicon. With the introduction of I.C.’s computers
processing speed as well as its storing capabilities improved.
Fourth Generation (1975 Onwards)
Initially, I.C.’s contained only 10 to 20 components. Which were named
Small Scale Integrator (S.S.I.). Later hundreds of components was integrated into
one chip which was called “Medium Scale Integration” (M.S.I.). Later it was
possible to integrate over 30,000 components into one chip called “Large Scale
Integration” (L.S.I.).
In this fourth generation we have ‘Microprocessors’ as the brain of
computers. We are now in the Fourth Generation of Computers.
Fifth Generation (Yet To Come)
Scientists are now at work on the fifth generation of computers, which is not
yet a reality. They aim to bring out machines with genuine I.Q., the ability to
reason logically and with real knowledge of the world.
Classification of computers
Computer Hardware 7
Maintenance
Microcomputers
A Microcomputer’s Central Processing Unit (CPU) is a microprocessor. The
first microcomputers were built around 8-bit microprocessor chips. (That is, the
chip can retrieve instructions/data from storage, manipulate, and process an 8-bit
data at a time or that the chip has a built in 8-bit data transfer path.). Nowadays
there are microcomputers with 32-bit or higher microprocessor chips.
Minicomputers
Initial minicomputers were built around 8 and 12 bit machines. But by
1970’s almost all the mini computers were 16 bit machines. With the advancement
in technology, the speed, memory size and other characteristics developed. The
minicomputer was more powerful machine, which could be used in variety of
applications and could support business applications along with scientific
applications. The minicomputer was used as a multi-user system, which can be
used by various users at the same time.
Mainframe computers
Mainframe computers are generally 32-bit machines or on the higher side.
These are suited for big organizations to manage high volume applications.
Mainframes are also used as central host computers in distributed system.
CPU
Supercomputers Input Unit Main Memory Output Unit
These are amongst the fastest machines in terms of processing speed and
use multiprocessing techniques where a number of processors are used to solve a
problem. These are mainly used for weatherALU
forecasting, remote sensing, image
processing, etc.
Control Unit
Secondary
BLOCK DIAGRAM OF COMPUTER
Memory
8 Computer Hardware
Maintenance
Data Flow
Control Flow
.
PERIPHERAL DEVICES
Input Devices
These are the devices, using which user enters the data and the program into
computers storage. Most commonly used input devices are Mouse, Keyboard, and
Scanner etc.
.
KEYBOARD
Keyboard is a standard input device. Various types of keyboards are
available that can be attached to the IBM PC/XT/AT. The 84/101 keys keyboard
contains English letters, ten special function characters (F1 to F10), three special
keys (Ctrl, shift, Alt.), three shift lock keys (Caps lock, Num lock and scroll lock)
and several cursor or numeric keypad keys. The keyboard cable is approximately
6 ft. long and coiled like a telephone cable. It is connected to the keyboard at one
Computer Hardware 9
Maintenance
end and to a 5 pin DIN connector at the other end. The notch in the DIN
connector ensures that the keyboard can be connected only in one direction.
There are two types of keyboards. 84 keys keyboard (PC/XT) & 101/104 Keys key
board (PC/AT).
XT/AT Switch
Some keyboards have a switch on the rear side viz. Which one can select
MOUSE
10 Computer Hardware
Maintenance
PIN ASSIGNMENTS FOR SERIAL MOUSE
DB-9F 9 DB-25F
WIRE NAME DETAILS
PIN 25 PIN
PROTECTIVE
SHELL 1
GROUND
SERIAL DATA FROM
3 2 RECEIVE DATA
HOST TO MOUSE
DATA FROM MOUSE
2 3 TRANSMIT DATA
TO HOST
7 4 RTS REQUEST TO SEND
8 5 CTS CLEAR TO SEND
6 6 DSR DATA SET READY
5 7 SIGNAL GROUND
DATA TERMINAL
4 20 DTR
READY
1. Mechanical Mouse
Computer Hardware 11
Maintenance
2. Opto Mechanical Mouse
3. Optical Mouse
1. Mechanical Mouse
In mechanical mouse, a small, round ball in the bottom touches the mouse
pad. When the mouse is moved, the ball rotates. There are two flywheels inside
the mouse touching the ball there by sensing the horizontal and vertical
movements. Since the flywheels are connected to a resistive element forming a
mesh of fine black cross hairs, as when the mouse is moved, a ball translates the
mouse movements into electrical signals. The mechanical mouse is simple and
cheaper but needs routine maintenance like cleaning. Also the wear and tear
makes it dead soon.
12 Computer Hardware
Maintenance
Fig: working of opto mechanical mouse
3. Optical mouse:
In optical mouse, there is no ball or rollers. A special mouse pad with a grid
is used. The mouse movement is tracked by LEDs and Light-sensitive transistors.
Though expensive, an optical mouse is desirable because of its better accuracy
and higher reliability. There are no moving parts and practically no maintenances
is needed.
A mouse has two or three buttons. The function of each button is defined by
the software. When a button is pressed, the mouse transmits a signal that is
interpreted by the mouse driver. The action taken by a system depends on the
operating system and application program. There are 3 gestures associated with
mouse: Single click, Double click and Drag.
.
SCANNER
But, if you have some existing photograph and you want to transfer it in to the
computer, then none of the above input devices are useful for this purpose, you
need another input device called “Scanner” for this.
Computer Hardware 13
Maintenance
Scanners are the best choice for transferring existing graphical images such as
photograph, logo etc. in to the computer. Using a scanner one can quickly and
easily bring existing images in to the computer.
Once these images are scanned and brought in to the computer one can include
them in to documents, print them or edit them with some image editing software
such as “Photoshop”, “Corel Photo Paint etc.
Scanners are also useful for OCR (Optical Character Recognition) work.
Using OCR software one can scan existing text documents in to the computer and
then convert them in to a format that the word processing software such as “MS-
Word can edit. It is also useful with the fax cards. As the fax cards do not have any
facility to get existing documents in to the computer, one can use the scanner to
scan and get the documents in to the computer for faxing them
OUTPUT DEVICES
These are the devices, using which user get the output from the computers, in the
form of hard copy and Soft copy. The output form the Monitor is called Hard copy
and the output form the Printer is called Soft copy. The output devices are Monitor,
Printer, and Speaker etc.
MONITORS
The main display unit in computer is the monitor. Now CRT monitors, LCD
monitors are available with different screen sizes.14’, 15’, 17’ etc.Screen size is
commonly measured diagonally.
14 Computer Hardware
Maintenance
Monitors are connected to CPU by means of a 15 pin D-connector called VGA
(Video Graphic Array) connector. It also have a power cable to get 230v/110v
supply power.
Monitors are also available with touch screen technology, Plasma screen
etc.
PRINTERS
Printers are the most commonly used output devices to produce printouts of
results, programs and data. In impact printers electromechanical mechanisms are
employed to cause hammers or pins to strike against a ribbon and the paper to
print the text. A non-impact printer does not employ mechanical print head to
strike against ribbon. They use thermal chemical, electrostatic, or ink jet
technology for printing the text.
Computer Hardware 15
Maintenance
1. Dot matrix printer
2. Inkjet printer
3. LASER printer
An Epson MX-80
16 Computer Hardware
Maintenance
INKJET PRINTERS: These printers use a Non Impact approach to produce a
character. It is quiet in operation as it is a non-impact printer. Ink-jet printers use a
variety of approaches to print a character. In one of the approaches a voltage
causes a piezo electric crystal to send a pressure wave through an ink chamber.
When the pressure reaches the tip of the nozzle, it forces a drop of ink to move
straight to the paper. The print head employ multiple nozzles just as multiple pins
in a dot matrix print head.
LASER PRINTERS
These are non-impact page printers. Two types of Laser printers are
available. Post script & Non-post script. These are printer languages used to make
characters. Post script is from Adobe Inc. and non post script is from HP.
Characters are developed using mathematical equations in post script and using 0
& 1 in non post script, and is stored in a ROM.
Computer Hardware 17
Maintenance
PARTS OF A LASER PRINTER
Control circuit - CPU (Motorola 68000/68010) + RAM (512 KB) + ROM
Power supply - 1000V, + 40V, + 12V & + 5V
Laser or Scanner Unit
Coronas
Toner unit
Fuser Unit
1000V power supply is used to charge the paper, 40V for motors and + 12V
for external interface.
LASER / SCANNER UNIT
Lasing diode + Stationary mirror + a drum. The property of normal light is
that the beams are scattered in every direction whereas laser beam are parallel
beam of light with high intensity. This section consists of diodes & mirrors. The
laser beam is produced by the lasing diode and then split into two beams. These
are given to a rotating scanning mirror. This rotating beam is given to the rotating
drum. It is a metallic drum made of Aluminum.
