You are on page 1of 345

Chapter 1

Fundamentals of PC Components
What is Computer?
The Word Computer comes from the word compute which, means to calculate. But now days, computers are also being used for many other purposes else calculating. (See Pictures 1.1 end of the book)
Thus the computer can be defined as: It is an electronic device which accepts instructions in the form of input and after processing it gives us information in the form of output.

Brief History of Computer


The abacus, shown in below, is a calculator; its first recorded use was circa 500 B.C. The Chinese used it to add, subtract, multiply, and divide.

1. In 17th Century BLAISE PASCAL a mathematician and scientist of

France developed the first mechanical calculator, which he called the Pascalins.
Page No.1 Computer Hardware & Network Professional July 2011

2. CHARLES BABBAGE a mathematician of UK in 1822 designed a

special type of calculator called difference Engine and in 1833 he developed a machine called ANALYTICAL ENGINE. 3. Later on American Scientists Working at Howard University developed a computer between 1937 and 1943 called Howard Mark-I. 4. First electronic computer was developed in 1946 at the University of Pennsylvania USA.
5. First Personal computer (PC) was developed in 1981.

Classification of Computers
Computer is classified according to their size, Technology and the working principal into different categories. 1) Depending upon their size 2) Depending upon Working Principle 3) Depending upon Technology

Depending Upon Their Size:

Super Computer: Fastest, Most Powerful, Most expensive, Large in size and Memory, Multi User. The first Cray Super Computer was introduced in 1976.

Mainframe Computer: Less powerful than Super Computer, Large in size and memory, Multi user, Expensive.

Page No.2

Computer Hardware & Network Professional July 2011

Mini Computers: Less powerful than Mainframe, Medium Sized, Multi-user, Expensive.

Microcomputer: Single user, Powerful Enough, In expensive, Personal Computer

Depending upon their working Principle

(a)

Analog Computer:

Such a type of computer in which input is given in the form of digits but the output is receiving in graphical form. This output is correct 90% to 95% (i.e. Wall Clock, Thermometer, Magnetic Needle etc.) (b) Digital Computer

Digital computer that in which input is given in the form of digits and output is also received in form of digits (Digital Watch, Calculator etc.)
(c) Hybrid Computer

Page No.3

Computer Hardware & Network Professional July 2011

These computers have both properties analog and digital. Hybrid Computer given output in both digits and graphs all PC are the Hybrid computers having both properties.

Introduction to Personal Computers


Personal computer is also called Microcomputer. Microcomputer was designed to be one person at a time. These are small in size and mainly used in Accounting, Database, Word Processing and Spread Sheet packages etc.

Intel Based microcomputer is of two categories;

Old Series:

8088, 8086, 80286, 80386, 80486 and 80586

New Series: Pentium Pentium Core.

I,

Pentium

II

Pentium

III,

Celeron,

Pentium

4,

Branded Computer:
These computers are assemble or manufactured a company and marketed them with a special name. For example IBM, APPLE, ACER, COMPAQ, HEWLLETT PACKARD (HP), DELL and so on. These are high quality, high cost machines.

UN-Branded Computer:
These computers have no special name but these recognize with its technology like Pentium 1 or Pentium 4. They are normally assembled with different companies parts. They are cheap and less reliable machines.

PCs normally come in four sizes & Shapes; Desk Top PC


Page No.4 Computer Hardware & Network Professional July 2011

Tower PC Laptop PC Palm Top PC

Characteristics of a Computer
1 Speed A Computer is a very fast device. It can perform in a few seconds the amount of work that a human being can do in an entire year. 2 Accuracy

The accuracy of a computer is consistently high and the degree of accuracy of a particular computer depends upon its design.

Diligence

A computer is free from monotony, tiredness and lack concentrations. It can do work for hours.

Versatility

Versatility is one of the most wonderful things about the computer. It can do many types of work such as preparing results, bills, letters etc.

No. IQ

A computer cannot take its own decision in this regard.

No Feeling

Computers have no feelings and no instinct because they are machines.

Information
Page No.5 Computer Hardware & Network Professional July 2011

The processed form of data is called information. Information conveys meaning and is useful to one or more people.

Information Processing Cycle (IPC)


Information processing cycle consists of a series of tasks or steps required to convert data into information. Different steps of information processing cycle are as follows.

Input
Collection Verification

Processing
Manipulation Classify Sorting Calculation

Output
Decode View/Store

INPUT
Everything that we give to the computer system through input devices is called input.

Input Devices
An input device is any hardware component that allows you to enter data or instruction into a computer. Most commonly used input devices are the keyboard, mouse, microphone, scanner, digital camera, and PC video camera. (See Pictures 1.2)

KEYBOARD 1 Computer keyboards are similar to electric-typewriter keyboards but contain additional keys. Keyboard is 2

MOUSE A device that controls the movement of the cursor or pointer on a display screen.

Page No.6

Computer Hardware & Network Professional July 2011

use to enter data into a computer. GLIDE PAD Track Ball 3 A trackball is a specific style of computer mouse. User track the ball with his finger and arrow move the on-screen. SCANNER Scanners or computer scanners are used to transfer images or text into a computer. 4 A Glide Pad, also called touchpad, track pad is a pointing device consisting of specialized surface that can translate the motion and position of a user's fingers to a relative position on screen. MICROPHONE A microphone used to converts voice or sjound into an electrical signal.

WEB CAM DIGITAL CAMERA 7 A digital camera is a camera that takes video or still photographs. 8 A webcam is a video camera which feeds its images in real time to a computer

BARCODE READER 9 A barcode reader (or barcode scanner) is an electronic device for reading printed barcodes.

JOY STICK 10 A lever that moves in all directions and controls the movement of a pointer. It use for play Games.

Multimedia:
Multimedia is a combination of sound and images with text and graphics. This would include movies, animation, music, people talking, sound effects like the roar of a crowd, smashing etc.

Page No.7

Computer Hardware & Network Professional July 2011

OUT PUT
Everything that computer display after processing is called output.

Types of Output:1: Hard Form: Printed paper or other permanent media that physically exists. 2: Soft Form: Displayed on screen or by other non-permanent means that not keep physically.

OUTPUT DEVICES
Computer hardware components that are used to receive processed information from computer are called output devices. (See Pictures 1.3)

Monitor / LCD 1 2 Speakers

A monitor or display (sometimes called a visual display unit) is an electronic visual display for computers. Its like TV A loudspeaker (or "speaker") that produces sound in response to an electrical audio signal input. It takes electrical signals from computer and convert them in to text and make an image on paper. A plotter is a computer printing device for printing Big level graphics.

Printers

Plotters

Page No.8

Computer Hardware & Network Professional July 2011

Projector

An LCD projector is a type of video projector for displaying video, images or computer data on a big screen.

Central Processing Unit (CPU)


The Microprocessor, also called the central processing unit, interprets and carries out all the basic instructions that operate the computer. (See Pictures 1.4)

Central Processor Unit


Control Unit (CU) Arithmetic & Logic Unit (ALU)

Input Devices Memory

Output Devices

Storage Devices Processor contains a Control Unit (CU) and an Arithmetic and Logic Unit (ALU). These two components work together to perform processing of operations.

Control Unit (CU)


Page No.9 Computer Hardware & Network Professional July 2011

The control unit is the component of the processor that directs a coordinates most of operations in the computer. The control unit has a rule much like a traffic cops: it interprets each instruction issued by a program and then initiates the appropriate action to carry out the instructions.

Arithmetic Logic Unit (ALU)


The Arithmetic and Logic Unit (ALU) another component of the processor performs arithmetic, comparison, and logical operation. Arithmetic operations include basic calculation such as addition, subtraction, multiplication and division. Logical operation include conditions along with logical operator such as AND, OR, and NOT. For example, if only employees paid hourly can receive overtime pay, the ALU must verify to condition before computing an overtime wage: 1. 2. The employee is paid hourly AND. The employee worked more than 40 hours

Motherboard
The mother board sometime called a system board is the main circuit board of the system unit. It is used to connect all kind of hardware devices.

Ports: A 'port' serves as an interface between the computer and other computers or
peripheral devices. Physically, a port is a specialized outlet on a piece of equipment to which a plug or cable connects. (See Pictures 1.9)

Storage:
Storage refers to the media either data are stored temporarily or permanently. There are two main types of storage.

Page No.10

Computer Hardware & Network Professional July 2011

Primary Storage or Main Memory Secondary Storage

Primary Storage or Main Memory (RAM)


Primary storage, presently known as memory or simply RAM, is the only one directly accessible to the CPU. The CPU continuously reads instructions stored there and executes them as required. Any data actively operated on is also stored there in uniform manner. Memory stores three basic categories of data. Operating system and other system software that control or maintain the computer and its devices Application programs that carry out a specific task such as word processing etc. Data to be processed by the application programs and resulting information. RAM Stands for Random Access Memory. RAM is also called main memory or primary storage, it consists of memory chips that can be read from and written to by the processor and other devices. RAM varies in size like 128 MB, 256 MB, and 512 MB to 2 GB. RAM can not store data and instruction permanently. When we switch off the computer, all data and instructions from RAM are washed or vanished. Therefore it is called volatile memory. (See Pictures 1.5) ROM stands for Read only Memory. It consists of those instructions that prepare the computer for use. ROM instructions are automatically loaded into the Main Memory. These instructions cab only be read but cannot be changed or deleted. It is not possible to write new instructions into the ROM. It stores data and instructions permanently. When we switch off the computer, the instructions stored in the ROM are not lost. Therefore it is called a non-volatile memory.

SECONDARY STORAGE:
It has three types:

Page No.11

Computer Hardware & Network Professional July 2011

Magnetic Disk Optical Disc Flash Memory

Magnetic Disk
It is most widely used storage media for all type of computer. A magnetic disk is a thin circular metal plate or platter coated with magnetic material. Information can be record on or read from the magnetic surface through magnetism. Magnetic disk is a random access storage media.

Types of Magnetic Disk


There are the following types of the magnetic disk. (See Pictures 1.6) 1. Hard Disk 2. Floppy Disk 3. Zip Disk

Optical Disks
Optical disk issued laser technology to read or write information. LASER Stands for Light Amplification through stimulated emission of Radiation Laser beam is used to make tiny holes on the surface of the disk. (See Pictures 1.7)

Compact Disk (CD)


CD is the most popular optical medium. It can hold 650 MB to 800 MB of data. The data on the CD cannot be erased like magnetic diskettes.

DVD
Page No.12 Computer Hardware & Network Professional July 2011

DVD, also known as "Digital Versatile Disc" or "Digital Video Disc", is an optical disc storage media format. Its main uses are video and data storage. DVDs are of the same dimensions as compact discs (CDs), but store more than six times as much data.

Blu-Ray Disc
Blu-ray Disc (official abbreviation BD) is an optical disc storage medium designed to supersede the DVD format. The standard physical medium is a 12 cm plastic optical disc, the same size as DVDs and CDs. Blu-ray Discs contain 25 GB per layer, with dual layer discs (50 GB) the norm for feature-length video discs and additional layers possible in the future.

Flash memory and Drive


Flash memory is a non-volatile computer storage chip that can be electrically erased and reprogrammed. It is primarily used in memory cards, USB flash drives, MP3 players and solid-state drives for general storage and transfer of data between computers and other digital products. It is a specific type of EEPROM (electrically erasable programmable read-only memory) that is erased and programmed in large blocks; in early flash the entire chip had to be erased at once.

USB Drive
A USB flash drive consists of a flash memory data storage device integrated with a USB (Universal Serial Bus) interface. USB flash drives are typically removable and rewritable, and physically much smaller than a floppy disk. Most weigh less than 30 g. Storage capacities in 2010 can be as large as 256 GB with steady improvements in size and price per capacity expected. (See Pictures 1.8)

What is Data?
Page No.13 Computer Hardware & Network Professional July 2011

A collection of facts and figures that we give to the computer for gathering useful results and information is called data. There is three types of data. Alphabetic Data (A to Z) Numeric Data (0 to 9) Alphanumeric Data (A to Z and 0 to 9)

The Binary System.


The binary system of numbers uses the base of 2 (0 and 1). A bit can exist in only two states, No or OFF.

The Units of Storage


Memory Unit
Bit

Value
Smallest unit of information, shorthand term for binary digit 4 bits (Half of a byte) 8 bits (Equal to one character) 16 bits on most personal computers (longer words possible on larger computers)

Nibble Byte Word

Page No.14

Computer Hardware & Network Professional July 2011

Kilobyte (KB) Megabyte (MB)

1024 bytes 1,048,576 bytes (Approximately one million bytes or 1024 KB) 1,073,741,824 bytes (Approximately one billion bytes or 1024 MB) 1024 Gigabyte of data

Gigabyte (GB)

Terabyte (TB)

What is Hertz?
In 1887 German physician Heinrich Hertz demonstrate the effects of electromagnetic radiation through space. In this honor the hertz (Hz) is now the slandered unit for the measurement of the frequency (1 Hz equals one complete cycle per second)

Memory Unit
1000 Hertz 1000 Kilo Hertz 1000 Mega Hertz 1000 Giga Hertz 1000 Tera Hertz 1Kilo Hertz 1Mega Hertz 1Giga Hertz 1 Tera Hertz 1 Peta Hertz

Value
KHZ MHZ GHZ THZ PHZ

Clock Speed :
Page No.15 Computer Hardware & Network Professional July 2011

The frequency of oscillations or clock cycle/sec. It is measured in hertz. Computers today operate in the range 100 MHZ to 3 GHZ and so on.

Introduction to Software
Sets of programs that are used to communicate with computer are called software. Or the programs that we make in the computer are called software (that we can see but not touch). Languages and Packages like MS Words, MS Excel, Basic & COBOL etc. Computer does nothing unless it is given instruction to perform. Software has two types: 1) System Software 2) Application Software 1. System Software System Software consists of the programs that control over all operations of the computer system. System Software has following types: Operating System Translators System Utilities

Operating System: A Software that controls the hardware OR A Software that provides such an environment to user in which he operates computer easily. It is responsible for the flow of data between different components of computers. (See Pictures 1.10) Translators: To execute programs from high level language to computer code (The binary pattern 0 and 1), some system programs are used called translators. These are of following types: 1. Interpreters
Page No.16 Computer Hardware & Network Professional July 2011

2. 3.

Compilers Assemblers

System Utilities: Utilities are system softwares. They provide useful services by performing common tasks such as sorting, merging and copying. 2. Application Software Software designed to do a specific task is called application software. It has two categories: 1) General Software 2) Standard Software General Software: It consists of different languages. Language: All the computers programs and instructions are written in computer language. It is such software in which the programmer makes the programming. Types of language: Low level language High level language Middle level language

Standard Software: Package: Package is such a software in which programming is already made. User just operates this software. In other words we can say that package is a pre-made program. It has following categories: 1. Word Processing (MS-Word, Word perfect, Word pad, Writer)
Computer Hardware & Network Professional July 2011

Page No.17

2. 3. 4.

Spread Sheet (MS- Excel, Lotus 123) Database (MS-Access, Oracle, SQL) Graphics (MS-Paint, Corel draw, Photo shop)

Power Safety Guidelines


The following are some general guidelines to follow when working around computers:

Never wear jewelry or other metal objects when working on a computer. These items pose an electrical threat that can cause shorts, which will destroy components. To avoid spills, never use liquids around electrical equipment. Replace any wrong or damaged power cords or extension immediately. Never allow anything to rest on a power cord. Avoid using extension cords that has loose sockets. These can cause by tripping hazards or short circuits. Keep all electrical covers intact. Make sure all vents are clear and have ample free-air space to allow heat to escape. Some peripheral devices such as laser printers and scanners use high voltages. Before removing any covers or working on any of these devices, be sure to read the manufacturers' manuals carefully. Make sure the proper lighting and work area.

Fire
Fire is not pleasant to think about, but it is a fact of life. A workplace fire can be disastrous both in terms of lost equipment and injury to people. Knowing what to do in the event of a fire can save valuable equipment and, most importantly, lives. Here are a few tips to help prevent fire and protect you: Page No.18 Computer Hardware & Network Professional July 2011

Always know the emergency procedures to be carried out in case of fire at your workplace. Know the location of the nearest fire exits. Know the location of the nearest fire extinguishers and how to use them. Don't overload electrical outlets. Simply knowing the location of a fire extinguisher is of no value unless you know how to use it. If you don't, contact your safety department or local fire department. They will be glad to help you get the training you need. Also, remember that using the wrong type of fire extinguisher can be worse than not using one at all.

There are three basic types of fire extinguishers as shown in the picture below.

Page No.19

Computer Hardware & Network Professional July 2011

Chapter 2

Operating System & Ms.Office


WINDOWS VISTA
The following document covers the basics of working with Windows Vista as well as some basic Windows Vista operations. Logging On to a Vista Station Opening Programs Closing Programs Protecting Your Workstation and Data Logging Off a Vista Station Changing Passwords
http://www.uwec.edu/help/WinVA/wva-basics.htm - top#topLogging

On to a

Vista Station
Before you begin the connection process you will want to make sure the last person using the computer logged off. If you see the standard desktop or a program open, you must log off the previous user. To do this, Logging Off a Vista Station and then continue with the appropriate section below to log in as yourself. 1. Press [Ctrl] + [Alt] + [Delete] All three keys must be pressed together. 2. If someone else was logged on last, a. Click SWITCH USER b. Click OTHER USER 3. In the User name text box, type your username HINT: This is the same as your email username. 4. In the Password text box, type your password EXAMPLE: 2pa$s_worLd 5. Click the LOG ON button OR Press [Enter] You are logged in and the Windows Vista desktop appears. http://www.uwec.edu/help/WinVA/wva-basics.htm - top#topOpening Programs Programs are available through the Start menu and are arranged in folders based on the type of program, such as Microsoft Office or Graphics & Web Design. Page No.20 Computer Hardware & Network Professional July 2011

1. From the Start menu, select All Programs select the desired category A list of available programs appears. 2. From the list of programs, select the desired program The selected program opens. http://www.uwec.edu/help/WinVA/wva-basics.htm - top#topClosing Programs Closing programs before logging off helps protect your data and is strongly recommended. The following instructions will work with most Windows programs. 1. If necessary, save your work For information on saving your work 2. Click CLOSE OR For Office programs, from the File menu , select Exit [Program] http://www.uwec.edu/help/WinVA/wva-basics.htm - top#topProtecting Your Workstation and Data If you are leaving your computer for a short time, recommends that you lock your workstation. This helps prevent unauthorized access and modification to your data or files. Locking your workstation prevents anyone from using your station, but your programs will remain running for quick access when you return to your computer.

Locking Your Workstation


NOTE: You are not able to lock General Access Lab computers. 1. Press [Ctrl] + [Alt] + [Delete] 2. Click LOCK THIS COMPUTER The computer is locked.

Unlocking Your Workstation

Page No.21

Computer Hardware & Network Professional July 2011

1. Press [Ctrl] + [Alt] + [Delete] The login screen appears. 2. In the Password text box, type your password 3. Press [Enter] You are returned to the Windows Vista desktop or the last program that you used. http://www.uwec.edu/help/WinVA/wva-basics.htm - top#topLogging Off a Vista Station Remember to log off your workstation when you are finished using it. Failure to log off can result in unauthorized access or modifications to your data and files.

1. From the Start menu You are logged off.

click MORE

select Log off

http://www.uwec.edu/help/WinVA/wva-basics.htm - top#topChanging Passwords Your password provides important security for your files. While you are required to change it annually, it is recommended that you change it more frequently. Requirements

Passwords must be changed at least once every academic year Passwords must be at least 8 characters long Passwords must include at least 3 of the following: o At least one uppercase letter: A-Z o At least one lowercase letter: a-z o At least one digit: 0-9 o At least one special character: ~ ` @ # $ % ^ & * ( ) + = \ | [ ] { } ?<>

Changing Your Password


1. Press [Ctrl] + [Alt] + [Delete] 2. Click CHANGE A PASSWORD... The Change Password screen appears. Page No.22 Computer Hardware & Network Professional July 2011

3. 4. 5. 6.

In the Old password text box, type your current password In the New password text box, type your desired new password In the Confirm password text box, retype your new password Click OK Your password is now changed.

Recommendations

Do not share your password with others Do not write down your password Do not choose a word or phrase that is commonly known about you
top#topBasic

http://www.uwec.edu/help/WinVA/keycombo.htm

Tasks

Perform With Short Cuts.


Action Press
Display Help F1 Rename the selected item F2 Search for a file or folder F3 Activate the menu bar in the active program F10 Refresh the active window F5 (or Ctrl+R) Open or close the Start menu. Windows logo key Cycle through programs on the taskbar by Windows logo key +Tab using Aero Flip 3-D Display the System Properties dialog box. Windows logo key +Pause Display the desktop. Windows logo key +D Minimize all windows. Windows logo key +M Restore minimized windows to the desktop. Windows logo key +Shift+M Open Computer. Windows logo key +E Search for a file or folder. Windows logo key +F Lock your computer or switch users. Windows logo key +L Open the Run dialog box. Windows logo key +R Maximize the window. Windows logo key +Up Arrow Maximize the window to the left side of the Windows logo key +Left Arrow screen. Maximize the window to the right side of Windows logo key +Right Arrow the screen. Minimize the window. Windows logo key +Down Arrow Minimize all but the active window. Windows logo key +Home Page No.23 Computer Hardware & Network Professional July 2011

Select all items on a page Copy the selected item Cut the selected item Paste the selected item Undo an action Redo an action Open a new window Close the current window Create a new folder Save changes to a note Print a note Open the Start menu Open Task Manager Close the active document Use the arrow keys to switch between open items Change the size of icons on the desktop Use the arrow keys to cycle through programs on the taskbar by using Aero Flip 3-D Select multiple individual items in a window or on the desktop Display properties for the selected item Close the active item, or exit the active program Switch between open items Cycle through items in the order in which they were opened Delete the selected item and move it to the Recycle Bin Delete the selected item without moving it to the Recycle Bin first Cancel the current task Move forward through options Move back through options

Ctrl+A Ctrl+C (or Ctrl+Insert) Ctrl+X Ctrl+V (or Shift+Insert) Ctrl+Z Ctrl+Y Ctrl+N Ctrl+W Ctrl+Shift+N Ctrl+S Ctrl+P Ctrl+Esc Ctrl+Shift+Esc Ctrl+F4 Ctrl+Alt+Tab Ctrl+Mouse scroll wheel Ctrl+Windows logo key +Tab

Ctrl with any Left click Alt+Enter Alt+F4 Alt+Tab Alt+Esc Delete (or Ctrl+D) Shift+Delete Esc Tab Shift+Tab

Cut, Copy, and Paste


Page No.24 Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/WinVA/wva-cut.htm - top#topCopying Items


Copying items places them on the Clipboard. Once copied, you can paste the Clipboard contents, whether it is elsewhere in the same document, into a different document, or into an altogether different application. 1. Select the text, graphic, file, or folder to be copied 2. Press [Ctrl] + [C] The selected contents are saved to the Clipboard. You are now ready to paste.

http://www.uwec.edu/help/WinVA/wva-cut.htm - top#topCutting Items


1. Select the item (text or graphic) to be cut 2. Press [Ctrl] + [X] the selection has been cut and saved to the Clipboard. You are now ready to paste.

http://www.uwec.edu/help/WinVA/wva-cut.htm - top#topPasting Items


1. Copy or cut the desired item(s) 2. Place the insertion point where you want to paste the item 3. Press [Ctrl] + [V] The content is pasted.
http://www.uwec.edu/help/WinVA/wva-cut.htm - top#topMoving

Between

Applications
Key Command
1. Press [Alt] + [Tab] A box appears on the screen showing all open applications. 2. Continue to hold [Alt] while pressing [Tab] to cycle through open programs NOTES: The application must be open to be included in the program list. The application is selected when a box appears around the application icon. Page No.25 Computer Hardware & Network Professional July 2011

3. To open the selected application, release [Alt]

http://www.uwec.edu/help/WinVA/wva-save.htm - top#topSaving a File for the First Time


This procedure is also used when you want to save a copy of the active file to a second location for backup or to create a copy of the file with a different name. 1. With the appropriate program open, from the OFFICE button menu select Save As... The Save As dialog box appears. ,

2. From the Folders list, navigate to the desired save location 3. In the File name text box, type your preferred name for the file 4. Click SAVE The file is saved to the selected location.

Page No.26

Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/WinVA/wva-save.htm - top#topSaving a File That Has Already Been Saved


Once you have saved a file for the first time, saving again is simple. 1. From the OFFICE button menu OR Press [Ctrl] + [S] The file is saved. , select Save

Working with Files http://www.uwec.edu/help/WinVA/filemanage.htm - top#topMoving Files


Moving files allows you to rearrange files and improve organization. The method to move files to the hard-drive or a Flash Drive is similar to copying text.

Moving Files: Cut and Paste Option


1. On the Taskbar, right click START select Explore Windows Explorer opens. 2. Navigate to and select the file you want to move 3. On the Command bar, from the Organize menu OR Right click the file select Cut OR Press [Ctrl] + [X] The file is cut to the clipboard. 4. Navigate to and select the new location for the file 5. On the Command bar, from the Organize menu Paste OR Right click a blank spot in the area select Paste OR Press [Ctrl] + [V] The file is pasted. Page No.27 , select Cut

, select

Computer Hardware & Network Professional July 2011

6. OPTIONAL: To prevent confusion between the original and copied file, rename the filehttp://www.uwec.edu/help/WinVA/filemanage.htm rename#rename

http://www.uwec.edu/help/WinVA/filemanage.htm - top#topRenaming Files


After copying a file, you may want to rename it to prevent confusion between the original and copied file.

Renaming Files: Menu Option


1. Navigate to and select the file you want to rename 2. On the Command bar, from the Organize menu Rename OR Right click the file select Rename The filename will be selected. , select

3. Type the new file name

http://www.uwec.edu/help/WinVA/filemanage.htm - top#topDeleting Files


Deleting files is an easy way to free up space on your diskettes and disk drives. If you are deleting files from the hard-drive, they are placed in the Recycle Bin and remain there until the Recycle Bin is emptied. NOTE: You can recover files from the Recycle Bin before it is emptied. 1. Navigate to ad select the file you want to delete 2. On the Command bar, from the Organize menu Delete OR Right click the file select Delete A confirmation dialog box appears. 3. Click YES , select

http://www.uwec.edu/help/WinVA/filemanage.htm - top#topWorking with the Recycle Bin


Page No.28 Computer Hardware & Network Professional July 2011

Files that are deleted from the hard drive are put into the Recycle Bin, where they will remain until the Recycle Bin is emptiedeven if you turn off your computer. The following steps outline how to restore a file from the Recycle Bin. Using this procedure, the file will be restored to its original location. If you want to change the location, you can use the moving files procedure.

Restoring Single Files from the Recycle Bin: Desktop Option


WARNING: Restoring files from the Recycle Bin works only for files deleted from the hard-drive, not from a diskette or a server. 1. To open the Recycle Bin, on the Desktop, double click RECYCLE BIN

2. Right click the file select Restore

Restoring Single Files from the Recycle Bin: Command Bar Option
1. To open the Recycle Bin, on the Desktop, double click RECYCLE BIN

2. Select the file you wish to restore 3. From the Command bar, click RESTORE THIS ITEM

Restoring All Files from the Recycle Bin


1. To open the Recycle Bin, on the Desktop, double click RECYCLE BIN 2. From the Command bar, click RESTORE ALL ITEMS

Emptying the Recycle Bin


1. To open the Recycle Bin, on the Desktop, double click Page No.29 Computer Hardware & Network Professional July 2011

2. From the Command bar, click EMPTY THE RECYCLE BIN A confirmation dialog box appears. 3. Click YES

Connecting to a Printer
This document contains information on connecting to a printer in Windows Vista.

Connecting to a Network Printer Connecting to a Local Printer

http://www.uwec.edu/help/WinVA/print-connect.htm - top#topConnecting to a Network Printer If you work in a network environment, you will want to connect to one or more printers. The Add Printer Wizard makes this process easy to do. NOTE: These instructions assume that you know the network name of the printer you wish to add. 1. From the Start menu, select Control Panel The Control Panel pane appears. 2. In the Hardware and Sound group, click PRINTER the Printers pane appears. 3. On the Command bar, click ADD A PRINTER the Add Printer wizard appears. 4. Select Add a network, wireless or Bluetooth printer The Printers pane refreshes. 5. From the Select a printer scroll box, select the desired printer OR If you printer is not listed, a. Click THE PRINTER THAT I WANT ISN'T LISTED b. Select Select a shared printer by name c. In the corresponding text box, type the name of the printer (e.g., \\print\citi04) 6. Click NEXT The printer installation begins. Page No.30 Computer Hardware & Network Professional July 2011

You may be prompted to install the printer drivers, an action which requires administrative credentials. 7. If you would like this to be your default printer, select Set as the default printer The option is selected if an checkmark appears before it. 8. Click NEXT 9. OPTIONAL: To test the printer setup, click PRINT A TEST PAGE 10. Click FINISH The printer has been added. http://www.uwec.edu/help/WinVA/print-connect.htm - top#topConnecting to a Local Printer If your computer is not connected to a network, you will want to add a local printer. USB printers are automatically detected and installed by Windows Vista. For all other local printers, follow these instructions. 1. From the Start menu, select Control Panel The Control Panel pane appears. 2. In the Hardware and Sound group, click PRINTER The Printers pane appears. 3. On the Command bar, click ADD A PRINTER The Add Printer wizard appears. 4. Select Add a local printer 5. Verify that Use an existing port is selected 6. From the corresponding pull-down list, select the appropriate port 7. Click NEXT 8. From the Manufacturer scroll box, select the manufacturer of your printer The Printers list updates. 9. From the Printers scroll box, select your printer model 10. Click NEXT 11. Verify the Printer name 12. If you would like this to be your default printer, select Set as the default printer The option is selected if an checkmark appears before it. 13. Click NEXT Installation begins. 14. OPTIONAL: To test the printer setup, click PRINT A TEST PAGE Page No.31 Computer Hardware & Network Professional July 2011

15. Click FINISH The printer has been added.

Selecting a Printer in Windows Vista


The following instructions are written generically for Windows Vista and most Windows programs. 1. Open the document you want to print 2. In a Microsoft Office program, from the OFFICE button Print in other programs, from the File menu select Print... HINT: If the File menu is not visible, press [Alt] The Print dialog box appears. 3. From the Name pull-down list, select the desired printer for the lab you are working in NOTE: If the correct printer does not appear, to add the correct printer to this list. 4. If necessary, make any other adjustments to the dialog box 5. Click OK The document prints to the selected printer.
http://www.uwec.edu/help/winva/fonts.htm - top#topInstalling

select

Fonts from

Other Sources
1. Access the Fonts folder

Page No.32

Computer Hardware & Network Professional July 2011

2. From the File menu select Install New Font HINT: If you do not see the menu bar, press [Alt]. The Add Fonts dialog box appears. 3. Use the Folders scroll box to navigate to the drive and directory

containing your new font(s) 4. From the List of fonts scroll box, select the desired font HINTS: To select multiple fonts, hold down [Ctrl] and click the fonts you want. To select the entire list, click SELECT ALL. 5. At the bottom of the dialog box, verify that Copy fonts to Fonts folder is selected NOTE: The item is selected if a check mark appears before it. 6. Click INSTALL The new font appears in the Fonts folder.

Installing Fonts from Other Sources: Copy & Paste Option


1. Access the Fonts folder 2. In Windows Explorer, navigate to the drive and directory containing your new font(s) and select the desired font(s) 3. From the Edit menu select Copy HINT: If you do not see the menu bar, press [Alt]. OR Press [Ctrl] + [C] Page No.33 Computer Hardware & Network Professional July 2011

4. In the Fonts folder, from the Edit menu select Paste HINT: If you do not see the menu bar, press [Alt]. OR Press [Ctrl] + [V] The Install Fonts Progress dialog box appears.

Personalizing the Appearance of Windows Vista


This document will show you how to personalize the appearance of Windows Vista for your own use.

Accessing the Personalization Settings Changing the Windows Theme Changing the Window Color and Appearance Changing the Desktop Background

http://www.uwec.edu/help/winva/appearnce.htm - top#topAccessing the Personalization Settings


The screen you see after logging in is called the Desktop. You can personalize the Desktop to fit your needs in the Personalization settings.

Accessing the Personalization Settings: Start Menu Option


1. From the Start menu , select Control Panel The Control Panel appears. 2. Click APPEARANCE AND PERSONALIZATION The Appearance and Personalization pane appears. 3. Click PERSONALIZATION The Personalize appearance and sounds pane appears.

Accessing the Personalization Settings: Right Click Option


1. Right click anywhere in a blank part of the Desktop select Personalize Page No.34 Computer Hardware & Network Professional July 2011

The Personalize appearance and sounds pane appears.

http://www.uwec.edu/help/winva/appearnce.htm - top#topChanging the Windows Theme 1. Access the Personalization Settings 2. Click THEME The Theme Settings dialog box appears. 3. From the Theme pull-down menu, select the desired theme 4. Click APPLY The theme is changed. 5. Click OK http://www.uwec.edu/help/winva/a
ppearnce.htm top#tophttp://www.uwec.edu/help/ winva/appearnce.htm top#topChanging the Window

Color and Appearance

Page No.35

Computer Hardware & Network Professional July 2011

Changing the Window Color


1. Access the Personalization Settings 2. Click WINDOW COLOR AND APPEARANCE The Window Color and Appearance pane appears.

3. To select a color, click on the desired color 4. OPTIONAL: To adjust the color intensity, from Color intensity, click and drag the sliding bar 5. To create your own color, a. Click SHOW COLOR MIXER b. From the color mixer, click and drag the sliding bars to adjust the color's Hue, Saturation, and Brightness 6. Click OK The changes are made. You are returned to the Personalize appearance and sounds task pane.

Page No.36

Computer Hardware & Network Professional July 2011

Changing the Window Appearance

1. http://www.uwec.edu/help/winva/appearnce.htm - top#topChanging the Desktop Background


1. Access the Personalization Settings 2. Click DESKTOP BACKGROUND The Desktop Background pane appears. 3. To change the background, from the scroll list, select an image HINT: When you select an image, a preview appears on the desktop. OR To locate an image file a. Click BROWSE... The Browse dialog box appears. b. Navigate to and select the appropriate image file c. Click OPEN Page No.37 Computer Hardware & Network Professional July 2011

4. To change the picture position, from How should the picture be positioned?, select the desired position NOTE: The options are Stretched, Tiled, and Centered. 5. To apply the background, click OK

Working with Screen Savers


Applying a Screen Saver Adjusting Screen Saver Settings Adjusting Power Options

Page No.38

Computer Hardware & Network Professional July 2011

Working with the Sidebar


The Windows Vista Sidebar is a vertical section of the desktop in which a user can display frequently used tools, called Gadgets. Gadgets include clocks, Page No.39 Computer Hardware & Network Professional July 2011

calendars, news feeds, and other helpful objects that allow you to easily access information and personalize your desktop. HINT: The Windows Vista default settings allow the Sidebar to appear on the desktop upon first using Vista. However, if you are unable to see the Sidebar, from the Taskbar, simply click on the Sidebar icon to make it appear.

Accessing Sidebar Properties Changing Sidebar Settings Working with Gadgets Adding Gadgets to the Sidebar Removing Gadget

http://www.uwec.edu/help/WinVA/sidebar.htm - top#topAccessing Sidebar Properties In order to make changes to the Sidebar, you must first access the Sidebar properties.