CORONAS
It is a metallic container with a thin metallic wire, which has high melting
point. One end of this wire is connected to an electrode and the other end is
terminator. A high voltage of 1000V is applied to this electrode. Two different
coronas are used in Laser printers. They are Charger & Transfer. The charger
corona is placed above the drum and it charges the drum. The transfer corona is
on the paper path to charge the paper.
TONER & DRUM ASSEMBLY
The toner is a powder, which is a mixture of carbon, iron and plastic. This
toner is placed in a separate container with an outlet, which comes in contact with
the drum. Some printers like HP having disposable toner called toner cartridge.
18 Computer Hardware
Maintenance
PAPER TRANSPORT MECHANISM
This has a tray, which can hold around 200 sheets. A paper pickup roller
and a paper feed roller. These are used to feed the paper into the printer.
FUSER ASSEMBLY
Its function is to melt the plastic in the toner and press the image into the
paper surface. This assembly consists of a pressure roller and a heating lamp to
heat the toner around 200 degree Celsius.
Working of laser printer
The text or images are down loaded from the computer to the printer
memory through the parallel ports. The control circuitry in the printer converts it
into full lines. These lines are converted again into dot information and send to the
scanning unit for writing image into the drum. Then the paper is inserted between
the drum and coronas. The image from the drum is transferred to the paper when
the paper is attached to the lower section. The remaining toner is removed from
the drum by cleaning pads and fresh charge is placed on the drum for next image.
Computer Hardware 19
Maintenance
The paper is then fed to the fuser assembly, which will melt the toner and press it
to the paper through pressure roller.
Printer Controls
The following discussion summarizes the most common button controls
available for printer systems.
On-line:- The on-line button switch connects and disconnects the printer
from the computer system. When in on-line mode (often indicated by the
on-line light being lit), the printer is connected to the computer system and
able to receive information from it. When the printer is off-line (indicated by
the on-line light being out), the printer is disconnected from the computer
system and ignores any information received.
Form-feed: -This button switch, when pressed, advances the paper from its
current location to the top of the next page. The new position is established
as the top of form (beginning of a new page). On printers, which support
single sheet paper, this prints a single page of paper.
Line-feed: - This button switch, when pressed, advances the paper by a
single line. Holding the button switch down advances multiple lines. This
button is not present on some printers, which use single sheet paper
instead of continuous form paper
SPEAKERS
20 Computer Hardware
Maintenance
Speaker is also an output device. It is used for hearing sound. It has a
power connector for 230v/110v supply AC. Motherboard’s Audio line-out (lime
colour) provides signal to the speaker. Advanced sound cards will give better
experience of sound with 5.1, 7.1 sound systems.
CPU consists of
Computer Hardware 21
Maintenance
1) Arithmetic and Logic Unit
2) Control Unit
3) Registers
4) Buses
1) ALU (ARITHMETIC & LOGIC UNIT):- of a computer system is the place where
the actual execution of the instruction takes place. Almost all values are designed
to perform the following Arithmetic operations. They are =, <, >, #, +, -, x, /. It will
also perform logical operations based on AND, OR, NOT GATE.
2) CONTROL UNIT: - A control unit is able to maintain order and direct the
operations of the entire system. It manages and co-ordinates the entire computer
system with the help of internal general purpose registers and special purpose
registers.
3) REGISTERS:
Program Counter: It is a register, which keeps track of the next instruction to be
executed. Before a program is executed, the starting address i.e. the location of
the first instruction must be stored in the PC. As the instruction is executed, the PC
is updated, so that it always contains the address of the next instruction, which is
to be executed.
Memory Address Register: It is used to hold the address of the memory location
to or from which data is to be transferred for fetching the instructions. As the
operating speeds of the CPU and the memory differ, the MAR will hold the
address till it is accepted by the memory.
Memory Buffer Register: It contains the data to be written into or read out of the
addressed location. Like MAR, MBR also compensates for the difference in
operating speeds of the CPU and memory.
Instruction Register: It is used to hold the instructions during their execution. The
instruction to be executed is fetched from memory to MBR and then to IR. The
instruction decoder decodes the contents of the IR. The output of the IR decoder is
given to the control unit, to generate the required control signals for execution.
22 Computer Hardware
Maintenance
Accumulator: It is one of the main registers of the ALU. It is used when the ALU
is performing arithmetic operations. While performing an arithmetic operation, one
of the operands is stored in the Accumulator and the second operand comes from
the memory location. The result is then stored in the accumulator.
4) BUSES
Bus is a group of wires or a group of signal lines between control unit, ALU
and registers. There are three types of buses namely
1) Address bus (unidirectional-to address the devices),
2) Data bus (bi directional-to place data) and
3) Control bus (to send control signals to devices)
Memory Concepts
Memory is an essential part of the computer to store information. There are
two types of memory used for storage in a system.
1) The Memory that is directly accessible by the microprocessor is called the main
memory or the primary memory. It includes RAM and ROM. In the earlier
computers, core memory was used as the primary memory. Where in both
program and data were stored. In modern computer semiconductor memory is
used as primary memory
2) External Storage devices or mass storage devices, which are used for storing
large resumes of information and programs, are called Secondary Memory.
Primary Memory
It includes Hard disks, CD ROM,DVD ROM, Floppy disks and Flash memories
( pen or Thumb drives) etc.
ROM
UVEPROM
MM
EPROM
Computer Hardware 23
SDRAM DDRAM
Maintenance EEPROM
Flash ROM
MEMORY SYSTEM
Memory in a computer system is required for storage and subsequent
retrieval of instruction and data. A computer system uses variety of devices for
storing these instructions and data, which are required for its operations.
Volatile and non-volatile memories: The memory, which loses its contents when
the power source is removed, is known as volatile memory. The memory, which
holds the contents even when the power source is removed, is known as non-
volatile memory.
24 Computer Hardware
Maintenance
Primary Memory or Main Memory: It is a large memory, which is fast but not as
fast as internal processor memory. This memory is accessed directly by the
processor. It is mainly based on integrated circuits.
Secondary Memory: It is much larger in size than the main memory but slower
than main memory. Secondary memories cannot be accessed directly by a
processor. First the information is transferred to main memory and then the
information can be accessed as the information of main memory. It normally stores
system programs and data files as a secondary storage in devices like FDD, HDD
etc.
Another kind of memory, which is popularly used in computers today, is
called cache memory. It is logically placed between the internal registers and
main memory. It stores some of the content of the main memory, which is currently
in use.
Cache memory is sometimes described in levels of closeness and
accessibility to the microprocessor. An L1 cache is on the same chip as the
microprocessor. (For example, the PowerPC 601 processor has a 32 kilobyte
level-1 cache built into its chip.) L2 is usually a separate static RAM (SRAM) chip.
When the processor needs to execute an instruction, it looks first in its own data
registers. If the needed data isn't there, it goes to the L1 cache and then to the L2
cache. If the data isn't in any cache, the CPU calls out to the main RAM. It might
not even be there, in which case the system has to retrieve it from the disk.
Intel Corp.'s Pentium III processor has 32KB of L1 cache on the processor
chip and either 256KB of L2 on-chip or 512KB of L2 off-chip. The L2 cache on the
CPU chip can be accessed four times faster than if it were on a separate chip.
Indeed, Intel will introduce Level 3 (L3) cache in its 64-bit server
processors, called Itanium. The 2MB or 4MB cache will connect to the processor
over a bus that runs as fast as the processor - 800 MHz.
Computer Hardware 25
Maintenance
ACCESS MODES
A memory is considered to consist of various memory locations. The
information from these locations can be accessed in the following ways.
Random Access: In this mode any memory location can be accessed in any
order in the same amount of time. Semiconductor memories, which generally
constitute main memory uses this method.
Sequential access: In this method, the locations can be accessed in pre-defined
sequences only. Magnetic tape uses this type of access. Here different locations
are accessed in different amount of time.
Direct access: In this case the information is accessed neither randomly nor in
sequence but something in between. A separate read/write head exist for a track
and on a track the information can be accessed serially. Magnetic disks use this
semi-random mode of operation.
RANDOM ACCESS MEMORY
Main memory is a Random Access Memory. The main memory can be both
read and written into, therefore, is called read-write memory. The access time is
constant and independent of the location accessed.
There are two main categories of semiconductor RAMs: Static and
Dynamic. Larger chips are normally constructed as dynamic RAMs because the
dynamic RAM require less number of transistors than static RAM and hence can
be packed more densely on a single chip. Hence dynamic RAM can achieve
higher storage density. Dynamic RAMs tend to lose their charge with time and
needs periodic refreshing.