Accessing Sidebar Properties: Start Menu Option


1. From the Start menu, select Control Panel The Control Panel appears. 2. Click APPEARANCE AND PERSONALIZATION The Appearance and Personalization options appear.

Page No.40

Computer Hardware & Network Professional July 2011

3. Click WINDOWS SIDEBAR PROPERTIES The Windows Sidebar Properties dialog box appears.

Accessing Sidebar Properties: Right Click Option


1. Right click anywhere in a
blank part of the Sidebar frame select Properties The Windows Sidebar Properties dialog box appears.

http://www.uwec.edu/help/Win
VA/sidebar.htm top#topChanging Sidebar

Settings
You can change the location of the Sidebar on the desktop and its Page No.41 Computer Hardware & Network Professional July 2011

visibility in regard to other windows.

1. Access the Sidebar Properties 2. To allow the Sidebar to appear adjacent to open windows, select Sidebar is always on top of other windows HINT: An item is selected if a checkmark appears within the box. 3. To change the location of the Sidebar, from the Display Sidebar on this side of screen option, select Left or Right 4. To make the changes, click APPLY

http://www.uwec.edu/help/WinVA/sidebar.htm - top#topWorking with Gadgets

http://www.uwec.edu/help/WinVA/sidebar.htm - top#topAdding Gadgets to the Sidebar


Your Sidebar will contain only default gadgets until you personalize it. Vista has a selection of gadgets already installed on your computer. You can search for and install more gadgets at the Windows Vista Gadget Gallery. 1. Right click anywhere in a blank part of the Sidebar frame select Add Gadgets... OR From the top of the Sidebar, click GADGETS The Gadget Gallery appears. 2. To add a gadget to the sidebar, double click the gadget OR Drag the gadget to the Sidebar The gadget is added to the Sidebar.

Working with Shortcuts


Page No.42 Computer Hardware & Network Professional July 2011

Creating a shortcut allows you to quickly access files, folders, drives, or programs. This might be useful if you frequently access your drive, a certain folder, or a specific file. It can also be helpful if a class requires you to frequently access a professor's folder from the drive.

Creating a Shortcut Using a Shortcut Deleting a Shortcut

http://www.uwec.edu/help/winva/shrtcut.htm - top#topCreating a Shortcut Folders, drives, printers, programs and general files can be linked with a shortcut. The following section provides instructions for two ways to create a shortcut: the drag method and the quick menu method.

Creating a Shortcut: Drag and Drop Method


1. On the Desktop, click START select Computer [name] Windows Explorer launches, displaying your computer's drives, devices, and networks. 2. Navigate to the file, folder, drive, or printer you want to create a shortcut for 3. Click the item and drag it to the Desktop 4. Release the mouse button The shortcut icon for the selected file or folder appears on your Desktop.

Creating a Shortcut to Files and Folders: Quick Menu Method


1. On the Desktop, click START select Computer [name] Windows Explorer launches, displaying your computer's drives, devices, and networks. 2. Navigate to the file, folder, drive, or printer you want to create a shortcut for 3. Right click the item select Send To select Desktop (create shortcut) The shortcut appears on the desktop. Page No.43 Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/winva/shrtcut.htm - top#topUsing a Shortcut Using a shortcut is as simple as opening the file, folder, drive, program, or printer it references. 1. On the Desktop, double click the shortcut The item which the shortcut references opens. http://www.uwec.edu/help/winva/shrtcut.htm - top#topDeleting a Shortcut Deleting shortcuts is as simple as deleting typical files on your computer. NOTE: Deleting a shortcut does not delete the file or folders it references, nor does it disconnect from the drive or printer it references. 1. On the Desktop, right click the shortcut you wish to delete select Delete A confirmation dialog box appears. 2. Click YES The shortcut is deleted.

The Windows Explorer Environment


Windows Explorer is used to manage files, folders, and drives. It can be used to create folders for storing information, rearrange files or folders, locate files or folders, and delete files or folders that are no longer needed. Windows Explorer also provides functions for burning CDs and mapping network drives, as well as a variety of other file management tools. This document describes many of the components of the Windows Explorer dialog box and provides you with descriptions of the different functions found on the toolbar.

Opening Windows Explorer The Windows Explorer Window The Windows Explorer Command Bar

http://www.uwec.edu/help/winva/exp-basics.htm - open#openOpening Windows Explorer

Page No.44

Computer Hardware & Network Professional July 2011

There are several options for accessing Windows Explorer on campus computers, including the right click option and the Start menu option.

Opening Windows Explorer: Right Click Option


1. On the Taskbar, right click START Windows Explorer opens. select Explore

Opening Windows Explorer: Start Menu Option


1. From the Start menu, select All Programs Accessories Windows Explorer Windows Explorer opens.

Opening Windows Explorer: Creating a Shortcut Option


1. From the Start menu, select All Programs Accessories 2. Right click WINDOWS EXPLORER select Send To Desktop (create shortcut) The shortcut appears on the desktop. 3. From the desktop, double click WINDOWS EXPLORER Windows Explorer opens.

http://www.uwec.edu/help/winva/exp-environ.htm - top#topThe Windows Explorer Window


This section describes the various parts of the window and their respective purposes.

Page No.45

Computer Hardware & Network Professional July 2011

Part of Window Navigation tools Command bar Navigation pane File list File/Folder details pane

Purpose Includes buttons to move forward and back in the navigation history, as well as an address bar and a search bar Contains a dynamic set of commands, decided by which file or folder is currently selected Provides access to the drives and directories available Displays the contents of the selected drive/folder Displays information about the selected item

Windows Explorer Basics


In order to make working with Windows Explorer simple and easy, it is important to learn some basic techniques, terms, and conventions involving Windows Explorer. This document covers the following basic information:

Moving Around in Windows Explorer


Computer Hardware & Network Professional July 2011

Page No.46

Terms File Naming Conventions

http://www.uwec.edu/help/winva/exp-basics.htm - top#topMoving Around in Windows Explorer


As you work with Windows Explorer, you are likely to encounter the following activities. Included with each activity is a brief description of how to accomplish it.

Displaying the Contents of a Folder/Drive


1. Open Windows Explorer. 2. In the Navigation pane, select the appropriate folder/drive name The contents of the folder/drive you selected will appear in the Contents pane.

Displaying the Contents of a Subfolder


1. Open Windows Explorer 2. Select a folder/drive 3. To expand a folder, click EXPAND

4. To view the content of a subfolder, click EXPAND ( ) next to the folder/drive name. To collapse the folder listing, click COLLAPSE ( ). http://www.uwec.edu/help/winva/exp-basics.htm - top#topTerms The terms file, folder, and path are key words to know when working with Windows Explorer. Page No.47 Computer Hardware & Network Professional July 2011

File
A file is a single document that is saved on a flash drive or hard-drive.

Folder
A folder is where files are stored.

Path
A path is the line of folders you must follow to locate a specific file; it begins with the drive designation and includes the folders. For example, c:\data\reports\status.doc is a file named status.doc that is on the C: drive and is in the reports subfolder of the data folder.

About Long Filenames


When working with Windows Vista, you have a lot of flexibility with filenames. Windows Vista supports long file names so you can have up to 255 characters including spaces. When naming your files, you can use all of the alphabetic characters, numeric characters, and spaces. The only characters you may not use are control characters (characters that require a keyboard combination to create) and the characters listed below. \/:*?"<> http://www.uwec.edu/help/winva/exp-folder.htm - top#topCreating Folders Creating a new folder is a valuable technique for organizing and separating files.

1. On the Taskbar, right click START select Explore Windows Explorer opens. 2. Navigate to the location where you want to create a folder 3. Right click a blank area in the Files list select New Folder The new folder appears in the desired location with a default name highlighted. 4. To rename the folder, type the name of the new folder 5. Press [Enter] The folder is named. Page No.48 Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/winva/exp-folder.htm - top#topDeleting Folders When a folder is no longer necessary, you may delete it. WARNING: Deleting a folder will delete all its contents. If you have files you want to keep, be sure to save them outside the folder before deleting.

1. On the Taskbar, right click START select Explore Windows Explorer opens. 2. Navigate to the location of the folder you want to delete 3. Right click the folder select Delete OR Press [Delete] A confirmation dialog box appears. 4. Click YES The folder is deleted.

Working with Compressed Folders


Compressed folders allow you to condense many files into one folder so they take up less space. For example, if you need to send many files to someone, sending one zipped attachment can be much easier and saves more space. This document introduces you to the processes of adding files to a compressed folder and extracting files from it.

Adding Files to a Compressed Folder Extracting Files from a Compressed Folder

http://www.uwec.edu/help/winva/exp-compress.htm - top#topAdding Files to a Compressed Folder


Compressed folders allow you to condense many files into one folder. 1. On the Taskbar, right click START select Explore Windows Explorer opens. 2. Navigate to and select the files you wish to add to the compressed folder HINTS: Page No.49 Computer Hardware & Network Professional July 2011

To select contiguous items, hold [Shift] and click on the desired files. To select non-contiguous items, hold [Ctrl] and click on the desired files. 3. Right click the selected files select Send To Compressed (zipped) Folder A new compressed folder appears in the File list with the name highlighted. 4. OPTIONAL: Type a new name for the folder 5. Press [Enter] The compressed (zip) folder is created. http://www.uwec.edu/help/winva/exp-compress.htm - top#topExtracting Files from a Compressed Folder Before you can access files from the compressed folder, it is recommended that you extract them. This decompresses them back to their original file size. 1. Using Windows Explorer, locate the compressed folder from which you want to extract files 2. Right click the folder select Extract All... The Extract Compressed (Zipped) Folders dialog box appears. 3. In the text box, type the desired location for the files to be extracted OR To find the location, a. Click BROWSE... The Select a destination dialog box appears. b. Navigate to and select the location c. Click OK 4. OPTIONAL: To view the files after extraction, select Show extracted files when complete 5. Click EXTRACT The files are extracted from the compressed folder.

Page No.50

Computer Hardware & Network Professional July 2011

TYPING TUTOR
Typing is another important skill that drives you to a good start in job market and that gives you an edge over the competitors. For typing Improvement you must work hard to get the advantage your start may not be good but after regular practice lesson in lab you will get skilled. Minimum acceptable typing speed hat any of employer can afford is around 40-50 (WPM) words per minute.

Page No.51

Computer Hardware & Network Professional July 2011

Microsoft Word 2007


Introduction
Microsoft Word is part of the Microsoft Office. Its main function is for producing documents that can includes text, graphics, table, clip art, etc. The Microsoft Office Button The Quick Access Toolbar The Title Bar The Ribbon

Page No.52

Computer Hardware & Network Professional July 2011

The Ruler The Text Area

Page No.53

Computer Hardware & Network Professional July 2011

Understanding Document Views


Draft View Draft view is the most frequently used view. You use Draft view to quickly edit your document. Web Layout Web Layout view enables you to see your document as it would appear in a browser such as Internet Explorer. Print Layout The Print Layout view shows the document as it will look when it is printed. Reading Layout Reading Layout view formats your screen to make reading your document more comfortable. Outline View
Page No.54 Computer Hardware & Network Professional July 2011

Outline view displays the document in outline form. You can display headings without the text. If you move a heading, the accompanying text moves with it.

Understanding Nonprinting Characters


Character Denotes A tab . A space The end of a paragraph Hidden text

Document Basics

Creating a New Document Opening an Existing Document Saving a Document Saving in Alternate Formats Printing a Document Closing a Document

http://www.uwec.edu/help/Word07/basics.htm - topCreating a New Document

Creating a New Document: Keyboard Option


Page No.55 Computer Hardware & Network Professional July 2011

1. Press [Ctrl] + [N] NOTES: A new blank document appears. This can be done under any command tab. Creating a New Document: Menu Option 1. From the OFFICE BUTTON , select New The New Document dialog box appears.

2. From the Blank and recent section, click BLANK DOCUMENT A new blank document appears.
http://www.uwec.edu/help/Word07/basics.htm - topOpening

an Existing

Document
Follow these instructions to open already existing documents.

1. From the OFFICE BUTTON , select Open OR Press [Ctrl]+[O] The Open dialog box appears. 2. From the Look in pull-down list, navigate to and select the desired file
Page No.56 Computer Hardware & Network Professional July 2011

To open the file, click OPEN The document is opened.


http://www.uwec.edu/help/Word07/basics.htm - topSaving

a Document

Saving a Document: First Time Use this option if you are saving your document for the first time or if you are saving an already saved file under a new name.

1. From the OFFICE BUTTON , select Save As NOTE: Do not click on the side arrow as it will not allow the Save As function to occur. The Save As dialog box appears.

2. From the Save in pull-down list, make the appropriate selection: To save to your H: drive or another drive, select (H:) or another network drive. 3. In the File name text box, type a filename Press [Ctrl] + [S] OR

Page No.57

Computer Hardware & Network Professional July 2011

From the OFFICE BUTTON , select Save OR On the Quick Access Toolbar, click SAVE The document is saved under the current filename.

Saving in Alternate Formats


Saving in RTF Format Saving in Word 97-2003 Format

http://www.uwec.edu/help/Word07/rtf.htm - top#topSaving in RTF Format

Saving your Word document in RTF (Rich Text Format) file format helps prevent the spread of viruses. The .doc extension has been the #1 file format for virus transmission over the past few years because it allows the attachment of hidden macros, which may actually be viruses. RTF format does not allow appendages such as macros, and, thus, the document cannot contain a virus. Saving in RTF format also preserves your document's formatting for easy transfer between different applications.

Page No.58

Computer Hardware & Network Professional July 2011

1. From the OFFICE BUTTON The Save As dialog box appears.

, click SAVE AS

2. From the Save in pull-down list, navigate to the desired save location 3. In the File name text box, type the desired filename 4. Click SAVE
http://www.uwec.edu/help/Word07/rtf.htm - top#topSaving in Word 97-2003

Format

1. From the OFFICE BUTTON , click the next to SAVE AS select Word 97-2003 Document The Save As dialog box appears. 2. From the Save in pull-down list, navigate to the desired save location. 3. In the File name text box, type the desired filename 4. OPTIONAL: In the Save as type text box, confirm that Word 972003 Document is selected 5. Click SAVE Your document is saved as a Word 97-2003 document.
http://www.uwec.edu/help/Word07/basics.htm - topPrinting

a Document

Page No.59

Computer Hardware & Network Professional July 2011

Printing a Document: Using Print Preview The Print Preview feature is useful for viewing your document prior to printing. You can also print directly from the Print Preview screen.

1. Click the OFFICE BUTTON The OFFICE BUTTON menu appears. 2. From the OFFICE BUTTON menu, click the next to PRINT The Preview and print the document submenu appears. 3. In the Preview and print the document submenu, click PRINT PREVIEW 4. To return to your document without printing, on the Print Preview command tab, click CLOSE PRINT PREVIEW Print Preview closes. To print, on the Print Preview command tab, in the Print group, click PRINT The Print dialog box appears. 5. From the Name pull-down list, select the desired printer 6. In the Page range and Copies sections, make the desired selections HINT: For more information about page range options, refer to Printing Options for Specific Pages. 7. To print your document, click OK
http://www.uwec.edu/help/Word07/basics.htm - topClosing

a Document

Closing a Document: Continuing Word

1. From the OFFICE BUTTON , click CLOSE If you have made changes that have not been saved, a prompt appears asking you if you want to save the document.
Page No.60 Computer Hardware & Network Professional July 2011

2. To save the document, click YES To close without saving, click NO To continue working, click CANCEL

Closing a Document: Exiting Word


1. From the OFFICE BUTTON , click EXIT WORD OR Click CLOSE in the upper right corner of the Word window If you have made changes that have not been saved, a prompt appears asking you if you want to save the document. 2. To save any open document(s), click YES To close without saving, click NO To continue working, click CANCEL

Editing a Document

Editing Basics Selecting Text Making Multiple Selections Using Drag and Drop Deleting Text
http://www.uwec.edu/help/Word07/editing.htm - topEditing Basics

Using the Undo Command


Using the Undo Command: Keyboard Option 1. Press [Ctrl] + [Z] Your last action is reversed.

Page No.61

Computer Hardware & Network Professional July 2011

Using the Undo Command: Ribbon and Standard Toolbar Option 1. To undo your last action, On the Quick Access Toolbar, click UNDO 2. To undo multiple actions, a. On the Quick Access Toolbar, click the to the right of the UNDO button b. Select the action(s) to undo The selected action(s) are reversed.

Using the Redo Command: Ribbon and Standard Toolbar Option 1. To redo your last action, On the Quick Access Toolbar, click REDO
http://www.uwec.edu/help/Word07/editing.htm - topSelecting Text

Lines, Single Words, Single Paragraphs, Multiple Paragraphs, Entire Document Press [Ctrl] + [A] All text is selected. To deselect text: 1. area Click the mouse button anywhere outside or inside the selected text

Page No.62

Computer Hardware & Network Professional July 2011

Making Multiple Selections: Find and Replace Dialog Box


The Multiple Selections feature can also aid you when you want to find and select all occurrences of specific text without searching for all instances manually. 1. From the Home command tab, in the Find group, click FIND OR Press [Ctrl] + [F] The Find and Replace dialog box appears.

2. Select the Find tab. 3. In the Find what text box, type the text to be selected. 4. Click FIND IN select the document area to be searched. 5. Click FIND NEXT OR Click FIND ALL 6. Click CLOSE You are returned to your document. All occurrences of the desired text are selected.

Working with Spell Check


Activating Automatic Spell Check Modifying the Dictionary Correcting Spelling


Computer Hardware & Network Professional July 2011

Page No.63

http://www.uwec.edu/help/Office07/splchck.htm - top#topActivating Automatic Spell Check 1. From the Review command tab, in the Proofing group, click SPELLING & GRAMMAR OR Press [F7] NOTES: The [F7] key can be used from any command tab. The Spelling and Grammar dialog box appears.