SIMM (Single Inline Memory Module)
It is a memory module in which a number of chips soldered on to a small
expansion board. The edge connector of this board is plugged into a special
SIMM socket on the motherboard. This is available in 30 pin (16bit) & 72 pin (32
bit) SIMM modules. These most common capacities are 256 KB, 1 MB, 2 MB, 4
MB, 16 MB & 32 MB.
26 Computer Hardware
Maintenance
DIMM (Dual Inline Memory Module)
These are 168pin memory modules for 64-bit memory. The DIMM size can
be 8 MB, 16 MB & 32 MB.
TYPES OF RAM
DDR RAM
DDR SDRAM uses a new 184-pin DIMM format, which is physically
incompatible with the traditional 168-pin DIMMs that have been the
standard in the industry for the last 5 years.
DDR RAM
Computer
Single SidedHardware 27
Maintenance
DDR RAM Double Sided
28 Computer Hardware
Maintenance
EEPROM: Electrically Erasable ROM can be written without erasing the previous
contents. This can be updated easily.
In general ROMs are considered slower than RAMs.
BIOS have some programs, which user can modify. It is known as set up program
(or Programmable Option Select (POS)). This set up information is stored in
CMOS RAM, which has a battery back up.
Computer Hardware 29
Maintenance
The BIOS is a piece of software that is permanently stored in a chip on the
motherboard. When you first turn on a computer, the BIOS program is initiated. It
performs a hardware check and makes sure that certain crucial pieces of
hardware are present and functioning properly. For example, it makes sure there
is a video card, a CPU, memory, and a power supply providing proper voltages. If
there is a problem, it will inform you via beep codes. If everything is fine, it will
display a startup screen, the first thing you see on your monitor. It then proceeds
to do a memory check, discover other hardware, configure devices as needed,
identify the boot drive, and then hand over control to the boot sector on the boot
drive, which launches the operating system.
This BIOS software is in some regards like other software. There are newer
versions available that contain updates, enhanced, features, new features, and
bug fixes. It is possible to install newer BIOS versions and upgrade, but the
process is different from upgrading regular software that's installed on your
computer. The BIOS software is not stored on the hard drive, but in a chip on the
motherboard. To erase the software on the chip and program it with a newer
software version you need to use a special program called a flash utility, and the
process of performing the upgrade is called flashing the BIOS.
The most popular reasons that cause people to flash the BIOS are...
Support for newer processors - The BIOS allows the motherboard to accept
processors up to a certain speed. Since you got the computer, the top
speed of the processor type your computer accepts has increased. You
decide to replace your processor with a faster one, but the BIOS does not
30 Computer Hardware
Maintenance
recognize it or does not have the right settings. Upgrading the BIOS can
resolve this problem.
Support for bigger hard drives - The BIOS allows the motherboard to accept
hard drives up to a certain size. Since you got the computer, the maximum
size for hard drives has increased. You decide to install a newer and bigger
hard drive, but the BIOS does not recognize it or only recognizes part of the
drive. Upgrading the BIOS can resolve this problem.
Bug fixes - The BIOS contains certain features and options, but one of them
does not function properly or not at all. Since you got the computer, the
manufacturer has recognized and corrected the problem with a new BIOS
version. Upgrading the BIOS can resolve this problem.
If a flash has gone horribly wrong and the computer fails to boot altogether, the
only solution is to replace the BIOS chip on the motherboard with a new one that
contains a healthy and correct BIOS. To obtain a new BIOS chip, contact your
motherboard manufacturer and give them the model of your motherboard. For a
relatively small price ($10-15 plus shipping) they may mail you a new BIOS chip.
Computer Hardware 31
Maintenance
To install the new chip, you open up the computer after taking appropriate anti-
static precautions, identify the BIOS chip on the motherboard with help of the
manual, carefully pull the old chip out of its socket, and insert the new chip in its
place. Be sure to carefully follow the manufacturer's installation instructions.
However, be aware of the fact that some manufacturers will not sell individual
BIOS chips, and some older motherboards have non-replicable BIOS chips. In
those two cases you will be forced to replace your motherboard, which is
expensive and somewhat of a hassle.
While BIOS flashing requires some care and preparation, it is a relatively simple
process if done right. Let's go over the steps of properly flashing a BIOS using a
real-world example, the motherboard BIOS in my test machine.
Note: Please keep in mind that the following steps are an example to help you
understand how the process works. However, your motherboard and BIOS version
are most likely different from mine and you will have to adjust your steps,
download files, and command line switches accordingly. Please exercise caution
when flashing your BIOS and stop and ask for help if you are not certain.
Reboot your machine and press the appropriate key to enter your BIOS. Typical
keys to access the BIOS are (by manufacturer):
32 Computer Hardware
Maintenance
SECONDARY STORAGE
Secondary storage devices are used to store the data and programs
permanently for future use. A disk, like a cassette tape, is a reusable storage
device that holds information, such as programs and data in files. The amount of
space on a disk is measured in bytes. The information stored on a disk is not
deleted when you turn off your computer. (It is deleted on RAM).
There are two kinds of disk drives Hard disk drive and Floppy disk drive. A
hard disk drive contains a non-removable disk that is built into your system. You
can store large amount of information on hard disk in one place, instead of storing
it on many floppy disks. A floppy disk drive holds a removable floppy disk, which
has less storage capacity than a hard disk. The read /write process is very fast on
the hard disk drive than on a floppy disk drive. Each disk drive has a letter
assigned to it so you can tell your system where to find instructions, data or
information’s. Normally the floppy disk drives are called “A” drive or “B” drive while
the hard disk is called “C” drive. Floppy disk can be carried any where by the
user, while the hard disk is fixed and cannot be removed by the user.
HARD DISK
Computer Hardware 33
Maintenance
The hard disk is made up of a stack of rugged aluminum disks coated on
both sides with magnetic material and enclosed along with its set of heads and
other hardware into a hermetically sealed container. Here also the disks in the
stack are divided into concentric tracks and tracks are divided into sectors of 512
bytes each.
Space allotted on the floppy disk or hard disk for the storage of data is in
the form of clusters (group of sectors). On floppy one cluster is made up of 2
sectors i.e. 1024 bytes while on hard disk one cluster is made up of 4 sectors i.e.
2048 Bytes. As the data is stored cluster wise on floppy one data file takes
minimum of 1024 Bytes of space while on hard disk it takes minimum of 2048
bytes of space.
On a standard DSDD (Double Sided Double Density) floppy disk there are
80 tracks ( 40 tracks on each side with density 48 T.P.I.) divided into 9 sectors, so
the total capacity is 2 sides x 40 tracks x 9 sectors x 512 bytes = 360 Kilobytes.
While on a D.S.H.D. (Double Sided High Density) floppy disk there are 160 tracks
34 Computer Hardware
Maintenance
(80 tracks on each side with Density 96 TPI) divided into 15 sectors, so the total
capacity is 2 sides x 80 tracks x I5 sectors x 512 bytes = 1.2 Mega Bytes.
Bits & Bytes
The binary digits are called as Bits. A BIT represents either 0 or 1. A
character is coded using combination of 8 Bits. When eight bits are combined
together, it is known as a BYTE. It is equivalent of one character. A character or
number is represented by one byte.
eg : Using ASCII code capital letter ‘A’ is represented in computers as 01000001.
8 bit =1 byte
1024 bytes =1 kilobyte
1024 kilobytes =1 megabyte
1024 megabytes =1 gigabyte
COMPACT DISKS (CD’s)
CD’s are made of thin plastic material with a radius of around 2.3”. Data’s
are stored by passing a laser beam over its surface. According to the data pits
would be made or not made. Datas are read by the presence and absence of pits.
A CD has a capacity of around 600 MB to 700 MB
Computer Hardware 35
Maintenance
SWITCHED MODE POWER SUPPLY (SMPS)
The basic SMPS consists of:
1. A bridge rectifier, which rectifies AC into pulsating DC.
2. A switching element (Transistor/MOSFET), which operates in saturation and
cut off mode. Hence the name SMPS.
3. Pulse width modulation (PWM) which compares the sampled output with fixed
reference and it adjusts the pulse width of the switching element to get fixed
output.
BLOCK DIAGRAM OF SMPS
+12V
STARTER -12V
PWM +5V
Vref -5V
GND
PGS
OSCILLATOR
36 Computer Hardware
Maintenance
dc will affect the ac voltage level generated on the transformers secondary. A long
duty cycle means a larger output voltage (for heavy loads) and a short duty cycle
means lower output voltage (for light loads). Duty cycle itself refers to the amount
of time that a signal is “on,” compared to its overall cycle. The sensing/switching
circuit continuously adjusts the duty cycle.