2.

In the Spelling and Grammar dialog box, click OPTIONS...

The Options dialog box appears. 3. 4. In the Categories pane, select Proofing To activate Automatic Spell Check, in the When correcting spelling

and grammar in Word section, select Check spelling as you type


NOTE: The option is selected if a checkmark appears in front of it.

5. 6.

Click OK To exit the Spelling and Grammar dialog box, click CANCEL

Page No.64

Computer Hardware & Network Professional July 2011

The Formatting Palette


The Formatting Palette allows you to format your document in areas of font, styles, alignment and spelling, bullets and numbering, borders and shadowing, document margins, and document theme. This document describes each of the main sections of this palette.

Font Styles Alignment and Spacing Bullets and Numbering Borders and Shading Document Margins Document Theme

Paragraph Formatting Options


This document will help you use paragraph formatting options to achieve a desired look for your document.

Changing Paragraph Alignment Adjusting Line Spacing Adjusting Paragraph Spacing Working with Indents

http://www.uwec.edu/help/Word07/fmt-para.htm - top#topChanging Paragraph

Alignment Changing Text Alignment: Write Command Tab Option 1. Select the text to be formatted

Page No.65

Computer Hardware & Network Professional July 2011

2. From the Home command tab, in the Paragraph group, click the appropriate text alignment button

Changing Text Alignment: Keyboard Option 1. Select the text to be formatted 2. To left align the paragraph press [Ctrl] + [L] To center the paragraph press [Ctrl] + [E] To right align the paragraph press [Ctrl] + [R].To justify the paragraph press [Ctrl] + [J]
http://www.uwec.edu/help/Word07/fmt-para.htm top#topAdjusting

Line

Spacing Adjusting Line Spacing: Write Command Tab Option 1. Place the insertion point in the desired paragraph 2. From the Home command tab, in the Paragraph group, click LINE SPACING select the desired line spacing Adjusting Line Spacing: Dialog Box Option 1. Place the insertion point in the desired paragraph 2. From the Home command tab, in the Paragraph group, click PARAGRAPH

Page No.66

Computer Hardware & Network Professional July 2011

The Paragraph dialog box appears.

3. 4. 5.

Select the Indents and Spacing tab From the Line spacing pull-down menu, select the desired spacing Click OK
top#topWorking

http://www.uwec.edu/help/Word07/fmt-para.htm

with

Indents Working with Indents: Paragraph Dialog Box Option 1. Place the insertion point in the desired paragraph HINT: If you are adjusting more than one paragraph, select all desired paragraphs. 2. From the Home command tab, in the Paragraph group, click PARAGRAPH The Paragraph dialog box appears.

Working with Indents: Ruler Option


Page No.67 Computer Hardware & Network Professional July 2011

Instead of using the Paragraph dialog box, you can make indent adjustments using the Ruler. Shown here is a graphic of the Ruler.

Page Formatting Options


Word 2007 comes with many formatting options for all types of documents. This document describes page formatting options can affect a page, a section, or your entire document.

Adjusting Document Margins Numbering Pages Inserting Page Breaks

http://www.uwec.edu/help/Word07/pgfrmt.htm - top#topAdjusting Document Margins The Ruler is used as a quick way to adjust margins. Margins may also be adjusted by using a preset option provided by Word, or through the Page Setup dialog box.

Adjusting Document Margins: Using a Margin Preset Option

Page No.68

Computer Hardware & Network Professional July 2011

1.

From the Page Layout command tab, in the Page Setup group, click

MARGINS

2. Select one of the preset margin options EXAMPLE: Wide for one-inch vertical margins and two-inch horizontal margins

Adjusting Document Margins: Dialog Box Option


To set your own margins, use the Page Setup dialog box. 1. From the Page Layout command tab, in the Page Setup group, click PAGE SETUP The Page Setup dialog box appears.

2. On the Margins tab, in the Margins section, adjust the margins as needed 3. Click OK
Page No.69 Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/Word07/pgfrmt.htm - top#topInserting Page Breaks

section breaks. 1.
2.

Place the insertion point where the new page is to be inserted From the Insert command tab, within the Pages group, click PAGE OR Press [Ctrl] + [Enter]

BREAK

Removing Page Breaks

1. 2.

Select the page break Press [Delete]

Printing Options for Specific Pages


At times, you may want to print only certain pages of your Word documents. The Page From the OFFICE BUTTON The Print dialog box appears. , click PRINT

http://www.uwec.edu/help/Word07/print.htm - top#topSpecifying the Pages to Print 1. Under Page range, select Selection

Page No.70

Computer Hardware & Network Professional July 2011

Printing All Pages of your Document 1. Under Page range, select All

Printing the Current Page 1. Under Page range, select Current page

Printing Non-Contiguous Pages 1. 2. Under Page range, select Pages Type the page numbers separated by commas

Printing a Range of Contiguous Pages 1. 2. Under Page range, select Pages Type the beginning and end page numbers separated by a hyphen

Printing a Combination of Non-Contiguous Pages and a Range 1. Under Page range, select Pages
Computer Hardware & Network Professional July 2011

Page No.71

2. Type the page numbers, separating the noncontiguous pages by commas and the range by a hyphen

Printing a Section of your Document 1. 2. Under Page range, select Pages Type s and the section number

Setting Tabs

Tab Types Working with Tabs from the Ruler Working with Tabs from the Tabs Dialog Box

http://www.uwec.edu/help/Word07/tabs.htm - top#topTab Types

1.

Click the TAB TYPE icon until the desired tab type is selected

Page No.72

Computer Hardware & Network Professional July 2011

2. Click TABS... The Tabs dialog box opens.

Borders and Shading Options


Borders and Shading Options: Ribbon Option Borders and Shading Options: Dialog Box Option

http://www.uwec.edu/help/Word07/bordshad.htm - top#topBorders and Shading Options

Page No.73

Computer Hardware & Network Professional July 2011

Table Basics

This introductory document contains information on the following:


Creating a Table Adding Information to the Table


http://www.uwec.edu/help/Word07/tb-bscs.htm - top#topCreating a Table

Creating a Table: Quick Tables


Page No.74 Computer Hardware & Network Professional July 2011

Word provides several preformatted tables which can easily be inserted with the Quick Tables option. 1. Place the insertion point where you want the table to appear

2. From the Insert tab, in the Tables group, click TABLE The Table sub-menu appears. 3. Select Quick Tables select a preformatted table The preformatted Quick Table appears in your document. 4. Select the preformatted Quick Table sample text and replace it with your own

Creating a Table: Insert Option


1. Place the insertion point where you want the table to appear

2. From the Insert tab, in the Tables group, click TABLE The Table sub-menu appears. 3. Select Insert Table... The Insert Table dialog box appears. Using the Sort Feature
http://www.uwec.edu/help/Word07/tb-sort.htm - top#topSorting a Table

Page No.75

Computer Hardware & Network Professional July 2011

1.

The Sort dialog box appears.

Working with AutoCorrect

http://www.uwec.edu/help/Word07/AUTO-correplace.htm top#topAccessing the AutoCorrect Dialog Box

1. From the File menu, click WORD OPTIONS The Word Options dialog box opens.

2.

In the Categories pane, select Proofing

Page No.76

Computer Hardware & Network Professional July 2011

3. Under AutoCorrect options, click AUTOCORRECT OPTIONS... The AutoCorrect dialog box appears.

Using Clip Art


Button Name Insert Picture Function Inserts a picture from a file

Clip Art

Opens the Clip Art task pane, which provides offline and online searching for clip art to add to your document. Makes all color shades proportionately darker or lighter Adjusts the difference between the darkest and lightest colors in the object Changes the color scheme of the object Reduces image file size (i.e.,

Brightness Contrast

Recolor Compress Pictures


Page No.77

Computer Hardware & Network Professional July 2011

compresses) Change Picture Reset Picture Picture Shape Picture Border Picture Effects Position Replace current image with another image that you choose Restores an altered image to its original size and color scheme Bounds image to a shape that you choose Adds a border to your image; provides border customization options Applies image effects (e.g., shadow, reflection, glow) that you choose Contains options for arranging objects relative to text Brings an object to the front of a group of objects; where the objects overlap, this object will be the one seen Sends an object to the back of a group of objects; where the objects overlap, this object will be hidden by all other objects Provides options for alignment of text around objects Opens a pane that lets you choose (i.e., select) from various images in your document Provides options for positioning an object relative to other objects and/or relative to the page. Also provides
Computer Hardware & Network Professional July 2011

Bring to Front

Send to Back

Text Wrapping Selection Pane

Align

Page No.78

options for showing or hiding grid lines Group Lets you group several selected images or objects into one image or object Contains options for rotating an object or flipping it along an axis Allows you to cut out unneeded areas of an object Changes the color within an AutoShape Creates a bounded box for text

Rotate Crop

Shape Fill Text Box

Auto Thumbnail

Creates a thumbnail of the selected object

Creating Headers and Footers


1. From the Insert command tab, in the Header & Footer section, click

HEADER or FOOTER The scroll list of preset headers or footers appears. 2. Select the desired header or footer style HINT: To start with a blank Header/Footer, select Edit Header or Edit Footer Header & Footer Group The Header & Footer group lets you to format the appearance of the header

Page No.79

Computer Hardware & Network Professional July 2011

or footer and/or format page numbers.

Page No.80

Computer Hardware & Network Professional July 2011

SYMBOLS: There is an U-limited range of symbols available in different types & styles. Select on of them and click on insert button or double click on that symbol. It will appear at that place of document where cursor is blinking. Different Types of Symbols

Microsoft Excel 2007


Introduction
.

Page No.81

Computer Hardware & Network Professional July 2011

Worksheets

Page No.82

Computer Hardware & Network Professional July 2011

Microsoft Excel consists of worksheets. Each worksheet contains columns and rows. The columns are lettered A to Z and then continuing with AA, AB, AC number of columns 16384 up XFD and so on; the rows are numbered 1 to 1,048,576. The number of columns and rows you can have in a worksheet is limited by your computer memory and your system resources.

The Formula Bar


Formula Bar 1. Choose the View tab. 2. Click Formula Bar in the Show/Hide group. The Formula bar appears.
Page No.83 Computer Hardware & Network Professional July 2011

Worksheet Terms
Cell The intersection of a column and row. Information is stored in cells. Cell Pointer The cell pointer is similar to Word's insertion point. It selects or marks the current cell (where the next activity is going to take place). The Excel pointer changes shape depending on location and corresponding function. This document provides a table describing the various pointer shapes you may see while working in Excel 2007/2008. Formula A set of instructions which perform a calculation based on numbers entered in the cell or numbers entered in other cells (referred to by cell references). All formulas begin with the equal sign (=). Function A pre-programmed formula. The function performs the calculation based on the cells referenced in the function. All functions begin with the equal sign (=). Range A group of cells. Ranges are often referenced for formulas, printing, and designating information to be copied or cut. Ranges can be selected by clicking and dragging over the cells. Row A horizontal group of cells within a worksheet. Value A number that can be used in an Excel calculation. Workbook A collection of worksheets contained within a single file.
Page No.84 Computer Hardware & Network Professional July 2011

Saving Your Work

http://www.uwec.edu/help/Excel07/bas-starting.htm - topOpening

Excel

1. To open Excel 2007, from the Start menu, select All Programs Microsoft Office Microsoft Office Excel 2007
http://www.uwec.edu/help/Excel07/bas-starting.htm topCreating

Workbook

1. In the top left corner of the Excel window, click FILE The File menu appears 2. From the File menu, select New The New Workbook dialog box appear 3. Under New Blank, double click BLANK WORKBOOK A new workbook appears.
4.
http://www.uwec.edu/help/Excel07/bas-starting.htm - topEntering Text

Excel allows you to enter text into cells. 1. Select the cell where you want to enter text 2. Type text into the cell 3. To accept the text, press [Enter] or an [Arrow] To force text to wrap at a specific point in a cell, press [Alt] + [Enter]
http://www.uwec.edu/help/Excel07/bas-starting.htm - top

Entering Numbers

Numeric cells can be used for calculations and functions. A numeric cell may contain numbers, a decimal point (.), plus (+) or minus (-) signs, and currency ($). 1. Select the cell where you want to enter numbers
Computer Hardware & Network Professional July 2011

Page No.85

2. Type the numeric information that should be in the cell HINT: To enter a fraction, type 0 and press [Space] before the fraction; otherwise, Excel will interpret the fraction as a date. 3. To accept the information, press [Enter] or an [Arrow] NOTES: Excel automatically right-aligns numerical values and left-aligns text. Do not include spaces or alphabetical characters in a calculation cell.
http://www.uwec.edu/help/Excel07/bas-starting.htm - topEntering

Numbers

Formatted as Text
When cells are formatted for text, all cell contentsletters, numerals, or alpha-numeric combinationsare treated as text. Information is displayed exactly as it is entered. There are two ways to enter numbers as text.

Entering Numbers Formatted as Text: Apostrophe Character


1. 2. 3. Select the cell you want to enter information into Press ['], then type numeric information To accept the information, press [Enter] or an [Arrow]

Entering Numbers Formatted as Text: Dialog Box


NOTE: This method is especially useful when formatting multiple cells to display text. 1. From the Ribbon, select the Home command tab 2. In the Number group, click FORMAT CELLS The Format Cells dialog box appears. 3. Select the Number tab 4. From the Category scroll list, select Text 5. Click OK 6. Type the desired numbers and/or text in the cell

Page No.86

Computer Hardware & Network Professional July 2011

7. To accept the text, press [Enter] or an [Arrow] To force text to wrap at a specific point in a cell, press [Alt] + [Enter]
http://www.uwec.edu/help/Excel07/frmt-cell.htm - topMerging

Cells

Cell merge converts selected cells into a single cell. This can be useful for creating titles.

Creating a Cell Merge


WARNING: After a cell merge, if two or more selected cells have data in them, Excel will display the information from the cell closest to the upper left corner, deleting all other data. 1. 2. Select the cells you want to merge From the Home command tab, in the Alignment group, click

MERGE & CENTER The cells are merged and the text aligns to the center
http://www.uwec.edu/help/Excel07/frmt-cell.htm - topWrapping

Text

If you have text that appears in a single cell and you want to increase the height of the cell without expanding the row or column, you can use the Wrap text option. 1. 2. Select the appropriate cells From the Home command tab, in the Alignment group, click WRAP

TEXT The text wrap is applied. NOTE: To remove the text wrap, click WRAP TEXT again.
http://www.uwec.edu/help/Excel07/frmt-cell.htm topCopying

Cell

Formatting
Page No.87 Computer Hardware & Network Professional July 2011

If you want to copy only a cell's formatting you can use the Painter option. This will format the destination cell the same as the source cell without changing its content. Formatting with the Painter The typical copy and paste functions will copy text and all associated formatting; however, if you want to copy only the formatting, you can use the Format Painter. The Format Painter will format the destination text the same as the source text but will not copy or paste any actual text.
http://www.uwec.edu/help/Excel07/frmt-cell.htm topClearing

Cell

Formatting
You can remove all cell formatting while preserving text formatting in selected cells (e.g., fill color, alignment, and borders will be cleared, but text color, font size, and font face will not be cleared). 1. 2. Select the cell(s) containing the formatting to be cleared From the Home command tab, in the Editing group, click CLEAR select Clear Formats The cell formatting is removed.

Formatting Numbers
Excel provides preset number formats to help you standardize how numbers will appear in your worksheet. You may also customize number formats to fit your needs. EXAMPLES: When formatted as Currency, the number 9.27 will appear as $9.27. When formatted as Fraction, the number 9.27 will appear as 9 1/4.

Formatting Numbers: Toolbar Option Formatting Numbers: Ribbon Option Formatting Numbers: Dialog Box Option
Computer Hardware & Network Professional July 2011

Page No.88

Clearing Number Formatting

Working with Conditional Formatting


Applying Preformatted Rules Creating a Customized Rule Editing Rules Prioritizing Rules Deleting Rules

Page No.89

Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/Excel07/frmt-cond.htm - topApplying Preformatted

Rules Using preformatted rules is a quick way to apply conditional formatting to your worksheet.

Applying Cell Highlighting


1. 2. Select the range of cells to be formatted From the Home command tab, in the Styles group, click

CONDITIONAL FORMATTING A pull-down list appears. 3. Select Highlight Cells Rules select the desired criterion A dialog box appears. 4. In the dialog box, specify your criteria NOTE: The criteria will differ depending on the option chosen in step 3. 5. Click OK The rule is applied to cells which satisfy the criteria.

Applying Top, Bottom, and Average Rules


You can apply conditional formatting to cells that satisfy criteria based on on the ten highest or lowest numbers, percentages, or averages. 1. 2. Select the range of cells to be formatted From the Home command tab, in the Styles group, click

CONDITIONAL FORMATTING A pull-down list appears. 3. Select Top/Bottom Rules select the desired criterion A dialog box appears.
Page No.90 Computer Hardware & Network Professional July 2011

4. In the dialog box, specify your criteria NOTE: The criteria will differ depending on the option chosen in step 3. 5. Click OK The rule is applied to cells which satisfy the criteria.

Page No.91

Computer Hardware & Network Professional July 2011

Using the Fill Command


Filling Cells: Mouse Option

1.
http://www.uwec.edu/help/Excel07/ws-fills.htm - topWorking with Custom Fills

Creating a Custom Fill

1.

From the Office Button menu

, click EXCEL OPTIONS

The Excel Options dialog box appears. 2. From the Categories list, select Popular The dialog box refreshes to show the Popular options. 3. In the Top options for working with Excel section, click EDIT CUSTOM LISTS...

Page No.92

Computer Hardware & Network Professional July 2011

The Custom Lists dialog box appears.

4. In the Custom lists scroll box, select NEW LIST 5. In the List entries text box, type the information you want to be added in the custom fill, pressing [Enter] after each entry EXAMPLE: A, A-, B+, B, B-, ..., F

Working with Rows and Columns


Adjusting Row Height and Column Width Using AutoFit to Adjust Rows and Columns Adding and Removing Rows and Columns

Adjusting Row Height: Ribbon Option 1. To adjust a single row, select any cell from the row to be adjusted To adjust multiple non-contiguous rows, press [Ctrl] + select cells from each row to be adjusted 2. From the Ribbon, select the Home command tab 3. In the Cells group, click FORMAT
Page No.93 Computer Hardware & Network Professional July 2011

4. In the Cell Size section, select Height... The Row Height dialog box appears.

5. In the Row height text box, type the desired height 6. Click OK The row height is adjusted. Adjusting Row Height: Mouse Option

1. Using AutoFit to Adjust Row Height: Ribbon Option

1.

Organizing Worksheets

Organizing the worksheets within your workbook files can make your Excel documents easier to maintain and manage. Worksheets can be
Page No.94 Computer Hardware & Network Professional July 2011

moved, renamed, or deleted to make your workbook easy to navigate through. This document covers the following topics:
http://www.uwec.edu/help/Excel07/ws-org.htm - topRenaming

Worksheet

Tabs
1. To select the sheet name, double click the appropriate worksheet tab OR Right click the appropriate worksheet tab select Rename 2. Type the new sheet name 3. Press [Enter] The worksheet is renamed.
http://www.uwec.edu/help/Excel07/ws-org.htm - topInserting

Worksheets

Inserting Worksheets: Right Click Option This option inserts a new worksheet in front of the selected SHEET tab. 1. Right click the appropriate SHEET tab select Insert...

The Insert dialog box appears. 2. Select the General tab 3. Select Worksheet 4. Click OK The new worksheet is inserted in front of the current worksheet. .
http://www.uwec.edu/help/Excel07/ws-org.htm - topMoving

Worksheets

1. Right click the SHEET tab of the worksheet to be moved select Move or Copy The Move or Copy dialog box appears. 2. From the To book pull-down list, select the current workbook Page No.95 Computer Hardware & Network Professional July 2011

3. From the Before sheet scroll box, select where the sheet will be moved NOTE: The sheet will be placed in front of the sheet you select. 4. Click OK The worksheet is moved.

Moving Worksheets: Same Workbook, Drag and Drop Option 1. Click and hold the SHEET tab of the worksheet to be moved A sheet icon and arrow appears.

2. Drag the sheet icon to the desired location The arrow indicates where the sheet will be placed. 3. Release the mouse button The worksheet is moved. Moving Worksheets: Different Workbook 1. Open both the worksheet to be moved and the workbook to which it will be moved 2. To display the worksheet that will be moved, a. From the Ribbon, select the View command tab b. In the Window group, click SWITCH WINDOWS select the workbook containing the worksheet to be moved 3. Right click the SHEET tab of the worksheet to be moved select Move or Copy...

Page No.96

Computer Hardware & Network Professional July 2011

The Move or Copy dialog box appears.

4. To move the worksheet to an existing workbook, from the To book pull-down list, select the destination workbook To move the worksheet to a new workbook, from the To book pull-down list, select (new book) 5. From the Before sheet scroll box, select where the sheet will be moved NOTE: The sheet will be placed in front of the sheet you select. 6. Click OK The worksheet is moved.
http://www.uwec.edu/help/Excel07/ws-org.htm - topCopying

Worksheets

Copying Worksheets: Same Workbook 1. Right click the SHEET tab of the worksheet to be copied select Move or Copy...

Page No.97

Computer Hardware & Network Professional July 2011

The Move or Copy dialog box appears.

2. In the To book pull-down list, select the current workbook 3. From the Before sheet scroll box, select where the sheet will be located NOTE: The sheet copy will be placed in front of the sheet you select. 4. Select Create a copy 5. Click OK The worksheet is copied. 6. OPTIONAL: Rename the copy
http://www.uwec.edu/help/Excel07/ws-org.htm - topDeleting

Worksheets

If you no longer have a need for a particular worksheet, you can delete that sheet from the workbook. 1. Right click the appropriate SHEET tab select Delete The sheet is deleted.

Printing

Page No.98

Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/Excel07/pr-options.htm - topApplying Additional

Printing Options The Page Setup dialog box offers additional printing options for you. You may choose to print in color or print gridlines and headings. If you are printing drafts and want to conserve ink, you can print low-quality drafts. You may also edit how you want cell errors to appear in printouts. These options are all available in the Page Setup dialog box. 1. From the Page Layout command tab, in the Page Setup group, click PAGE SETUP The Page Setup dialog box appears. 2. Select the Sheet tab

3. To print gridlines, in the Print section, select Gridlines 4. To print your worksheet in shades of black and white, in the Print section, select Black and white 5. To print low-quality draft, in the Print section, select Draft quality HINT: Be sure to deselect Draft quality when you no longer want to print in this format. 6. To print row and column headings, in the Print section, select Row and column headings 7. To customize how cell errors will appear when printed, in the Print section, from the Cell errors as pull-down list, select the desired option
Page No.99 Computer Hardware & Network Professional July 2011

8. Click OK The changes are saved and the Page Setup dialog box closes.

About the Page Setup Dialog Box


In addition to the Print dialog box, the Page Setup dialog box provides many options to help you print your Excel worksheets.

Accessing the Page Setup Dialog Box Page Setup Dialog Box Tabs

http://www.uwec.edu/help/Excel07/setupdb.htm - topAccessing the Page Setup

Dialog Box 1. From the Page Layout command tab, in the Page Setup group, click PAGE SETUP The Page Setup dialog box appears.
http://www.uwec.edu/help/Excel07/setupdb.htm - topPage

Setup Dialog

Box Tabs
The Page Setup dialog box consists of four tabs: Page, Margins, Header/Footer, and Sheet. Each tab lets you customize elements of your Excel worksheet. For additional information, refer to Customizing Page Layout.
NOTES:

The following buttons are found on all tabs: PRINT... (opens the Print dialog box), PRINT PREVIEW (opens Print Preview), OPTIONS... (opens the (printer name) on print Properties dialog box), OK, and CANCEL. If you accessed the Page Setup dialog box differently than as described in Accessing the Page Setup Dialog Box, the PRINT... and PRINT PREVIEW buttons may not appear.

Page No.100

Computer Hardware & Network Professional July 2011

Page Setup Dialog Box Tabs: Page The Page tab offers several options to help you specify how your worksheet(s) will print.

Option Orientation Scaling

Description Determines if your document prints as a portrait (i.e., lengthwise) or as a landscape (i.e., widthwise) Adjust to lets you to customize page scale by percentage. Fit to lets you specify how many pages it takes to print your worksheet HINT: Print Preview lets you see the effects of scaling before you print. Determines what size paper you will print on Determines resolution Indicates what number appears on the first printed page. If you
Computer Hardware & Network Professional July 2011

Paper size Print quality First page


Page No.101

number

want the first page number to be 1, leave the selection as Auto

Page Setup Dialog Box Tabs: Margins The Margins tab lets you set your margins and center your data vertically, horizontally, or both.
NOTE: All margin values are measured in inches.

Page Setup Dialog Box Tabs: Header/Footer Headers and footers are the text printed at the top and bottom of pages, such as the date, page number, the filename, or other text. The Header/Footer tab provides options to customize page headers or footers.
Page No.102 Computer Hardware & Network Professional July 2011

Option Header Footer Custom Header... Custom Footer... Different odd and even pages
Page No.103

Description Provides several pre-written headers Provides several pre-written footers Lets you create your own header using the Header dialog box Lets you create your own footer using the Footer dialog box Lets you create different headers or footers for odd and even pages
Computer Hardware & Network Professional July 2011

Different first page Scale with document Align with page margins

Lets you create a different header or footer for only the first page Adjusts the header and footer font and scaling to match the rest of the document Sets headers and footers within the page margins

Entering Formula in Worksheet


Formula 1. Place the cursor in active cell where you want to enter formula 2. 3. 4. 5. Type = sign Press Opening bracket ( Give the cell reference and press + sign Press Closing bracket )

Press Enter to apply the formula as shown in fig given below.

How to copy Formula To copy the formula to the next cell the following steps as involve. 1. Select the cell in which a formula has applied 2. 3. 4. Press Ctrl+C or click Edit menu---copy Select the range Press Ctrl + V to paste the formula.

By Dragging
Page No.104 Computer Hardware & Network Professional July 2011

Copied Down

Page No.105

Computer Hardware & Network Professional July 2011

Another way to insert SUM function in a worksheet To insert SUM function: 1. 2. Click = sign on the formula bar. Select the SUM function from functions drop down list

3. in fig. 4. 5.

The SUM function dialogue box will be appearing as shown below

Give the cell range in Number 1 box Click Ok

Some commonly used Functions


There are most recently or commonly used formulas are as followings. SUM, Average, MAX, MIN are simple functions. IF and SUMIF are conditional functions. Average Function The Average function is used to get the average. The syntax of Average function is: Average (number1, number2, number_n) Number1, number2, Number_n is num3ric values. They can be numbers, named ranges, arrays or references to numbers. There can be up to 30 values entered 1. Enter the value of cells A2 through A5.
Computer Hardware & Network Professional July 2011

Page No.106

2.

Click on blank cell below or to the right of the numbers to be

averaged. 3. 4. 5. 6. Type= Type the word average (upper or lower case; it does not matter) Type a left parenthesis. Click and drag the mouse over the range to be averaged.

7. You do not have to enter the right parenthesis. Click on green check mark on formula bar OR press ENTER.

MAX Function This function is used to get the maximum number from different number. The syntax of Max function is: Max (Number1, number2 Number_n) Number1, number2, Number_n is numeric values. They can be numbers, named ranges, arrays or references to numbers. There can be up to 30 values entered.
Page No.107 Computer Hardware & Network Professional July 2011

1. Enter the value of cells A2 through A5. 2. Click on blank cell to display the maximum number. 3. Type= 4. Type the word MAX (upper or lower case; it does not matter). 5. Type a left parenthesis. 6. Click and drag the mouse over the range.

7. You do not have to enter the right parenthesis. Click on green check mark on formula bar OR press ENTER.

MIN Function This function is used to find the minimum value. The syntax of Min function is: Min (Number1, Number2 Number_n) Number1, number2, Number_n are numeric values. They can be numbers, named ranges, arrays or references to numbers. There can be up to 30 values entered.
Page No.108 Computer Hardware & Network Professional July 2011

1. Enter the value of cells A2 through A5. 2. Click on blank cell to display the maximum number. 3. Type= 4. Type the word MAX (upper or lower case; it does not matter). 5. Type a left parenthesis. 6. Click and drag the mouse over the range.

7. Click on the green check mark on the formula OR press ENTER.

Count Function These count function counts the number of the cells that contain numbers as well as the number of arguments that contain numbers. The syntax of count function is: Count (argument1, argument2argument_n) Argument 1, Argument2, Argument_n are either ranges of cells or values. There can be up to 30 values entered.
Page No.109 Computer Hardware & Network Professional July 2011

1. Enter the value of cells A2 through A5. 2. Click on blank cell to display the result of the function. 3. Type= 4. Type the word MAX (upper or lower case; it does not matter). 5. Type a left parenthesis. 6. Click and drag the mouse over the range of values.

7. Click on the green check mark on the formula bar or press ENTER.

Today function The Today function returns the current system date. It refreshes the date whenever the worksheet recalculates. The syntax of Today function is: Today ()

Page No.110

Computer Hardware & Network Professional July 2011

The spreadsheet continues to display this value, until the worksheet recalculates. The user can recalculate the value by pressing F9 key. Now Function The now function returns the current system date and time. Its syntax is as follows: Now ()

The user can recalculate the function by pressing F9 key Sumif Function The sum if function adds all numbers in a range of cells, based on a given criteria. The syntax of SumIf function is: Sum if (range, criteria, sum_ range) range is the range of cells that you want to apply the criteria against. criteria are used to determine which cells to all. sum_ ranges are the cells to sum.

Based on the Excel spreadsheet above:


Page No.111 Computer Hardware & Network Professional July 2011

=Sumif(A2:A6, D2 C2:C6) =Sumif(A:A, D2, C:C) =Sumif(A2:A6, 2003, C2:C6) =Sumif(A2:A6, >=2001, C2:C6) IF Function

Would return 218.6 Would return 218.6 Would return 7.2 Would return 12.6

The IF function is used to make decisions. It returns one value if a specified condition evaluates to TRUE and another value if it evaluates to FALSE. For example, you can display a massage Pass if marks are more than 40 or Fail otherwise. The syntax for the IF function is: If(condition, value_if_ture, value_if_false) 1. Condition is the value to be tested. 2. Value_if_true is the value that is returned if condition evaluates to TRUE. 3. Value_if _false is the value that is returned if condition evaluates top FALSE. 1. Insert marks of the student in A1.

2. Type IF(A1>40,Pass,Fail) in B1 3. Press ENTER 4. If the value of A1 is more than 40, Pass will be displayed in B1. Otherwise Fail will be displayed

Named Ranges in Excel


A Named Range is way to describe your formulas. So you don't have to have this in a cell: = SUM(B2:B4)
Page No.112 Computer Hardware & Network Professional July 2011

You can replace the cell references between the round brackets. You replace them with a descriptive name, all of your own. So you could have this, instead: = SUM(Monthly_Totals) Behind the Monthly_Totals, though, Excel is hiding the cell references. We'll see how it works, now. Open up Excel 2007, and create the spreadsheet below:

The formula is in cell B5, and just adds up the monthly totals in the B column. Define a Name Setting up a Named Range is a two-step process. You first Define the Name, and then you Apply it. To Define your name, do this (make sure you have the formula in cell B5):

Highlight the cells B2 to B4 (NOT B5), then click the Formulas Locate the Named Cells panel Click Name a Range

menu

Page No.113

Computer Hardware & Network Professional July 2011

From the Name a Range menu, click Name a Range:

You'll then get the following dialogue box:

Click OK on the New Name dialogue box. Notice that the Name is our heading of Monthly_Totals. When you click OK, you'll be returned to your spreadsheet. You won't see anything changed. But what you have done is to Define a Name. You can now Apply it. Apply a Name To apply your new Name, click into cell B5 where your formula is, and do this:

On the Named Cells panel, Click Name a Range From the menu, select Apply Names
Computer Hardware & Network Professional July 2011

Page No.114

From the Apply Names dialogue box, select the Name you want and click OK:

When you click OK, Excel should remove all those cell references between the round brackets, and replace them with the Name you defined:

In the image above, cell B5 now says: =SUM(Monthly_Totals) The cell references have been hidden. But Excel still knows about them it's you that can't see them! Exercise Study the spreadsheet below, now that we have added another Named Range to cell C5:

Using the same techniques just outlined, create the same Named Range as in our image above. Again, the formula we've used is just a SUM formula:
Page No.115 Computer Hardware & Network Professional July 2011

= SUM(C2:C4) You need to start with this, before you define the Name and apply it. Using Named Ranges in Formulas We'll now use two Named Ranges to deduct the tax from our monthly totals. So, to define two new Names, do the following: 1. Click inside cell B5 to highlight it 2. From the Formulas menu bar, locate the Named Cells panel, and click Name a Range > Name a Range 3. From the New Name dialogue box, click in to the Name textbox at the top and enter Monthly_Result (with the underscore character) 4. Click OK 5. Click inside cell C5 and do the same as step 2 above. This time, however, enter Tax_Result as the Name You should now have two new Names defined. We'll now Apply these new names. First, add a new label to your spreadsheet:

Page No.116

Computer Hardware & Network Professional July 2011

Click in to cell B7, next to your new label, and enter the following formula: = B5 - C5 With the formula in place, we can Apply the two new Names we've just defined:

From the Formulas menu bar, locate the Named Cells panel, and click Name a Range > Apply Names The Apply Names dialogue box appears Click Monthly_Result to select it Click on Tax_Result to select it:

Click the OK button Excel will replace your cell references with the two Names you Defined Your spreadsheet should look like ours:

Page No.117

Computer Hardware & Network Professional July 2011

If you look at the formula bar, you'll see the two Named Ranges. The formula is easier to read like this. But it's not terribly easy to set up! They can be quite useful, though

Sorting Data

Sorting Data: Sort Button Sorting Data: Sort Dialog Box

http://www.uwec.edu/help/Excel07/srtcom.htm - top#topSorting Data: Sort

Button If you simply want to sort your data by one column from smallest to largest or largest to smallest, you can do so with one click. 1. Select a cell in the column used to sort 2. From the Data command tab, in the Sort & Filter group, click SORT SMALLEST TO LARGEST or SORT LARGEST TO SMALLEST The selected column is sorted.
http://www.uwec.edu/help/Excel07/srtcom.htm - top#topSorting Data: Sort

Dialog Box Using the Sort dialog box, you can create multi-level sorts that meet a variety of specifications.
Page No.118 Computer Hardware & Network Professional July 2011

1. 2.

Select a cell in the column you want to use to sort From the Data command tab, in the Sort & Filter group, click

SORT The Sort dialog box appears.

3. To sort by ascending or descending values (i.e., alphabetically, numerically, time, or date) a. In the Sort by pull-down list, select the column you want to use to sort b. In the Sort On pull-down list, select Values c. In the Order pull-down list, select A to Z or Z to A The data is sorted according to the selected order. 4. To sort according to a custom list a. In the Sort by pull-down list, select the column you want to use to sort EXAMPLE: select a column containing days of the week b. In the Sort On pull-down list, select Values c. In the Order pull-down list, select Custom List... The Custom Lists dialog box opens d. Select the custom list by which you want to sort EXAMPLE: select Sunday, Monday, Tuesday, Wednesday, Thursday, Friday, Saturday
Page No.119 Computer Hardware & Network Professional July 2011

5. To sort according a formatting criterion a. In the Sort by pull-down list, select the column you want to use to sort b. In the Sort On pull-down list, select the appropriate option EXAMPLE: Select Cell Color c. In the Order pull-down list, select a color and appropriate sort order EXAMPLE: select Blue and On Top 6. OPTIONAL: To sort by more than one column a. Click ADD LEVEL b. In the Then by row of the Sort dialog box, select the additional sort options 7. OPTIONAL: To control how to sort lists of days or months, casesensitive data, and orientation a. Click OPTIONS... The Sort Options dialog box appears.

b. Make necessary changes c. Click OK 8. Click OK The data is sorted.