Secondary voltage is re-rectified and re-filtered to form a secondary dc
voltage that is actually applied to the load. Output voltage is sensed by the
sensing/switching circuit, which constantly adjusts the chopped dc duty cycle. As
load increases on the secondary circuit (more current is drawn by the load), output
voltage tends to drop. A sensing circuit detects this voltage drop and increases the
switching duty cycle. In turn, the duty cycle for chopped dc increases, this
increases the voltage produced by the secondary winding. Output voltage climbs
back up again to its desired value. The output voltage is regulated.
The reverse will happen as load decreases on the secondary circuit (less current
is drawn by the load). A smaller load will tend to make output voltage climb. Again,
the same actions happen in an unregulated supply. The sensing/switching circuit
detects this increase in voltage and reduces the switching duty cycle. As a result,
the duty cycle for chopped dc decreases and transformer secondary voltage
decreases. Output voltage drops back to its desired value. The output voltage
remains regulated
Two Types of SMPS
AT (Advanced Technology) --12 Pin
ATX (Advanced Technology Extended) -- 20 Pin / 24 Pin
Computer Hardware 37
Maintenance
AT Connector
ATX Connector
+5 Volt supply: This is the basic supply voltage for nearly all electronic
components. Motors now some times use the 5 volt supply, but usually only
in the smaller drives , such are the 2.5-inch and some 3.5-inch drives. The
+5 volt supply wires should always be red in any standard PC system.
38 Computer Hardware
Maintenance
+12 volt supply: The main function of the +12volt power is to run disk drive
motors as well as the higher – output processor voltage requirements in
some of the newer boards +12volts supply is use by any cooling fans in the
system.
-5Volt Supply: The -5V signal is directly routed to the ISA bus pin B5 for use
by add-on cards. In earlier floppy drive controller cards; the analog data
separator circuit used -5V.
+3.3 Volt Supply: This supply voltage does not appear of the original XT-AT
or Mini- XT compatible power supplies. Starting with the ATX design in 1995
any system with ATX compatible power supplies include a 3.3-volt supply
line from the power supply to the motherboard. Most CPUs and DRAM use
3.3volts, as well as some PCI adapter cards. All high sped PCI adapter cards
to use 3.3 volts for all communications with the PCI Bus.
+5VB: (+5 V , Standby mode): The +5VSB line is a +5 volt supply line that
is active any time the AC power input is a active regardless of whether the
system is turned on the purpose of their supply line is to power standby
circuitry ,such as the PS-ON circuit the wake-on-LAN and remote-ring-on
circuitry.
MOTHERBOARDS
The motherboard is the large circuit board inside the computer's case. It's
sometimes called the system board, the logic board, the baseboard, or less
Computer Hardware 39
Maintenance
commonly, the planar board. Everything connected to the computer system, plugs
either directly or indirectly into the motherboard.
The CPU, or Central Processing Unit, referred to as the 'brain' of a
computer. The CPU is placed on the motherboard, and if it can be called the brain
of the computer then the motherboard is truly the central nervous system.
The motherboard contains the CPU, the BIOS ROM chip (Basic Input /
Output System), and the CMOS Setup information. It has expansion slots for
installing different adapter cards like the video card, sound card, Network Interface
Card, Modem etc.
This circuit board provides a connector for the keyboard as well as housing
of the keyboard controller chip. It has RAM slots for the system's Random Access
Memory (SIMMs or DIMMs), and provides the system's chipset, controllers, and
underlying circuitry (BUS system) to tie everything together.
The motherboard, more or less, in a computer, it defines the computer type,
upgradeability, and expansion capability.
TYPES OF MOTHERBOARDS
Non-Integrated Motherboards
Non-Integrated Motherboards have assemblies such as the I/O Port
connectors (serial and parallel ports), hard drive connectors or paddleboards,
floppy controllers and connectors, joystick connections etc. installed as expansion
boards. This takes up one or more of the motherboard's expansion slots and
reduces the amount of free space inside the computer's case. Hence, the
individual motherboard is relatively cheap to produce but, because of the cost of
manufacturing, testing, and installing the expansion boards separately, there's an
added cost to the computer system.
However, if something should go wrong with the individual assemblies,
such as a bent or broken pin in a connector, or a defective controller chip etc.,
40 Computer Hardware
Maintenance
replacing the individual expansion card at a relatively minor cost can cure the
problem.
Most of the older motherboards were Non-Integrated. Some of the later
system boards began to integrate some of these assemblies right onto the circuit
board.
Integrated Motherboards
Integrated Motherboards have assemblies that are otherwise installed as
expansion boards, integrated or built right onto the board. The serial and parallel
ports, the IDE and floppy drive, and joystick all connect directly to the
motherboard. This is now standard on any latest model 486 and above. It tends to
free up some space inside the case and allows for better accessibility and airflow.
The systems are cheaper to produce because there's less material
involved, less installation, and testing can all be done at the same time. They are
more expensive to repair because, if the problem is with a controller failure or
broken pin, it means a new motherboard should be needed (and, of course,
because of the added assemblies, the motherboard can be more expensive than
its non-integrated counterpart).
However, these particular integrated assemblies are generally fairly stable
and although problems can occur, they tend to be fairly rare.
All in all, the integrated motherboard tends to be a good thing as opposed
to the 'Embedded Motherboard'.
Embedded Motherboards
Cost and affordability is a concern for any manufacturer. Make the product
more affordable, and more people will buy it, creating a larger market and
increased sales. This is actually the whole idea behind integrated motherboards,
and that's all an embedded motherboard is, an integrated board.
The difference between the two is a matter of expansion, upgradeability and
configuration. In an effort to reduce the cost (and size) of a computer system even
Computer Hardware 41
Maintenance
more, manufacturers began integrating (or embedding) technologies such as
video, sound, networking and modems right onto the system board. This
dramatically increases the cost of the main board, but reduces the cost of the
overall system for the reasons we've discussed earlier.
In the upgrade of sound or video technology, modem quits working or the
sound card gives out and needs a new (expensive) motherboard. But the
manufacturer says that an upgrade or bypass a particular feature by installing an
adapter card and disabling the embedded device (sometimes). Well, this is where
a few problems tend to crop up.
Some devices are disabled as soon as another device is installed (such as
a video card in an AGP slot). Others have to be disabled through software setup
programs, or by system's CMOS setup, or by setting jumpers on the motherboard
itself, or both (and remember, some can't be upgraded, bypassed or disabled at
all).
A lot of embedded system boards can be very picky about the model and
manufacturer of the device.
Embedded systems definitely have a niche in today's marketplace. Laptop
and Notebook computers are becoming smaller and lighter, and yet more like full-
featured desktops. A few tradeoffs are not only tolerated, but also expected.
FORM FACTORS
Form factors define the size, shape, and screw placement on a
motherboard. It's usually the technological advancements that have been achieved
that allow for these changes so the form factors also define the technology to
some extent.
It's important to understand that none of these standards have to be
adhered to (other than maybe spacing between expansion slots). So, if a certain
manufacturer decides to build a system board with different screw placement or
different dimensions than the standard, it's perfectly acceptable.
42 Computer Hardware
Maintenance
This board then becomes proprietary and can only be replaced by ordering
through the original company. However, if the motherboard adheres to one of the
form factors, and decides to upgrade the motherboard at a future date, or have to
replace it for any reason, then only thing is to buy another motherboard that
follows that standard.
CLOCK
MICRO PROCESSOR
BIOS
Audio
Codec ICH IDE 0
(SOUTH BRIDGE)
RTC IDE 1
PS/2 Keyboard P P P P
C C C C
SIO I I I I
FDD Computer Hardware 1 2 3 3 43
Maintenance
LPT COM 1
Chipset
It is a collection of several intelligence controllers and programmable
chips. Use of chipset simplifies the motherboard design. INTEL, AMD, SIS, OPTI,
VIA, ACI are some of the pioneers in chipset.
The structure of modern chipset is based on North Bridge and south
bridge. The bridges are routers; route data traffic from one bus to another.
North Bridge
North Bridge is also called GMCH (Graphic & Memory Control Hub).
If handles the heavy traffic.Display adaptors such as AGP, VGA are controlled by
North Bridge. Main memory RAM is controlled by GMCH. Commonly GMCH is
located nearer to microprocessors.
In modern motherboard North Bridge has a heat sink to reduce heat
introducing on it. Any faults related to memory and display may be caused by
North Bridge.
South Bridge
44 Computer Hardware
Maintenance
It is also called ICH (Integrated Control Hub). It handles Varity of narrow
routes. ICH controls BIOS, ROMS, RTC, IDE devices such as HDD, CD drive etc.
Add on cards, in PCI & ISA slots, Audio codes etc.
SIO (Super Input Output)
SIO controls I\P, O/P devices such as ps/2 keyboard & mouse, LPT,
comport or serial port, floppy disk drives etc.
Super I/O controller functions
It is a single chip that much like the system chip, performs many
functions that used to take several pieces of hardware in the part. The SIO chip is
responsible for controlling the lower speed peripherals, found in every PC. Since
these devices have been mostly standards they are virtually the same on every PC
and it is easier IO integrate these in to a common chip instead of way about them
for each motherboard design.
The major functions of super IO chips are
i. Serial port control
ii. Parallel port control
iii. Floppy disk drive control
iv. Keyboard & Mouse Control
Computer Hardware 45
Maintenance
or command information. Hence a smart chip is a programmable chip. The
troubleshooting a smart chip related problem is complete and need deep analysis.
MICROPROCESSORS
A brief discussion about different Microprocessors:
1. 8088/8086: 8088 was the first CPU used in the IBM PC computers. It works on
4.77/8/10 MHz clock speed and it has 8-bit external data bus. The internal
data bus is 16 bit and so the name 16 bit CPU. 8088 comes in 40 pins DIP
(Dual In line Package). It uses 20 bit address lines and which can access 1 MB
(Mega byte) of memory locations. 8086 has both internal and external 16-bit
data path. It gives 20% speed as high as 8088. Because it’s external data bus
is 16 bit.
2. 80286: 286 chip was the first used with the IBM PC - AT (Advanced
Technology) computers. It has both internal and external 16 bit data bus and
have 24 bit address by using which it can access 16 MB of physical memory.
3. 80386: It is a 32-bit processor, which was made especially for the high-speed
operations. There are many 386 chips in the market, some of them are:
386 DX - It has 32-bit internal and external data bus. This is
available in 132-pin package and the clock speed is of 16 to 33 MHz.
46 Computer Hardware
Maintenance
It has 32-bit address bus, which allows it to address upto 4 GB (Giga
Bytes) of physical memory.
386 SX - It is 16-bit external bus version of the 386 DX processor.
The address bus is 24 bit, which address only 16 MB of physical
memory.
4. 80486:80486 DX - The important thing about this chip is that it has a built-in
math co-processor and a 8 KB of internal cache memory. These two
improvements has made the 486 CPU very fast compared to the 386
processor. Like 386 DX, the 486 DX chip also has both internal and external
32-bit data bus and 32 bit address bus, which can address 4 GB of physical
memory. Most of the 486 motherboards provide additional 256 KB of external
cache memory. This chip is available in the speed range from 20 MHz to 50
MHz.
80486 SX - The difference between 486 DX and 486 SX is that in 486 SX
processor, Intel has switched off the math co-processor part of the 486 DX
CPU. Internally there is no difference between a 486 SX and 486 DX
processor. Afterwards this same chip with co-processor switched ON is sold
as 80487 SX processor. This is not a co-processor; instead it is a fully
functional 486 DX processor with one extra pin.
80486 DX2 - These are called "clock - doubled” processors. The reason is
that a 66 MHz DX2 processor works internally at the clock speed of 66
MHz, but communicates with the external world at the clock speed of 33
MHz.
80486 DX3 - It is a clock tripled version of 486 chip and is called "blue
thunder" or 486 DX3. A 25 MHz clock tripled 486 DX3 will work at 75 MHz
internally.
80486 DX4 - This DX4 version of the 486 processor works internally four
times the speed than the speed at which it work externally. A 25 MHz 486
Computer Hardware 47
Maintenance
DX4 will work at 100 MHz internally, whereas it will communicate with the
external devices at the 25 MHz clock speed.
5. PENTIUM:This processor has external 64-bit data bus but internally it is 32 bit.
The address bus is 36 bit and can access 4 GB of physical memory. The
Pentium processor has twin data pipe line, which feeds two instructions
together to the processor. This ability is called `Super-scalar Architecture’
and the use of this architecture is called "Multi-threading". Pentium has two
internal cache, one for data and the other for program instructions.
PENTIUM PRO
Pentium pro is designed for server applications. It runs at speeds
around 250 MHz in a 32-bit operating system. Its dynamic execution property
uses random processing to get output in least time.
PENTIUM MMX
This version of Pentium adds three new features:
1. It includes 57 new instructions for better audio, video and graphics.
2. It uses Single Instruction Multiple Data (SIMD) technology, which enables
one instruction to give instruction to several pieces of data.
3. Cache size is doubled to 32 KB.
Pentium II
Relea
1997
sed
Speed 233MHz to 400MHz
L1 cache 32KB
SEC (Single Edge
Layout
Contact)
48 Computer Hardware
Maintenance
Intel family of processors
DATA ADDRE
SPEED No. OF
CHIP YEAR BUS SS BUS
(In MHz) TRANSISTOR
(In bits) (In bits)
8080 1974 8 8 2 6000
8086 1978 16 20 5 to10 29000
8088 1979 8 20 4.77 29000
80286 1982 16 24 8 to12 34000
80386DX 1985 32 32 16 to 33 275000
80386SX 1988 32 24 16 to 20 275000
486DX 1989 32 32 25 to 50 1.2million
486SX 1991 32 32 16 to 33 1.185 million
487SX 1991 32 32 16 to 33 1.2 million
486DX2 1991 32 32 33 to 66 2million
486DX4 1992 32 32 75 to 100 2.5 million
Pentium 1993 32 32 60 to 166 3.3 million
Pentium pro 1995 64 32 150 to 200 5.5 million
Pentium II 1997 64 64 233 to 300 7.5 million
Pentium II
1998 64 64 400 to 600 7.5 million
xeon
400 to
Celeron 1999 64 64 7.5 million
1700
350 to
Pentium III 1999 64 64 9.5 million
1200
Pentium III 350 to 9.5 million
1999 64 64
xenon 1000
Pentium 4 2000 64 64 From 1400 221 million
Computer Hardware 49
Maintenance
Arithmetic processors: This is a special type of processor meant for doing
only arithmetic operations. Though this is physically separate, it will be utilized by
the CPU to execute a class of arithmetic instructions. In the absence of arithmetic
processor, these instructions may be executed using software.
If an arithmetic processor is treated as one of the I/O or peripheral unit, it is
termed as peripheral processor.
If the arithmetic processor has register and instruction set, which can be
considered extension of the CPU registers and instruction, it is called Co-
processor. Co-processor unlike peripheral processors, are tailor made of a
particular family of CPUs. Normally each CPU is designed to have a co-processor
interface.
Instruction set: An instruction set is a collection of all the instructions a CPU can
execute. A CPU’s processing power is measured in Million Instructions Per
Second (MIPS).
Different Control Signals of Microprocessor
1. Memory Read: Output signal from the microprocessor; indicates that the
microprocessor wants to read from the memory.
2. Memory Write: Output signal from the microprocessor; indicates that the
microprocessor wants to write into the memory.
3. I/0 Read: O/P signal from the microprocessor; indicates that the
microprocessor wants to read the data from an input devices.
4. I/0 Write: Output signal the microprocessor; indicates that the
microprocessor wants to send data to an output device.
5. Interrupt: This is an input signal to the microprocessor from the interrupt
controller.
6. INTR: When any interrupt is given to processor it goes to interrupt controller
then this interrupt logic given an INTR signal to microprocessor, the
50 Computer Hardware
Maintenance
microprocessor gives an interrupt acknowledgement signal or INTA. Then
interrupt signal give to microprocessor.
7. INTA(Interrupt Acknowledgement): This is an output signal from the
microprocessor, sent in response to the interrupt signal.
8. Reset: This is an input signal to the microprocessor. This is generates by
the Hardware under two conditions.
1) When the computer power is switched on
2) When manual reset is performed by the Operator.
9. Ready: This is input signal to the microprocessor. This signal synchronizes
the microprocessor with the memory (or I/O devices) so that slower
memories (or I/O devices) can be interfaced to the microprocessor.
10. Clock: This is an input signal to the microprocessor. The frequency of this
signal decides the operating speed of the microprocessor. Each
microprocessor will have a maximum operating speed. If the clock
frequency exceeds this speed, the microprocessor will malfunction.
INTERCONNECTION STRUCTURES
A computer consists of three basic components.
CPU
Memory and
Input/output components
To exchange data among these three components, we need to have an
interconnection structure, which allows transfer of information among all these.