Page No.120

Computer Hardware & Network Professional July 2011

The

Level 3 button expands the display to show all the data again.

1. Expand the whole sheet by clicking the Level 3 button, if necessary. Click on the and buttons under Level 2 to expand and collapse individual sections of the sheet. 2. Click the Level 2 button again, to show just the subtotals. 3. Click the Save button to save as the file. 4. Look at the Print Preview. 5. Print just this sheet with only subtotals showing (Level 2).

Page No.121

Computer Hardware & Network Professional July 2011

http://www.uwec.edu/help/Excel07/subtotal.htm - top#topRemoving Subtotals

If you no longer need subtotals, you can easily remove them without deleting rows. 1. 2. Select a cell within the data range From the Data command tab, in the Outline group, click

SUBOTOTAL The Subtotal dialog box appears. 3. Click REMOVE ALL The subtotals are removed.

Filtering Your Table


Excel 2007 lets you filter Table data according to specific criteria. Any data not matching the specified criteria is hidden from view. Filtered data, however, can be easily viewed again by removing the filter. Filtering is especially useful in large tables when you need to work only with records meeting your precise criteria.
Page No.122 Computer Hardware & Network Professional July 2011

Cautions for Working with Filters Using AutoFilter Using Advanced Filter

http://www.uwec.edu/help/Excel07/tb-filtering.htm - top#topCautions for

Working with Filters When Table filtering is enabled, some Excel commands will produce different results. These can include:

Cell formatting affects only visible Table cells When printing the Table, only visible cells will be printed The Sort command will affect visible cells When deleting data from the Table, entire rows must be deleted

NOTE: You know filtering is enabled whenever you see the filter buttons at

the top of each Table column.


http://www.uwec.edu/help/Excel07/tb-filtering.htm top#topUsing

Table

Filters
Activating Table Filters 1. 2. Select a cell within the Table From the Home command tab, in the Editing group, click SORT &

FILTER select Filter OR From the Data command tab, in the Sort & Filter group, click FILTER

AutoFilter buttons appear at the top of each column of the selected Table.

Page No.123

Computer Hardware & Network Professional July 2011

Running Table Filters 1. Activate Table Filtering 2. In the column you want to filter, click the The Table filter pull-down list appears, including a submenu of columnspecific records you can use to filter your table. NOTE: By default, all records are selected (i.e., set to display). 3. To filter the selected column, deselect the records you do not want displayed (i.e., be sure that only the records you want displayed are selected) 4. Click OK All rows fitting the criteria of the selected column are displayed.
NOTES:

When you use AutoFilter within a Table, the row numbers of the displayed records turn blue, and the filter results appear in the status bar (e.g., 1 of 12 records found). The button at the top of the column changes to 5. To remove the filter from your Table, in the filtered column, click the select Clear Filter From...

About Charting
http://www.uwec.edu/help/Excel07/ch-about.htm - top#topAbout Charting

Elements A chart contains several elements, which are illustrated in this graphic.

Page No.124

Computer Hardware & Network Professional July 2011

Creating a Basic Chart


Microsoft Excel 2007/2008 makes creating charts simple. With a few clicks, Excel will create a basic chart you can edit and enhance to meet your needs. This document shows you how to create a chart and perform basic editing. Creating a Chart Changing the Chart Type Working with Data Series and Data Ranges

http://www.uwec.edu/help/Excel07/ch-basics.htm - top#topCreating a Chart

In Excel, charts are visual representations of data on a spreadsheet. There are many types of charts available, so you should find the appropriate one for your project. Windows: 1. Create the data to be charted
Computer Hardware & Network Professional July 2011

Page No.125

2.

Select the data to be charted NOTE: To select data from different areas of your worksheet or to select non-contiguous cells: Hold down [Ctrl] and select the cells. 3. From the Insert command tab, in the Charts group, click the type of chart you prefer A pull-down menu appears. EXAMPLE: Click BAR 4. Click the specific chart you want The chart appears on the spreadsheet. The Design, Layout, and Format command tabs appear on the Ribbon. 5. OPTIONAL: If the information is represented on the incorrect axes, in the Design command tab, from the Data group, click Switch

Row/Column Changing the Chart Type If the chart you selected is not appropriate for the information you are charting, you can simply change it.

Page No.126

Computer Hardware & Network Professional July 2011

1. Right click your chart select Change Chart Type... The Create Chart dialog box appears.

2. From the categories pane, select the type of chart you prefer 3. On the right, in the chart type section, select the specific chart you want 4. Click OK The chart is changed. Chart Tools The Chart Tools appear on the Ribbon when you click on the chart. The tools are located on three tabs: Design, Layout, and Format. Within the Design tab you can control the chart type, layout, styles, and location.

Page No.127

Computer Hardware & Network Professional July 2011

Within the Layout tab you can control inserting pictures, shapes and text boxes, labels, axes, background, and analysis.

Within the Format tab you can modify shape styles, word styles and size of the chart.

Power Point 2007


Page No.128 Computer Hardware & Network Professional July 2011

Introduction
Getting started with PowerPoint 2007 you will notice that there are many similar features to previous versions. You will also notice that there are many new features that youll be able to utilize. There are three features that you should remember as you work within PowerPoint 2007: the Microsoft Office Button, the Quick Access Toolbar, and the Ribbon. The function of these features will be more fully explored below.

Presentations
A presentation is a collection of data and information that is to be delivered to a specific audience. A PowerPoint presentation is a collection of electronic slides that can have text, pictures, graphics, tables, sound and video. This collection can run automatically or can be controlled by a presenter. Mini Toolbar

A new feature in Office 2007 is the Mini Toolbar. This is a floating toolbar that is displayed when you select text or right-click text. It displays common formatting tools, such as Bold, Italics, Fonts, Font Size and Font Color.

Navigation Navigation through the slides can be accomplished through the Slide Navigation menu on the left side of the screen. Also, an outline appears from materials that have been entered in the presentation. To access the outline, click the outline tab.

Page No.129

Computer Hardware & Network Professional July 2011

Slide Views
Presentations can be viewed in a variety of manners. On the View tab, the Presentation Views group allows you to view the slides as Normal, Slide Sorter, Notes Page, Slide Show, Slide Master, Handout Master, and Notes Master.

Customize PowerPoint
PowerPoint 2007 offers a wide range of customizable options that allow you to make PowerPoint work the best for you. To access these customizable options:

Click the Office Button Click PowerPoint Options include picture of OB menu.

New Presentation
You can start a new presentation from a blank slide, a template, existing presentations, or a Word outline. To create a new presentation from a blank slide:

Click the Microsoft Office Button Click New Click Blank Presentation

Themes
Themes are design templates that can be applied to an entire presentation that allows for consistency throughout the presentation. To add a theme to a presentation:
Page No.130 Computer Hardware & Network Professional July 2011

Click the Design tab Choose one of the displayed Themes or click the Galleries button

To apply new colors to a theme:


Click the Colors drop down arrow Choose a color set or click Create New Theme Colors

To change the background style of a theme

Click the Background Styles button on the Design tab

Adding Video
Video clips can be added to the presentation. To add a video clip:

Click the Movie button on the Insert tab Choose Movie from File or Movie from Clip Organizer

To edit the video options:


Click the movie icon Click the Format tab


Computer Hardware & Network Professional July 2011

Page No.131

Adding Audio
Audio clips can be added to the presentation. To add an audio clip:

Click the Audio button on the Insert tab Choose Sound from File, Sound from Clip Organizer, Play CD Audio Track, or Record Sound

To edit the audio options:


Click the audio icon Click the Format tab

Graphics
Adding Picture
Page No.132 Computer Hardware & Network Professional July 2011

To add a picture:

Click the Insert Tab Click the Picture Button Browse to the picture from your files Click the name of the picture Click insert To move the graphic, click it and drag it to where you want it

Adding Clip Art To add Clip Art:


Click the Insert Tab Click the Clip Art Button Search for the clip art using the search Clip Art dialog box Click the clip art
To move the graphic, click it and drag it to where you want it

Editing Pictures and Clip Art When you add a graphic to the presentation, an additional Tab appears on the Ribbon. The Format Tab allows you to format the pictures and graphics. This tab has four groups: Adjust: Controls the picture brightness, contrast, and colors Picture Style: Allows you to place a frame or border around the picture and add effects Arrange: Controls the alignment and rotation of the picture Size: Cropping and size of graphic

Page No.133

Computer Hardware & Network Professional July 2011

Adding a Shape
To add Shapes:

Click the Insert Tab Click the Shapes Button Click the shape you choose

Click the Slide Drag the cursor to expand the

Shape

To format the shapes:


Click the Shape Click the Format tab

Page No.134

Computer Hardware & Network Professional July 2011

Adding SmartArt
SmartArt is a feature in Office 2007 that allows you to choose from a variety of graphics, including flow charts, lists, cycles, and processes. To add SmartArt:

Click the Insert Tab Click the SmartArt Button Click the SmartArt you choose

Click the SmartArt Drag it to the desired location in the slide

To format the SmartArt:


Click the SmartArt Click either the Design or the Format tab Click the SmartArt to add text and pictures.

Page No.135

Computer Hardware & Network Professional July 2011

Adding a Photo Album


The photo album feature is new in PowerPoint 2007 and allows you to easily create a photo album to share pictures. To create a photo album:

Click the Photo Album button on the Insert tab Click New Photo Album Click File/Disk to add pictures to the photo album Move the pictures up and down in the order of the album but clicking the up/down arrows

Slide Effects
Page No.136 Computer Hardware & Network Professional July 2011

Slide Transitions Transitions are effects that are in place when you switch from one slide to the next. To add slide transitions:

Select the slide that you want to transition Click the Animations tab Choose the appropriate animation or click the Transition dialog box

To adjust slide transitions:

Add sound by clicking the arrow next to Transition Sound

Page No.137

Computer Hardware & Network Professional July 2011

Modify the transition speed by clicking the arrow next to Transition

Speed

To apply the transition to all slides:

Click the Apply to All button on the Animations tab

To select how to advance a slide:


Choose to Advance on Mouse Click, or Automatically after a set number of seconds

Slide Animation
Slide animation effects are predefined special effects that you can add to objects on a slide. To apply an animation effect:

Select the object Click the Animations tab on the Ribbon Click Custom Animation Click Add Effect Choose the appropriate effect
Computer Hardware & Network Professional July 2011

Page No.138

Animation Preview
To preview the animation on a slide:

Click the Preview button on the Animations tab

Slide Show Options


The Slide Show tab of the ribbon contains many options for the slide show. These options include:

Preview the slide show from the beginning Preview the slide show from the current slide Set up Slide Show

Set Up Slide Show This option allows you to set preferences for how the slide show will be presented. The options include:
Page No.139 Computer Hardware & Network Professional July 2011

Whether the show will run automatically or will be presented by a speaker The looping options Narration options Monitor resolutions

Record Narration
When you want to record narration for the slides:

Click the Record Narration button Click Set Microphone Level to check the levels of audio input Click OK to record the narration
Computer Hardware & Network Professional July 2011

Page No.140

Rehearse Timings
Use Rehearsed Timings to rehearse the timings of slide with audio.

Click the Rehearse Timings button Practice speaking and advance the slides as you would in the presentation When you have completed this click through the end of the slide Choose whether or not to keep this timing or to retry

Page No.141

Computer Hardware & Network Professional July 2011

Chapter 3

Maintenance Tools and PC Power Supply.


This Chapter describes following different types of tools for troubleshooting and maintaining the Computer and Network systems: Hand tools. Small nylon wire ties for dressing or organizing wires. Foam swabs, or lint-free cotton swabs Soldering iron and solder sucker. ESD (Electrostatic Discharge) Protection Test Equipment o Digital Multi-meter o POST Probe Card Networking o Crimping Tool o Punch down tool o Network Cable Tester Chemicals o Contact Cleaners o Silicone Lubricants Dist Air Blower Diagnostics software

Hand Tools
The following list mentions some specific tools anyone should have if they intend to get inside their PC: 6mm nut driver 8mm nut driver Small Phillips screwdriver Small straight edge screwdriver Medium Phillips screwdriver Medium straight edge screwdriver

Chip extractor
Larger processors require a chip extractor if they are mounted in the older low insertion force (LIF) socket. Page No.142 Computer Hardware & Network Professional July 2011

Tweezers
The tweezers and parts grabber can be used to hold any small screws or jumper blocks that are difficult to hold in your hand.

Claw-type parts grabber


The parts grabber is especially useful when you drop a small part into the interior of a system; usually, you can remove the part without completely disassembling the system.

Parts Grabber

T10 and T15 Torx drivers


The Torx driver is a star-shaped driver that matches the special screws found in most Compaq systems and in many other systems as well.

Torx Driver

Needle-nose pliers
Pliers are useful for straightening pins on chips, applying or removing jumpers, crimping cables, or grabbing small parts. Page No.143 Computer Hardware & Network Professional July 2011

Smooth File
You can use the file to smooth rough metal edges on cases and chassis and to trim the faceplates on disk drives for a perfect fit.

Wire cutter or wire stripper


The wire cutter or stripper, obviously, is useful for making or repairing cables or wiring.

ESD Protection Tools


Another consideration for computer toolkit is an electrostatic discharge (ESD) protection kit. This kit consists of a wrist strap with a ground wire and an especially conductive mat with its own ground wire. Using a kit like this when working on a system helps ensure that you never accidentally damage any of the components with a static discharge. You also can get just the wrist strap or the antistatic mat separately. A wrist strap is shown in the picture.

A typical ESD wrist strap clipped to a non-painted surface in the case chassis.

Soldering Iron
Soldering is the process of a making a sound electrical and mechanical joint between certain metals by joining them with a soft solder. This is a low temperature melting point alloy of lead and tin. The joint is heated to the correct temperature by soldering iron. Soldering irons are used to make some necessary repairs though most of the maintenance work involves replacing the entire failed components. Simple soldering skills can save a lot of money in these cases. A low-wattage soldering iron of about 25 watts may be used perform minor repairs Page No.144 Computer Hardware & Network Professional July 2011

like above. More than 30 watts generates too much heat and can damage the components on the board. (See Pictures 3.1 end of the book)

Digital Multi-meter
A multi-meter can be used for checking voltage signals at different points in a system, testing the output of the power supply, and checking for continuity in a circuit or cable. The DMM has a pair of wires called test leads or probes. The test leads make the connections so that you can take readings. Depending on the meters setting, the probes measure electrical resistance, direct-current (DC) voltage, or alternating-current (AC) voltage. Each system-unit measurement setting has several ranges of operation. For example, DC voltage can be read in several scales, to a maximum of 200 milli-volts (mv), 2v, 20v, 200v, and 1,000v. . (See Pictures 3.2)

Dist Air Blower


It is a electric device that have a fan that throw air to draw the dist from the computer and other devices.

Brushes and Swabs


You can use a small makeup, photographic, or paint brush to carefully loosen the accumulated dirt and dust inside a PC before using air blower or using the vacuum cleaner. Be careful about generating static electricity. In most cases, you should not use a brush directly on circuit boards, but only on the case interior and other parts, such as fan blades, air vents, and keyboards. Do not use cotton swabs because they leave cotton fibers on everything they touch. Cotton fibers are conductive in some situations and can remain on drive heads, which can scratch disks.

Preventive Maintenance
Computers are, by design, very rugged and dependable pieces of equipment. However, like other machines, they age. Several basic procedures, when performed on a regular basis, can prevent premature failures. This lesson discusses how to keep computer hardware running smoothly and reliably.

Cleaning
For the most part, computer equipment is very reliable and lasts a long time. However, as with any piece of equipment, dirt and other airborne contaminants will greatly accelerate the deterioration caused by normal use. Therefore, the best Page No.145 Computer Hardware & Network Professional July 2011

preventive maintenance is to keep the equipment clean. The first step is to be sure that the computer is installed in a computer-friendly environment. This means that it should be in a dust-free (relatively speaking), smoke-free, and humiditycontrolled (within a range of 50 to 70 percent relative humidity) location. For the most part, a normal office environment will qualify as computer-friendly. However, a normal office environment is not the only place that we find computers. Many computers are located on a warehouse floor, in a shop, or grouped together with a large industrial piece of equipment. In the event that the location of a computer is not as desirable as it should be, the frequency of preventive maintenance (cleaning) should be accelerated. In these instances, consideration should be given to establishing a computer-friendly zone around the computer, for instance, installing it into a cabinet and providing a source of clean fresh air.

Electricity Fundamentals
To begin at the very beginning, all electric circuits require two wires to operate. Unlike water that simply flows from here to there, electricity requires a return path back to the original source. This is why a battery has two terminals and a 220 volt floor lamp has two wires.

Power
Computers run on electrical energy. Without it, a computer might as well be a paperweight. The energy or power to drive a computer is derived from electricity. Whether it uses 110 volts alternating current (AC), the U.S. standard, 220 volts AC, the Asia standard, or direct current (DC) from a battery, a computer is useless without a steady, reliable source of power. When we encounter problems with a computer, it is crucial for us to be able to test the entire power system. This lesson covers the basics of power and electricity.

Understanding Electricity and Electrical Energy


Electricity is the flow of electrical power or charge. It is both a basic part of nature and one of our most widely used forms of energy. Electricity is actually a secondary energy source, also referred to as an energy carrier. That means that we get electricity from the conversion of other sources of energy, such as coal, nuclear, or solar energy. These are called primary sources. AC Current cannot be stored.