Different forms of data transfer are:
From memory to CPU
From CPU to memory
From input/output device to CPU
From CPU to input/output device
Computer Hardware 51
Maintenance
From input/output device to memory
From memory to input/output device
Bus interconnection
A Bus is a set of connections between to or more components/devices,
which are designed to transfer data from a specific source to destination. It is a
shared media of information transfer.
A computer system contains several numbers of buses, which provide
pathways among several devices. A shared bus that connects CPU, memory and
input/output is called a system bus.
A system bus consists of number of lines. They are broadly categorized in
to three functional groups
Data lines or Data Bus
Address lines or Address Bus
Control lines or Control Bus
The data bus provides a path for moving data between the system
modules. The number of lines in a data bus is called the width of data bus. A data
bus width limits the maximum number of bits, which can be transferred
simultaneously between two modules.
The address bus is used to designate the source of data for data bus.
For reading or writing any information on to memory CPU need to specify the
address of a particular location. The address bus supplies this address. The
width of the address bus specifies the maximum memory supported by a
system. The control bus is used for transmission of commands and timing
signals between the system modules. Some of the controls signals are for: bus
request, bus grant, providing clock signals, providing reset signals,
reading/writing to I/O devices or memory etc.
52 Computer Hardware
Maintenance
EXPANSION BUS
The expansion bus is the
backbone of the computer system.
To add any device to the system,
other than what is on the
motherboard, we need the
expansion bus. These are long thin
connectors on the motherboard on
which one can connect many
expansion cards such as display
card floppy drive/hard drive controller card, sound card,
network card etc. The expansion bus can be divided into
the following categories.
ISA Bus: ISA stands for Industry Standard Architecture. These are black
coloured expansion slots with 62 pins. This bus was originally designed to transfer
8 megabits per second (Mbps). This had 8-bit path, which was compatible to 8085,
and 8088 CPUs. When 80286 was released there became a need for 16-bit cards.
ISA was modified to allow 8-bit or 16 bit adapters.
EISA Bus: Extended Industry Standard Architecture. It is a 32-bit bus. This
supports the ISA. It has a height double that of ISA. The edge connector of the
EISA adaptor is longer than the connector on the ISA connector. EISA runs at
8Mhz and can transmit 32 bit at a time. This supports 32-bit 80386 processor.
EISA cards are configured using software. The manufacturers of the card usually
provide a software utility for this purpose.
MCA: IBM introduced Micro Channel Architecture. It supports 32-bit processors. It
operates at 10 MHZ and the data transfer rate is 16 Mbps or 32 Mbps. It is
configured using software.
VESA BUS: Local bus is designed to communication devices with CPU at the
speed CPU capable of. One such bus is the VESA Local Bus or VLBUS. VESA
Computer Hardware 53
Maintenance
stands for Video Electronics Standard Association. It could transfer 32-bits of
information at a time and ran at a speed of 40 MHz. It was originally designed for
Video cards. It was later used for hard drive controllers and network cards. VESA
bus had problems with bus speeds in excess of 40 MHz.
PCI: PCI stands for Peripheral Component Interconnect or Interface. It offers 32
bit or 64 bit path and it can support up to 10 devices and operates with a speed
of 60 to 66 MHz. Most new PCI cards are software configurable and usually
support the new Plug and Play standard to automatically configure the card.
PCMCIA: It stands for Personal Computer Memory Card International Association.
It is a new type of bus mainly used for notebook and laptop computers.
MOTHERBOARD PORTS
1. Serial port: Get a motherboard with two serial port is usually for a serial
mouse, and another serial port is typically for an external modem. If your
motherboard does not offer serial port, you can add serial port by installing a multi-
IO card in to an available expansion slot.
2. Parallel port: If you plan to use a parallel port (or other parallel port devices
such as a CD drive), at least one parallel port will be necessity. Virtually all
motherboards provide one parallel port.
3. Keyboard port: The keyboard port may be soldered directly to the motherboard
itself, or there may be a cable header from the motherboard to a keyboard
connector at the case. Modern motherboard includes a built in PS/2 keyboard port.
4. Mouse port : Although you can easily install a serial mouse on an existing
serial port , you may choose to get a motherboard with a built in PS/2 mouse port.
This frees up the second serial port for other uses (such as a serial printer)
5. USB port: While a USB port is not required, it is standard equipment on most
new motherboards. The USB port offers a fast and convenient means of
connecting several USB devices without even having turn off the pc.
54 Computer Hardware
Maintenance
6. MIDI or Game port : A 15 pin connector on the sound board. This is the MIDI
port if you have a MIDI instrument you can connect it to the soundboard and
compose your own music; you can switch the MIDI port to serve as a standard
joystick port. You can enable or disable the game port through a jumper on the
soundboard.
Expansion slots
Motherboard alone rarely offers all the features that you need for your
computer. You can easily add other devices to the motherboard by plugging them
in to expansion slots (or bus slots). There are five different architecture to be
familiar, with ISA, PCI, PCI Express, AGP, USB, and AMR.
PCI Express
Note: The abbreviation "PCI-X" refers to a previous standard (PCI Extended) and
should never be used to refer to PCI Express.
PCI Express slots come in different lengths, which are referred to as in numbers of
x-es, where the number is from geometric progression. Currently there are 1x, 2x,
4x, 8x, and 16x, similar to AGP, which came in 1x, 2x and 4x versions.
PCI EXPRESS
Computer Hardware 55
Maintenance
PCI Express slots (from top to bottom: x4, x16, x1 and x16), compared to a
traditional 32-bit PCI slot (bottom), as seen on DFI's LanParty nF4 Ultra-D
An AGP slot (maroon, although the color is usually brown) and two PCI slots
USB
The universal serial bus (USB) is a well established architecture that
allows you to add devices outside of the PC. The devices can also be installed and
removed while the system in running (called hot swapping). Many modern
motherboards will offer two or four USB ports.
AMR
ADD-ON CARDS
56 Computer Hardware
Maintenance
The ADD-ON cards are used to add other external features to the computer. The
commonly used add on cards are
1. Network card (NIC)
2. Sound card
3. Display Card
4. TV Tuner card
NETWORK CARD
A network card, network adapter or NIC (network interface card) is a piece of
computer hardware designed to allow computers to communicate over a computer
network.A network card typically has a twisted pair, BNC socket where the
network cable is connected, and a few LEDs to inform the user of whether the
network is active, and whether or not there is data being transmitted on it. The
Network Cards are typically available in 10/100/1000 Mbit/s(Mbit/s). This means
they can support a transfer rate of 10 or 100 or 1000 Megabits per second
Common Manufacturers:
3Com
D-Link
Novell
Intel
Realtek
SOUND CARD
A sound card (also known as an audio card) is a computer expansion card that
can input and output sound under control of computer programs. Typical uses of
Computer Hardware 57
Maintenance
sound cards include providing the audio component for multimedia applications
such as music composition, editing video or audio, presentation/education, and
entertainment (games). Many computers have sound capabilities built in, while
others require these expansion cards if audio capability is desired.
Color Function
58 Computer Hardware
Maintenance
Light blue Analog line level input.
Lime Analog line level output for the main stereo signal (front speakers or
green headphones).
DISPLAY CARD
Connects to:
o PCI
o AGP
o PCI Express
Computer Hardware 59
Maintenance
The term is usually used to refer to a separate, dedicated expansion card that is
plugged into a slot on the computer's motherboard, as opposed to a graphics
controller integrated into the motherboard chipset.
Some video cards offer added functionalities, such as video capture, TV tuner
adapter, MPEG-2 and MPEG-4 decoding or even FireWire, mouse, light pen or
joystick connectors.
Computer Hardware 61
Maintenance
using a natural language alphabet. Assembly language must be assembled
into object code via an assembler.
Types of software
62 Computer Hardware
Maintenance
because the IDE usually has an advanced graphical user interface, or
GUI.
System Software
Computer Hardware 63
Maintenance
System software is a collection of programs that directly control the
computers internal operations and also that help ordinary users to make use of a
computer effectively and efficiently.
1(A). Operating System
There are many resources in a computer system like CPU
time, memory space, files, 1/0 devices etc. The operating system controls these
resources and allocates them to the users or their programs as and when
necessary. The operating system, which acts as an interface between the user
and the hardware, is a set of programs that control, and co-ordinate the operations
of a computer and help to make efficient use of its resources.
64 Computer Hardware
Maintenance
Directories: A directory is a special file, which lists a group of files. Storing groups of files
in different directories make files easier to find. The directory you are in is called current
directory. A directory within a directory is called sub directory.
Root directory is the starting point from which all other directories branch out. The
root directory does not have any name. It is represented by a back slash (\).
Drive: A drive is always represented by drive letter. A floppy drive is drive A. If there is a
second drive it is B. Hard disk drive starts from drive C. Depending upon the number of
hard disk and CD Drives present, it is designated from C to Z.
DOS Commands
There are two types of DOS commands, Internal and External
Internal commands execute immediately because they are built into DOS. Therefore,
once DOS is loaded, you do not need the DOS diskette in a drive to use their commands.
Some of the Internal commands are: CLS, DATE, PROMPT, COPY, DEL, MD, REN,
TIME, CD, DIR, PATH, RD, TYPE etc.
External commands are on disks as program files. They must be read from the disk
before they are executed. This means that the disk containing the command must be in a
drive. Some of the external commands are: FDISK, MORE, ATTRIB, FORMAT, LABEL,
PRINT, XCOPY, DISKCOPY etc.
THE PROMPT: A prompt is simply a message inviting you to enter some command.
Whenever you see the DOS prompt, you may enter a line of input. Since this input
instructs DOS to perform some action, it is called a command.
MS DOS Commands
The rd command
To remove a directory
rd <>directory name
To remove a directory, the directory must be empty. And it can be removed from
its parent directory only.
The cd command - To go to a different directory
cd <> directory name (including path)
The dir command - To list the contents of a directory
dir
To list the contents page by page
dir/p
To list the contents column by column
dir/w
The copy command
To Copy a file
copy <> source file <> destination
The move command
To move a file
move <> source file <> destination
The ren command
To rename a File
ren <> old name < > new name.
The attrib command
To change the attributes of a file
attrib <> file name <> attribute.
The more Command
The MORE command is used to pause vertical scrolling
on the display screen after each screen. An indication that more
text is to be displayed is given by the message—MORE— that
appears on the last line of the screen. You can press any key to
display the next screen of information.
However, if you want the scrolling to stop wherever you
want it to, CTRL-S is the only choice.
The type command
66 Computer Hardware
Maintenance
The command displays the contents of standard text (ASCII) files
on your screen. The general form of the TYPE command is
type filename
The contents of the file are displayed on the screen. Scrolling of the text takes
place till the last line of the file is displayed followed by the DOS prompt if it contains more
than one screen of data.
The prompt command
A novice computer user may not understand that a C indicates that the computer
the entire path that leads some instruction you may wish to display a prompt that
says “Enter a command.”
Special characters used soon after the dollar ($) sign are listed
$ Displays $ (the dollar sign)
b Displays | (the vertical bar)
d Displays the system date
e The Escape character (^D)
g Displays (the greater than symbol)
1 Displays (the less than sign)
n Displays the default drive letter
p Displays the default drive and directory pathname
q Displays = (the equal to sign)
v Displays DOS’ version number
t Displays the system time
The date command
This command is used to Display the date with an option to change it.
The time command
This command displays time and allows user to change the time if required.
The diskcopy command
This command makes an exact copy of one
removable disk (the source disk) on another (target disk).
The form of the diskcopy command is
diskcopy A: B:
Computer Hardware 67
Maintenance
A: is the disk drive containing the source disk (the disk that has to be copied)
B: is the disk drive containing the target disk (the disk to
which the copy is transferred)
BATCH FILES
A batch file is one that contains a set of DOS commands.
All batch files must have the extension .BAT and they can
contain valid DOS commands (internal or external)
A batch file is an executable file. Just typing its primary
name at the DOS prompt and pressing the Enter key can
execute it. The commands contained in it are acted upon
automatically one line at a time in the order entered.
The AUTOEXEC.BAT file
If a batch file is given the special filename
AUTOEXEC.BAT, it is executed automatically when you first
start your computer.
The cls command It is used to clear the screen
The format command
The command makes a disk usable. It creates magnetic
tracks and sector that are readable by DOS. It checks the
diskette for bad spots, builds a directory to hold information and
optionally be written on it, and optionally, copies the DOS
system files onto diskette.
It follows the syntax: format [drive]
NOTE: FORMAT should be used only when you are going to use a new diskette for the
first time or when your diskette has some defective areas.
The XCOPY command
This command is used to selectively copy files from one disk to another, or thise
files that have been created or modified since the last backup.
The general from of the XCOPY command is
XCOPY <source disk> <target disk> <\path\filename<option>
68 Computer Hardware
Maintenance
Without any options XCOPY functions just like the COPY command.
The options and their effect on the XCOPY command:
/D Copies all files that are of the same date or later than a specified date.
/E Creates subdirectories on the target disk even if the
new subdirectories are created when none of the files in those
subdirectories satisfy the selection criteria specified by other
options.
/P Prompts you to enter either Y or N before copying each file.
/S Copies files from the source disk that lie within all
lower level subdirectories of the active directory. XCOPY
searches through the directory tree. This option does not create
new directory paths on the target disk unless the /E option is
also used.
GUIs are systems that allow creation and manipulation of user interfaces
employing windows, menus, icons, dialog boxes, mouse and keyboard.
Terms used commonly with GUIs:
Pointing device: It allows users to point at different parts of the screen. Pointing devices
can be used to invoke a command from a list of commands presented in a menu. They
can be also used to manipulate objects on the screen by:
Selecting objects on the screen
Moving objects around the screen
Merging several objects into another object
Bit mapped displays: It is made up of tiny dots called pixels that are independently
addressable and much finer resolutions than character displays. It has the advantage of
graphic manipulation.
Computer Hardware 69
Maintenance
Windows: When a section is split up into several independent regions, each one is called
a window. Several applications can display results simultaneously. The user can switch
from one window to another.
Menus: A menu displays a list of commands within an application
Dialog boxes: Dialog boxes are used to collect information from the user or to present
information to the user. Dialog boxes are also used to indicate error messages in the form
of alert boxes.
Icons: Icons are used to provide a symbolic representation of any system/user-defined
object such as file or folder.
Some of the GUI operating systems:
Windows 95, Windows 98, Windows ME, Windows NT, Windows 2000, Windows
2003, Macintosh Toolbox, Linux, etc
COMPUTER VIRUS
A computer virus is a computer program that can copy itself and infect a
computer without permission or knowledge of the user. The original may
modify the copies or the copies may modify themselves, as occurs in a
metamorphic virus. A virus can only spread from one computer to another
when its host is taken to the uninfected computer, for instance by a user
sending it over a network or carrying it on a removable medium such as a
floppy disk, CD, USB drive or by the Internet. Additionally, viruses can
spread to other computers by infecting files on a network file system or a file
system that is accessed by another computer. Viruses are sometimes
confused with computer worms and Trojan horses. A worm, however, can
spread itself to other computers without needing to be transferred as part of
a host. A Trojan horse is a file that appears harmless until executed. In
contrast to viruses, Trojan horses do not insert their code into other
computer files. Many personal computers are now connected to the Internet
and to local-area networks, facilitating their spread. Today's viruses may
70 Computer Hardware
Maintenance
also take advantage of network services such as the World Wide Web, e-
mail, and file sharing systems to spread, blurring the line between viruses
and worms. Furthermore, some sources use an alternative terminology in
which a virus is any form of self-replicating malware.
The term comes from the term virus in biology. A computer virus reproduces
by making (possibly modified) copies of itself in the computer's memory,
storage, or over a network. This is similar to the way a biological virus works.
Computer Hardware 71
Maintenance
Most commercial antivirus software uses both of these approaches, with an
emphasis on the virus dictionary approach.
Usually, the term antivirus has also been used for benign computer viruses
that spread and combated malicious viruses. This was common on the
Amiga computer platform.2
In the virus dictionary approach, when the antivirus software looks at a file, it
refers to a dictionary of known viruses that the authors of the antivirus
software have identified. If a piece of code in the file matches any virus
identified in the dictionary, then the antivirus software can take one of the
following actions:
1. attempt to repair the file by removing the virus itself from the file
2. quarantine the file (such that the file remains inaccessible to other
programs and its virus can no longer spread)
3. delete the infected file
LINUX – An Introduction
History - UNIX
In order to understand the popularity of Linux, we need to travel back in
time, about 30 years ago...Imagine computers as big as houses, even stadiums.
While the sizes of those computers posed substantial problems, there was one
thing that made this even worse: every computer had a different operating system.
Software was always customized to serve a specific purpose, and software for one
given system didn't run on another system. Being able to work with one system
didn't automatically mean that you could work with another.
It was difficult, both for the users and the system administrators. Computers
were extremely expensive then, and sacrifices had to be made even after the
72 Computer Hardware
Maintenance
original purchase just to get the users to understand how they worked. The total
cost of IT was enormous. Technologically the world was not quite that advanced,
so they had to live with the size for another decade. In 1969, a team of developers
in the Bell Labs laboratories started working on a solution for the software
problem, to address these compatibility issues. They developed a new operating
system, which was:
Computer Hardware 73
Maintenance
the 80's, many people had home computers. By that time, there were several versions of
UNIX available for the PC architecture, but none of them were truly free.