Page No.146

Computer Hardware & Network Professional July 2011

Some Definitions
For our discussion we employ the following definitions: Electricity: The form of energy associated with charged particles, usually electrons. Electric Charge: When charged particles move in tandem, fields are generated, producing energy. Electrical Circuit: The path taken by an electrical charge. Electric Current: When an electric charge is carried, or flows through a conductor (like wires), it is known as a current. A current-carrying wire is a form of electromagnet. Electric current is also known as electron flow. Power: The rate at which an amount of energy is used to accomplish work. Electrical power is measured in watts, which is determined by multiplying voltage by current. Conductors: Materials that can carry an electrical current. Most conductors are metals. Resistance: A quality of some materials that allows them to slow the speed of an electrical current, producing heat, and sometimes light, in the process. Insulators: Materials that prevent or retard the electrical current of electrons. Ampere: A measurement of current strength, equal to 1 Coulomb per second. Coulomb's Law: two charges will exert equal and opposite forces on each other. Opposite charges attract and like charges repel. Ohm: A unit of electrical resistance. Ohm's Law states that voltage is equal to the product of the current times the resistance, or Voltage = Current x Resistance. Volt: The unit of electromotive force, or potential energy, that when steadily applied against a resistance of 1 ohm, produces a current of 1 ampere. Voltage: The potential energy of a circuit.

Conductors
Electron can move easily atom to atom in a material, it is conductor. In general, all the metals are good conductor, with silver the best and copper second. Copper wire is generally used for practical conductors because its cost much less then silver. The porous of using conductors is to allow electric current to flow with minimum opposition.

Page No.147

Computer Hardware & Network Professional July 2011

Insulators
A material with atoms in which the electrons tend to stay in their own orbits is an insulators because it cannot conduct electricity very easily. However, the insulators are able to hold or store electricity better then the conductors. An insulator material, such as glass, plastic, rubber, paper, air or mica, is also called a dielectric, meaning it can store electric charge.

Semiconductors
Carbon can be considered a semiconductor, conducting less then the metal conductors but more then the insulator. In the same group are germanium and silicon, which are commonly used for transistors and other semiconductor components. Practically all transistors are made of silicon.

PCs and Electrical Power


That PCs use electrical power to operate is no surprise, even to the casual user. The technician must understand the different types of electrical energy and how they work inside the PC. A PC's electrical power can come from a wall outlet, in the form of alternating current, or from a battery in the form of direct current.

AC Power (Alternating Current)


AC power is what most people think of as electricity. It comes from the wall, and powers most of our lights and household appliances. AC power is man-made, using generators. As the wire coil inside the generator rotates, it passes by each pole of unit magnet(s) producing an electric current. When it passes the opposite pole, the current reverses, or alternates, the direction of flow. The number of revolutions made by the generator per minute is called its frequency. In the United States, power companies run their systems at 60 turns per second to produce a high-voltage, 60Hz (cycles per second) alternating current as they rotate. The power system drops the voltage in stages before it is connected to the consumer's home or business. The power company delivers AC power to our homes or businesses with three wires. Two of the wires are hot, meaning that they carry a charge. One, the bare wire that runs from the breaker box to the power pole, is neutral. The measured voltage between the two hot wires is between 220 and 240 volts AC (VAC), while the measured voltage between either of the hot wires and the neutral wire is between 110 and 120 VAC. These voltages, which are called nominal voltages, can vary by plus or minus () 10 percent. Page No.148 Computer Hardware & Network Professional July 2011

AC volts

DC Power (Direct Current)


Alternating current is used for transporting low-cost power to end users. But a computer's electronic components won't run on AC powerthey need a steady stream of direct current. The PC's power supply performs several tasks, but the main function is to convert AC into DC. A computer's power supply combines two components to handle this job: a step-down transformer and an AC/DC converter. The AC adapters used for laptop computers, many low-cost ink-jet printers, and many other consumer electronics do the same thingturn alternating current into lower-voltage direct current. As we have seen, DC is electrical energy that travels in a single direction within a circuit. DC current flows from one pole to another, hence it is said to have polarity. The polarity indicates the direction of the flow of the current and is signified by the "+" and "-" signs.

DC power

Open & Close Circuit


An incomplete electrical circuit in which no current flows is called open circuit. A complete electrical circuit around which current flows or a signal circulates is called close circuit.

Parallel & Series Circuits


Circuits consisting of just one battery and one load resistance are very simple to analyze, but they are not often found in practical applications. Usually, we find Page No.149 Computer Hardware & Network Professional July 2011

circuits where more than two components are connected together. There are two basic ways in which to connect more than two circuit components: series and parallel. First, an example of a series circuit:

Now, let's look at the other type of circuit, a parallel configuration:

The Multi-meter
A multi-meter is an instrument that is used to measure several aspects of electricity. All multi-meters are designed to provide at least four major measurements: AC voltage DC voltage Continuity Resistance A multi-meter consists of two probes, an analog or digital meter, and a multiposition switch to select the type of test you wish to perform.

Page No.150

Computer Hardware & Network Professional July 2011

Reading the Meter


After the meter is set up, you are ready to test a wall outlet. There are three tests to perform. With AC voltage, it does not matter which lead is placed in which connector: Hot to Neutral: Place one lead in hot (smaller of the two vertical slots) and the other in neutral (larger of the vertical slots). The reading should be between 220 and 240 volts AC. Hot to Ground: Place one lead in hot (smaller of the two vertical slots) and the other in ground. The reading should be between 220 and 240 volts AC. Neutral to Ground: Place one lead in neutral (larger of the two vertical slots) and the other in ground. The reading should be 0 volts.

Selecting a Meter
You need a simple Digital Multi-meter (DMM) or Digital Volt-Ohm Meter (DVOM) to perform voltage and resistance checks on electronic circuits. You should use only a DMM instead of the older needle-type multimeters because the older meters work by injecting 9V into the circuit when measuring resistance, which damages most computer circuits. A DMM uses a much smaller voltage (usually 1.5V) when making resistance measurements, which is safe for electronic equipment. You can get a good DMM with many features from several sources.

Testing Continuity
Continuity is a term used to indicate whether or not a connection exists between one point in a circuit and another. It is used to determine the presence of breaks in wires and electrical circuits. If no continuity setting is available, use the resistance setting (see the next section). If the multi-meter measures infinite resistance, there is no continuity. This indicates a break in the line. If the multi-meter shows little or no resistance, there is continuity and the circuit is complete.

The Transformer
A transformer is an electrical device that transfers energy from one circuit to another by magnetic coupling with no moving parts. A transformer comprises two or more coupled windings, or a single tapped winding and, in most cases, a Page No.151 Computer Hardware & Network Professional July 2011

magnetic core to concentrate magnetic flux. A changing current in one winding creates a time-varying magnetic flux in the core, which induces a voltage in the other windings. Michael Faraday built the first transformer, although he used it only to demonstrate the principle of electromagnetic induction and did not foresee the use to which it would eventually be put.

Classifications
Step-up The secondary has more turns than the primary. Intake low voltage like 12v and step-up them in 220v. UPS is an good example of this. Step-down The secondary has fewer turns than the primary. Intake high voltage like 220v and step-down them in 3v, 6v, 12v. charging Adopter is a good example.

Page No.152

Computer Hardware & Network Professional July 2011

I.C (Integrated Circuit)


In electronics, an integrated circuit (also known as IC, microcircuit, microchip, silicon chip, or chip) is a miniaturized electronic circuit (consisting mainly of semiconductor devices, as well as passive components) that has been manufactured in the surface of a thin substrate of semiconductor material. There are two main advantages of ICs over discrete circuits: cost and performance. Cost is low because the chips, with all their components, are printed as a unit by photolithography and not constructed one transistor at a time. Performance is high since the components switch quickly and consume little power, because the components are small and close together. As of 2006, chip areas range from a few square mm to around 350 mm, with up to 1 million transistors per mm.

http://en.wikipedia.org/wiki/Image:Microchips.jpg

Electronic Components
As a computer professional, you should be familiar with the more common types of electronic components within a power supply. Here is a description of the basic components found on circuit boards inside a computer.

Resistors
A resistor is a component that is meant to be inserted into an electrical path, to restrict the flow of electricity. Most resistors come with two connecting wires, one at each end, so they can be added to the circuit. The value of a resistor is measured in Ohms, and the higher this value is, the less current will be able to flow through it. By the way, most of the resistors that you will encounter are constructed of some type of carbon material. In high power circuits, thin wire is generally used instead, which is then wound on a ceramic core that won't melt. Page No.153 Computer Hardware & Network Professional July 2011

http://en.wikipedia.org/wiki/Image:Old_Radio_Resistors.jpgCodes

Black 0

Brown 1

Red 2

Orange 3

Yellow 4

Green 5

Blue 6

Violet 7

Gray 8

White 9

The Mnemonic
B.B. ROY of Great Britain had a Very Good Wife Black is also easy to remember as zero because of the nothingness common to both.

Types of Resistance
1: Fix Resistance (Its value is fix and not change able) 2: Variable Resistances (Its value can be change able and can be varied) 3: Thermistor (It is the type of resistance that works on temperature) 4: Photo Resistance (Its works on light and very sensitive for light particles) 5: Varistor (It works on changing the voltage)

PC Power Supply
It is a very important part and most often overlooked when the specifications of a computer are being written for a purchase or an upgrade. Computer owners boast of their motherboard, processor, RAM and Hard Disk etc. What they forget to care about is the power supply.

Primary Function and Operation


The power supply provides the electrical power used by the computer. Computer Hardware & Network Professional July 2011 Page No.154

The power supply in a personal computer system is designed to convert 230V and 50Hz AC power into +3.3V, +5V, and +12V DC power. Some power supplies require you to switch between the two input ranges, whereas others auto-switch. Normally, the digital electronic components and circuits in the system (motherboard, adapter cards, and disk drive logic boards) use the +3.3V or +5V power, and the motors (disk drive motors and any fans) use the +12V power. The table below lists these devices and their power consumptions.

Positive DC Voltages

Power Consumption Ratings for PC Devices


Voltage
+3.3V +5V +12V

Devices Powered
Chipsets, DIMMs, PCI/AGP cards, miscellaneous chips Disk drive logic, SIMMs, PCI/AGP cards, ISA cards, voltage regulators, miscellaneous chips Motors, voltage regulators (high output)

The power supply must deliver a good, steady supply of DC power so that the system can operate properly. Devices that run on voltages other than those specified in the above table must be powered by onboard voltage regulators. For example, RIMMs run on 2.5V that is supplied by an onboard regulator, and processors are supplied by a voltage regulator module (VRM) that normally is built into the motherboard as well. The main function of the +12V power is to run disk drive motors as well as the higher-output processor voltage regulators in some of the newer boards. Usually, a large amount of +12V current is available from the power supply, especially in those designed for systems with a large number of drive bays for disk drive motors. In the newer CPU voltage regulators, the +12V supply is used by any cooling fans in the systemwhich, of course, should always be running. A single cooling fan can draw between 100mA and 250mA (0.10.25 amps); however, most new fans use the lower 100mA figure. Most fans in desktop systems run on +12V, portable systems can use fans that run on +5V, or even +3.3V. Computer Hardware & Network Professional July 2011

Page No.155

Negative DC Voltages
PC power supply also generates5V and 12V. The 5V is required on the Industry Standard Architecture (ISA) bus for full backward compatibility. 5V and 12V are supplied to the motherboard via the power supply connectors, the motherboard normally uses only the +3.3V, +5V, and +12V. The 5V is simply sent to the ISA bus on pin B5 so any ISA cards can use it. The analog data separator circuits found in older floppy controllers do use 5V. The motherboard logic normally doesnt use 12V, but it might be used in some board designs for serial port or LAN circuits. The older serial port circuits used +/12V outputs, today most run on only +3.3V or +5V.

The Power_Good Signal


The power supply actually prevents the computer from starting up or operating until all the power supply voltages are within the proper ranges. The power supply completes internal checks and tests before allowing the system to start. If the tests are successful, the power supply sends a special signal to the motherboard, called Power_Good. This signal must be continuously present for the system to run. Therefore, when the AC voltage dips and the power supply cannot maintain outputs within regulation tolerance, the Power_Good signal is withdrawn (goes low) and forces the system to reset. The system will not restart until the Power_Good signal returns. The Power_Good signal (sometimes called Power_OK or PWR_OK) is a +5V (nominal) active high signal (with variation from +2.4V through +6.0V generally being considered acceptable) that is supplied to the motherboard when the power supply has passed its internal self tests and the output voltages have stabilized. Some cheaper power supplies do not have proper Power_Good circuitry and might just tie any +5V line to that signal. Some motherboards are more sensitive to an improperly designed or improperly functioning Power_Good signal than others. Intermittent startup problems are often the result of improper Power_Good signal timing. Computer Hardware & Network Professional July 2011

Page No.156

A common example is when you replace a motherboard in a system and then find that the system intermittently fails to start properly when you turn on the power.

ATX Style
In the ATX type power supply the fan should be mounted along the inner side of the supply drawing air in from the rear of the chassis and blow it inside across the motherboard. This kind of airflow runs in the opposite direction as most standard supplies, which exhaust air out the back of the supply through a hole in the case where the fan is mounted. The idea was that the reverse flow design could cool the system more efficiently with only a single fan, eliminating the need for a fan (active) heat sink on the CPU. Another benefit of the reverse-flow cooling is that the system would run cleaner, freer from dust and dirt. The case would be pressurized, so air would be continuously forced out of the cracks in the case. For systems that operate in extremely harsh environments, you can add a filter to the fan intake vent to further ensure that all the air entering the system is clean and free of dust.

Page No.157

Computer Hardware & Network Professional July 2011

ATX Power supply and Connectors


Newer CPUs create more and more heat, the cooling capability of the system becomes more critical. It was found that using a standard negative pressure system with an exhaust fan on the power supply and an additional high-quality cooling fan blowing cool air right on the CPU is the best solution. For this reason, the ATX power supply specification has been amended to allow for either positive- or negative-pressure ventilation. Power supplies used with Baby-AT boards have two connectors that plug into the motherboard. If these connectors are inserted out of their normal sequence, the motherboard will burn out. Most responsible system manufacturers key the motherboard and power supply connectors so that you cannot install them backward or out of sequence. However, some vendors of cheaper systems do not feature this keying on the boards or supplies they use. The ATX form factor includes different power plugs for the motherboard to prevent users from plugging in their power supplies incorrectly. The ATX design features up to three motherboard power connectors that are definitively keyed, making plugging them in backward virtually impossible. The new ATX connectors also supply +3.3V, reducing the need for voltage regulators on the motherboard to power the chipset, DIMMs, and other +3.3V circuits. Besides the new +3.3V outputs, another set of outputs is furnished by an ATX power supply that is not normally seen on standard power supplies. The set consists of the Power_On (PS_ON) and 5V_Standby (5VSB) outputs mentioned earlier, known collectively as Soft Power. This enables features to be implemented, such as Wake on Ring or Wake on LAN, in which a signal from a modem or network adapter can actually cause a PC to wake up and power on. Many such systems also have the option of setting a wake-up time, at which the PC can automatically turn itself on to, perform scheduled tasks. These signals also can enable the optional use of the keyboard to power the system on. Users can enable these features because the 5V Standby power is always active, giving the motherboard a limited source of power even when off.

Motherboard Power Connectors


Every PC power supply has special connectors that attach to the motherboard, giving power to the system processor, memory, and all slotted add-on boards (ISA, PCI, and AGP). Attaching these connectors improperly can have a Page No.158 Computer Hardware & Network Professional July 2011

devastating effect on your PC, including burning up both your power supply and motherboard.

ATX Main Power Connector


power connector terminal side view.

ATX Main Power Supply Connector Pinout (Wire Side View)


Color Orange Blue Black Green Black Black Black White Red Red Signal +3.3V 12V GND PS_On GND GND GND 5V +5V +5V Pin 11 12 13 14 15 16 17 18 19 20 Pin 1 2 3 4 5 6 7 8 9 10 Signal +3.3V +3.3V GND +5V GND +5V GND Power_Good +5VSB (Standby) +12V Color Orange Orange Black Red Black Red Black Gray Purple Yellow

Page No.159

Computer Hardware & Network Professional July 2011

ATX12V Connector
Power for the processor comes from a device called the voltage regulator module (VRM), which is built into most modern motherboards. This device senses the CPU voltage requirements (usually via sense pins on the processor) and calibrates itself to provide the proper voltage to run the CPU. VRM is mostly designed to use 12V for input power.

Peripheral Power Connectors


In addition to the motherboard power connectors, power supplies include a variety of peripheral power connectors for everything from floppy and hard drives to internal case fans. The following sections discuss the various types of connectors youre likely to find in your PC.

Peripheral and Floppy Drive Power Connectors


The disk drive connectors on power supplies are fairly universal with regard to pin configuration and even wire color. The picture below shows the peripheral and floppy power connectors.

Peripheral Power Connector Pinout (Large Drive Power Connector) Pin Signal Color Pin Signal Color 1 +12V Yellow 3 GND Black 2 GND Black 4 +5V Red Peripheral Power Connector Pin out (Small Drive Power Connector) Pin Signal Color Pin Signal Color 1 +5V Red 3 GND Black
Page No.160 Computer Hardware & Network Professional July 2011

GND

Black

+12

Yellow

Power Supply Ratings


The 300-watt and larger units are recommended for fully optioned desktops or tower systems. These supplies run any combination of motherboard and expansion card, as well as a large number of disk drives and other peripherals.