Open Source
The idea behind Open Source software is rather simple: when programmers can
read, distribute and change code, the code will mature. People can adapt it, fix it, debug it,
and they can do it at a speed that dwarfs the performance of software developers at
conventional companies. This software will be more flexible and of a better quality than
software that has been developed using the conventional channels, because more people
have tested it in more different conditions than the closed software developer ever can.
The Open Source initiative started to make this clear to the commercial world, and very
slowly, commercial vendors are starting to see the point. While lots of academics and
technical people have already been convinced for 20 years now that this is the way to go,
commercial vendors needed applications like the Internet to make them realize they can
profit from Open Source. Now Linux has grown past the stage where it was almost
exclusively an academic system, useful only to a handful of people with a technical
background. Now Linux provides more than the operating system: there is an entire
infrastructure supporting the chain of effort of creating an operating system, of making and
testing programs for it, of bringing everything to the users, of supplying maintenance,
updates and support and customizations, etcetera. Today, Linux is ready to accept the
challenge of a fast-changing world.
Properties of Linux
Linux is free:- As in free beer, they say. If you want to spend absolutely nothing,
you don't even have to pay the price of a CD. Linux can be downloaded in its
entirety from the Internet completely for free. No registration fees, no costs per
user, free updates, and freely available source code in case you want to change
the behavior of your system. Most of all, Linux is free as in free speech: The
license commonly used is the GNU Public License (GPL). The license says that
anybody who may want to do so, has the right to change Linux and eventually to
redistribute a changed version, on the one condition that the code is still available
74 Computer Hardware
Maintenance
after redistribution. In practice, you are free to grab a kernel image, for instance to
add support for tele-transportation machines or time travel and sell your new code,
as long as your customers can still have a copy of that code.
Linux is portable to any hardware platform:- A vendor who wants to sell a new
type of computer and who doesn't know what kind of OS his new machine will run
(say the CPU in your car or washing machine), can take a Linux kernel and make
it work on his hardware, because documentation related to this activity is freely
available. Linux was made to keep on running: As with UNIX, a Linux system
expects to run without rebooting all the time. That is why a lot of tasks are being
executed at night or scheduled automatically for other calm moments, resulting in
higher availability during busier periods and a more balanced use of the hardware.
This property allows for Linux to be applicable also in environments where people
don't have the time or the possibility to control their systems night and day.
Linux is secure and versatile:- The security model used in Linux is based on the
UNIX idea of security, which is known to be robust and of proven quality. But Linux
is not only fit for use as a fort against enemy attacks from the Internet: it will adapt
equally to other situations, utilizing the same high standards for security. Your
development machine or control station will be as secure as your firewall.
Linux is scalable:- From a Palmtop with 2 MB of memory to a petabyte storage
cluster with hundreds of nodes: add or remove the appropriate packages and
Linux fits all. You don't need a supercomputer anymore, because you can use
Linux to do big things using the building blocks provided with the system. If you
want to do little things, such as making an operating system for an embedded
processor or just recycling your old 486, Linux will do that as well.
The Linux OS and Linux applications have very short debug-times :- Because
Linux has been developed and tested by thousands of people, both errors and
people to fix them are found very quickly. It often happens that there are only a
couple of hours between discovery and fixing of a bug.
Linux distributions.
RedHat Linux
SuSE Linux
Mandrake Linux
Computer Hardware 75
Maintenance
Knoppix: an operating system that runs from your CD-ROM, you don't need to
install anything.
Ubuntu Linux
Downloadable ISO-images can be obtained from LinuxISO.org. The main
distributions can be purchased in any decent computer shop.
Working with LINUX
In order to work on a Linux system directly, you will need to provide a user name
and password. You always need to authenticate to the system. Most PC-based Linux
systems have two basic modes for a system to run in: either quick and sober in text
console mode, which looks like DOS with mouse, multitasking and multi-user features, or
in graphical console mode, which looks better but eats more system resources.
Graphical mode
This is the default nowadays on most desktop computers. You know you will
connect to the system using graphical mode when you are first asked for your user name,
and then, in a new window, to type your password. To log in, make sure the mouse
pointer is in the login window, provide your user name and password to the system and
click OK or press Enter.
Text mode
You know you're in text mode when the whole screen is black, showing (in most
cases white) characters. A text mode login screen typically shows some information about
the machine you are working on, the name of the machine and a prompt waiting for you to
log in:
RedHat Linux Release 8.0 (Psyche)
blast login: _
The login is different from a graphical login, in that you have to hit the Enter key
after providing your user name, because there are no buttons on the screen that you can
click with the mouse. Then you should type your password, followed by another Enter.
You won't see any indication that you are entering something, not even an asterisk, and
you won't see the cursor move. But this is normal on Linux and is done for security
reasons.
When the system has accepted you as a valid user, you may get some more
information, called the message of the day, which can be anything. Additionally, it is
76 Computer Hardware
Maintenance
popular on UNIX systems to display a fortune cookie, which contains some general wise
or unwise (this is up to you) thoughts. After that, you will be given a shell, indicated with
the same prompt that you would get in graphical mode.
Quickstart commands in Linux
Command Meaning
ls Displays a list of files in the current working directory, like the dir
command in DOS
cd directory change directories
passwd change the password for the current user
file filename display file type of file with name filename
cat textfile throws content of textfile on the screen
pwd display present working directory
exit or logout leave this session
man command read man pages on command
info command read Info pages on command
apropos string search the whatis database for strings
SL
Windows Software Linux Equivalent/Alternative
No
K-3D ( http://www.k-3d.org/ )
Wings 3D ( http://www.wings3d.com/ )
1 3D Studio Max
Art of Illusion ( http://www.artofillusion.org/ )
Blender ( http://www.blender.org/ )
KuickShow ( http://kuickshow.sourceforge.net/ )
ShowImg ( http://www.jalix.org/projects/showimg/ )
2 ACDSee Gwenview ( http://gwenview.sourceforge.net/ )
GQview ( http://gqview.sourceforge.net/ )
Eye of GNOME ( http://www.gnome.org/projects/eog/ )
okular ( http://kpdf.kde.org/okular/ )
Xpdf ( http://www.foolabs.com/xpdf/ )
3 Adobe Acrobat Reader Evince ( http://www.gnome.org/projects/evince/ )
ePDFView ( http://trac.emma-soft.com/epdfview/ )
KPDF ( http://kpdf.kde.org/ )
4 Adobe Audition Audacity ( http://audacity.sourceforge.net/ )
Skencil ( http://www.skencil.org/ )
Inkscape ( http://www.inkscape.org/ )
5 Adobe Illustrator
Karbon14 ( http://www.koffice.org/karbon/ )
Xara Xtreme for Linux ( http://www.xaraxtreme.org/ )
6 Adobe PageMaker Scribus ( http://www.scribus.net/ )
F-Spot ( http://f-spot.org/Main_Page )
7 Adobe PhotoAlbum KPhotoAlbum ( http://www.kphotoalbum.org/ )
digiKam ( http://www.digikam.org/ )
8 Adobe Photoshop CinePaint ( http://www.cinepaint.org/ )
Krita ( http://www.koffice.org/krita/ )
78 Computer Hardware
Maintenance
GIMP ( http://www.gimp.org/ )
PiTiVi ( http://www.pitivi.org/wiki/Main_Page )
LiVES ( http://lives.sourceforge.net/ )
Kino ( http://www.kinodv.org/ )
9 Adobe Premier
Cinelerra ( http://cvs.cinelerra.org/ )
kdenlive ( http://kdenlive.sourceforge.net/ )
Jahshaka ( http://www.jahshaka.org/ )
Epiphany ( http://www.gnome.org/projects/epiphany/ )
Opera ( http://www.opera.com/download/ )
10 Microsoft Internet Explorer
Firefox ( http://www.mozilla.com/firefox/ )
Konqueror ( http://www.konqueror.org/ )
80 Computer Hardware
Maintenance
REFERENCES
Laptop Servicing
Power Control Devices Servicing
Computer Hardware & Networking
Smartphone Servicing
Computerised Mobile Phone Servicing
Digital Imaging with Album Designing
Web Page Designing & Development
2D & 3D Animation & Video Editing
Refrigeration & Air-Conditioning
Radiographic (X-ray) Welding
Pipe Fabrication & Fitting
TIG Welding (1G to 6G)
Electrical Wiring
Da Visit us : www.datapro.in
data
Computer Hardware
pro
82
Maintenance
Computer Hardware 83
Maintenance