BTX (for Balanced Technology Extended)


BTX (for Balanced Technology Extended) new power supply standard by Intel in 2004. It is replacement of Micro-ATX power supply. Basically it designed for Pentium 4 and core systems. In addition 24pins mother board connector and connector for SATA devices. BTX Main Power Connector

Page No.161

Computer Hardware & Network Professional July 2011

Power Supply Troubleshooting


Troubleshooting the power supply basically means isolating the supply as the cause of problems within a system and, if necessary, replacing it. In many cases a parity check error message can indicate a problem with the power supply. This might seem strange because the parity check message specifically refers to memory that has failed. The connection is that the power supply powers the memory, and memory with inadequate power fails. It takes some experience to know when this type of failure is power related and not caused by the memory. One clue is the repeatability of the problem. If the parity check message (or other problem) appears frequently and identifies the same memory location each time, it would be indicated that the defective memory is the problem. However, if the problem seems random, or if the memory location the error message points to as having failed seems random, it would indicate the defective power supply. The following is a list of PC problems that often are related to the power supply: Any power-on or system startup failures or lockups. Spontaneous rebooting or intermittent lockups during normal operation. Intermittent parity check or other memory-type errors. Hard disk and fan simultaneously failing to spin (no +12V). Overheating due to fan failure. Small brownouts cause the system to reset. Electric shocks felt on the system case or connectors. Slight static discharges disrupt system operation. Irregular system problem indicate that the supply is defective. Following symptoms point right to the power supply as a possible cause: System is completely dead (no fan, no cursor) Smoke Blown circuit breakers If you suspect a power supply problem, some of the simple measurements and the more sophisticated tests outlined in this section can help you determine whether the power supply is at fault. Because these measurements might not detect some intermittent failures, you might have to use a spare power supply for a long-term evaluation. If the symptoms and problems disappear when a known good spare unit is installed, you have found the source of your problem. Page No.162 Computer Hardware & Network Professional July 2011

Following points can help to zero in on common power supply related problems: 1. Check AC power input. Make sure the cord is firmly seated in the wall socket and in the power supply socket. Try a different cord. 2. Check DC power connections. Make sure the motherboard and disk drive power connectors are firmly seated and making good contact. Check for loose screws. 3. Check DC power output. Use a digital multi-meter to check for proper voltages. If its below spec, replace the power supply. 4. Check installed peripherals. Remove all boards and drives and retest the system. If it works, add back in items one at a time until the system fails again. The last item added before the failure returns is likely defective. Many types of symptoms can indicate problems with the power supply. Because the power supply literally powers everything else in the system, everything from disk drive problems to memory problems to motherboard problems can often be traced back to the power supply as the root cause.

Voltage Tolerance of Power supply


Continue by measuring the voltage ranges of the pins on the motherboard and drive power connectors. If you are measuring voltages for testing purposes, any reading within 10% of the specified voltage is considered acceptable, although most manufacturers of high-quality power supplies specify a tighter 5% tolerance. For ATX power supplies, the specification requires that voltages must be within 5% of the rating, except for the 3.3V current, which must be within 4%. The following table shows the voltage ranges within these tolerances.

Voltage ranges for an ATX power supplies


Loose Tolerance Tight Tolerance Desired Voltage Min. Max. (+8%) (10%) +3.3V 2.97V 3.63V +/5.0V 4.5V 5.4V +/12.0V 10.8V 12.9V Min. (5%) 3.135 4.75 11.4 Max. (+5%) 3.465 5.25 12.6

The Power_Good signal has tolerances that are different from the other voltages, although it is nominally +5V in most systems. The trigger point for Power_Good is about +2.4V, but most systems require the signal voltage to be within the tolerances listed here: Page No.163 Computer Hardware & Network Professional July 2011

Voltage Ranges for the Power_Good Signal


Signal Power_Good (+5V) Minimum 3.0V Maximum 6.0V

Replace the power supply if the voltages you measure are out of these ranges. Again, it is worth noting that any and all power supply tests and measurements must be made with the power supply properly loaded, which usually means it must be installed in a system and the system must be running.

Power Protection Systems


The following systems would be explained here. Surge suppressors Phone-line surge protectors Line conditioners (Voltage Stabilizer) Standby power supplies (SPS) Uninterruptible power supplies (UPS)

Uninterruptible Power Supplies (UPS)


Short for uninterruptible power supply, a power supply that includes a battery to maintain power in the event of a power failer. Typically, a UPS keeps a computer running for several minutes after a power failer, enabling you to save data that is in RAM and shut down the computer gracefully. The UPS is also a line conditioner (power stabilizer)Many UPSs now offer a software component that enables you to automate backup and shut down procedures in case there's a power failure while you're away from the computer. In a true UPS system the computer is always operating from the battery, there is no switching circuit. A voltage inverter converts from 12V DC to 220V AC. It is essentially a power system that generates power independently of the AC line. A battery charger connected to the line or wall current keeps the battery charged at a rate equal to or greater than the rate at which power is consumed. When the AC current supplying the battery charger fails, a true UPS continues functioning undisturbed because the battery-charging function is all that is lost. Because the computer was already running off the battery, no switching takes place, and no power disruption is possible. (See Pictures 3.3)

Page No.164

Computer Hardware & Network Professional July 2011

Power Failures
Power supplies are affected by the quality of the local power source. Common power delivery problems such as spikes, surges, sags, brownouts, and blackouts affect the stability and operation of the main power supply and are passed on to the computer. While most users don't notice sudden changes in the quality of electrical power, computers and other sensitive electronics do and while we can't fully control these problems, there are a few things we can do to protect our equipment and data and ensure a reasonably clean electrical supply.

Problem
Surges

Description
These are brief (and sometimes catastrophic) increases in the voltage source (very high voltage for a very short time). They can originate with the power source (the local power company), but most often are due to lightning strikes. Spikes are very short over voltage conditions. Spikes are measured in nanoseconds, while a surge is measured in milliseconds. These are brief decreases of voltage at the power source.

Spikes

Sags

Brownouts If sag lasts longer than one second, it is called a brownout. The overloading of a primary power source can cause brownouts. Some brownouts are "scheduled" by power companies to prevent overloading of circuits and potential catastrophic failure of the system. Blackout This is a complete power failure, which can be caused by equipment failure (local or regional) or accidental cutting of power cables. When the power returns after a blackout, there is a power spike and danger of a power surge.

Page No.165

Computer Hardware & Network Professional July 2011

Chapter 4

MICROPROCESSOR, MOTHERBOARDS & BUILT-INS


Microprocessor Introduction:
A microprocessor is an integrated circuit that contains a complete CPU on a single chip. It is also called the brain of computer. The microprocessor is also called CPU. CPU is central component of pc. The processor performs calculations and processing for the pc. CPU interacts with main memory Ram and other components of the computer. CPU is used in microcomputers as a compulsory component. Remember: CPU (central processing unit) is little hardware chip that runs the computer, It is not the entire system casing, that have many hardwares including CPU. Then correct name is system Unit of that system case. As for as the working of the CPU is connected, it is divided into two units: o Arithmetic & logic unit (ALU) o Control unit (CU)

Arithmetic and logic unit:


It is part of CPU. ALU performs all the operations of arithmetic and logic are performed by ALU. The data on which any operation is to be taken is fed into the computer memory with the help of input devices. The data is then assigned to ALU for further operation. ALU may further be divided into two parts: Arithmetic Unit Logic Unit

Arithmetic Unit:
The arithmetic unit of ALU performs the fundamentals operations of arithmetic such as addition, subtraction, multiplication, and division.

Logic Unit: Unit of ALU does all the operation of data involving between two values. The logical operations include the comparison between two numbers to define which number is greater, less equal or not equal to the number.

Page No.166

Computer Hardware & Network Professional July 2011

Control Unit:
CU is responsible for the execution of the program instruction given to the computer. The input and output devices also depend upon the CU. It accepts data from the input devices and transfers it to the main memory. Then it transfers data from the main memory to ALU. In the end it sends the output either to the main memory or output devices. The execution of the instruction by CU is done in four simple steps: o Instruction Fetch o Interpret Instruction o Data Fetch o Execution Instruction

Instruction Fetch:
It gets a program instruction stored in the main memory of the computer. This is called fetching instruction.

Data Fetch:
If an instruction requires certain data to operate upon the cu fetches the data from the computer memory and loads it into a register.

Execution Instruction:
After decoding the instruction and getting the required data the CU instruction the ALU to process the data according to the instruction given.

Function of CPU:
In the function of CPU, we will discuss in few steps as under. o In the accept data and instruction form input unit. o It store all the instruction and data in the main memory and retrieves the relevant information as and when we required. o It interprets the instruction and sends command to the relevant units. o It performs all the arithmetic and logical operation in ALU. o It control and coordinate the activity of other units. Page No.167 Computer Hardware & Network Professional July 2011

o Finally sends the result to the output unit. Importance of CPU (Microprocessor): In this lesson, we examine the microprocessor from its inception to the current state of the art-chip. It is important for a computer technician to understand the development of the processor gives us an understanding and how the system components can take advantages of the new features. We also need to understand the external bus, because it is the means by which CPU accesses system resources.

Cache:
It is intelligent buffer. A cache contains the data accessed between a slower peripheral device (RAM) and the faster CPU. Cache is high-speed memory than RAM. But cache quantity is slow.

Types of Cache:
There are two types of cache. o L1 Cache o L2 Cache

L1 Cache:
L1 Cache is made directly on the processor chip. Therefore, the L1 cache always ran at the full speed of the chip that is CPU (microprocessor). It is also called internal cache.

L2 Cache:
L2 Cache on the motherboard is called second level cache ran at the slow speed of the motherboard. But now it is built on the processor die in the shapes of small chip. It is also called external cache.

Processor Packaging:

PGA (Pin Grid Array):

Page No.168

Computer Hardware & Network Professional July 2011

PGA packaging has been the most common chip package used until recently. It was used starting with 286 processor in 1980s and is still used today for Pentium processors. PGA chip are inserted into sockets, which are often of a ZIF (zero insertion force) design. A ZIF sockets has a lever to allow for easy installation and removal of the chip. Most Pentium processors use a variation on the regular PGA called staggered pin grid array (SPGA), in which the pins are staggered on the underside of the chip rather than is standard rows and columns. This was done to move the pins closer together and decrease the overall size of the chip when a large number of pins are required.

Single Edge Contact: (SEC)


Pentium- II\III chips are characterized by their single edge contact SEC cartridge design. The processor, along with several l2 cache chips, is maintained on a small circuit board (much like an oversized memory SIMM), which is than sealed in a metal and plastic cartridge. The cartridge is then plugged into the motherboard through an edge connector called slot, 1 that looks very to an adopter card slot.

LGA (Land Pin Grid Array)

Page No.169

Computer Hardware & Network Professional July 2011

LGA stands for Land Grid Array. In English, this means that the pins in an LGA socket are built into the socket not into the CPU. LGA is a 775contaction CPU socket used by some Intel Celeron D, Pentium D, and Core series of Pentium processors. The new LGA 1156 is use to connect Core I processor. LGA sockets reduce the manufacturing costs of making ready-to-insert CPUs; by putting the pins on the motherboard socket. LGA sockets also allow more electrical contact points, which allows for a more stable voltage input for the CPU.

MMX Technology:
MMX stands for Multimedia Extensions. MMX is a technology designed to accelerate multimedia and communications applications. This technology started from Pentium-1. This acceleration and simplification is done through a set of multimedia instructions which are built into microprocessors to enable them to handle common multimedia operations like DSP, or Digital Signal Processing. According to Intel, a PC with an MMX microprocessor runs a multimedia application up to 60% faster than one with a microprocessor having the same clock speed but without MMX. In addition, an MMX microprocessor runs other applications about 10% faster.

BUSES:
A collection of conducting wires which is responsible for communicating signals from one place to another place in a computer system. A bus is a highway of digital signal it consist of a set of physical connection (printed circuit tracks and wires) over which the data and other information are moved for one place to another place.

Address Bus:
The address bus requests the memory location from the memory or I/O location from an I/O device. If an I/O is addressed, address bus contains 16-bit I/O address. The 16- bit I/O address selects one of the different I/O locations.

Data Bus:
The data bus transfer the information between microprocessor and its memory an I/O locations. Data transfers vary in size depending upon the microprocessor.

Page No.170

Computer Hardware & Network Professional July 2011

Control Bus:
The control bus contains lines that select the memory or I/O and cause them to perform read or write the operations.

Heat Sink:
To cool a system in which processor heat problem you can buy a special attachment for the CPU chip called a heat sink. When a computer system works, its processor consume power, therefore processor generate heat and this heat causes many problems for used to absorb heat on to the processor chip. Heat sink is made of a special metal, which carry heat away from the processor, data into fins. Fins that expose heat to moving air.

Types of Heat Sink: There are two types of heat sink: Passive Heat Sink:
The passive heat sinks for the socket processor showing a various attachment method and has no fan built into them.

Active Heat Sink: The active heat sink for the processor have fan built into them.

Page No.171

Computer Hardware & Network Professional July 2011

The Pentium:
The Pentium, introduced in 1993, retains the 32-bit address bus of the 80486 but doubles the data bus 64 bits. The Pentium retained the 32 bit registers of the 486 but made it possible to deal with the 64 bit data bus by adding a second execution unit. The Pentium also has two 8-K bytes cache memories, one for instructions and for data. The original Pentium operated at a clock frequency of 60 MHZ or 233 MHZ.

Pentium II:
The Pentium 11 was introduced in 1997 and incorporates Intel MMX Technology designed specifically to process video, audio, and graphics data efficiently. The MMX Technology improves video compression/decompression, image manipulation, encryption, and I/O processing. The Pentium 11 has 57 new instruction designed to speed the repetitive sequence often found in multimedia operation. Additional members of the Pentium -11 family were introduced in 1988, including the Celeron processor, designed for basic PC market by 199, the clock speed of the Pentium 11 was up to 450 MHZ, and the clock speed of the Celeron processor was up to 400 MHZ.

Pentium III:
The Pentium 111 was introduced in 1999. It was designed for the consumer and business market Page No.172 Computer Hardware & Network Professional July 2011

desktop computers. The Pentium 111 included 70 new instruction designed to enhance 3D imaging, and video applications, initial computers with the Pentium 111 operated at 500 MHZ but the Pentium 111 has been tested (By Intel) at speeds of over 1 GHZ using special cooling techniques.

Pentium IV:
In November 2000 Intel introduced the new and very powerful high-end chip Pentium 4 formerly known as codename WILLAMETTE. The Pentium 4 is a completely new processor holding several new designs. Here is a highlight. o 400 MHZ front side bus of 128-bit width. o Execution traces Cache. o 20-KB L1 Cache and 256 KB L2. o The ALU (Arithmetical logic unit) runs at twice the clock speed. o Clock frequency from 1500 MHZ. o A new 423 pins socket design. o 42 millions of transistors.

Core Processors:
Introduce in Jun 20007. A multi-core processor is a processing system composed of two or more independent cores (or CPUs). The cores are typically integrated onto a single integrated circuit die (known as a chip multiprocessor or CMP), or they may be integrated onto multiple dies in a single chip package. A many-core processor is one in which the number of cores is large enough that traditional multi-processor techniques are no longer efficient.

Page No.173

Computer Hardware & Network Professional July 2011

A dual-core processor contains two cores, and a quad-core processor contains four cores. A multi-core processor implements multiprocessing in a single physical package. Cores in a multi-core device may be coupled together tightly or loosely. For example, cores may or may not share caches, and they may implement message passing or shared memory inter-core communication methods.

The Motherboard
The motherboard is usually the largest circuit board found inside the computer case. Without doubt, the most important component in a PC system is the main board or motherboard. Some companies refer to the motherboard as a system board or planar. The terms motherboard, main board, system board, and planar are interchange able. The function of the motherboard is to provide the connectivity for all devices (Input, Output, and Storage), as well as for the CPU, RAM, and support ICs. It also defines the computers limits of speed, memory, and expandability. Figure shows the Structure and connectors of the motherboard. Motherboards come in a variety of shapes. One size does not fit all, and careful attention to size and location of mounting holes is required before installing a new motherboard in an older computer. A motherboard needs to fit in the space allocated for it, be properly grounded, receive sufficient ventilation (for cooling of the CPU and other heat-sensitive components), and must not conflict with other hardware. Page No.174 Computer Hardware & Network Professional July 2011

AT & Baby AT
Prior to 1997, IBM computers used large motherboards. After that, however, the size of the motherboard was reduced and boards using the AT (Advanced Technology) form factor was released. The AT form factor is found in older computers (386 class or earlier). Some of the problems with this form factor mainly arose from the physical size of the board, which is 12" wide, often causing the board to overlap with space required for the drive bays. Following the AT form factor, the Baby AT form factor was introduced. With the Baby AT form factor the width of the motherboard was decreased from 12" to 8.5", limiting problems associated with overlapping on the drive bays' turf. Baby AT became popular and was designed for peripheral devices such as the keyboard, mouse, and video to be contained on circuit boards that were connected by way of expansion slots on the motherboard.

ATX
Stand for Advanced Technology Extended. With the need for a more integrated form factor which defined standard locations for the keyboard, mouse, I/O, and Page No.175 Computer Hardware & Network Professional July 2011

video connectors, in the mid 1990's the ATX form factor was introduced. The ATX form factor brought about many chances in the computer. Since the expansion slots were put onto separate riser cards that plugged into the motherboard, the overall size of the computer and its case was reduced. The ATX form factor specified changes to the motherboard, along with the case and power supply. Some of the design specification improvements of the ATX form factor included a single 20-pin connector for the power supply, a power supply to blow air into the case instead of out for better air flow, less overlap between the motherboard and drive bays, and integrated I/O Port connectors soldered directly onto the motherboard. The ATX form factor was an overall better design for upgrading.

Micro-ATX
Micro ATX followed the ATX form factor and offered the same benefits but improved the overall system design costs through a reduction in the physical size of the motherboard. This was done by reducing the number of I/O slots supported on the board. The micro ATX form factor also provided more I/O space at the rear and reduced emissions from using integrated I/O connectors.

Page No.176

Computer Hardware & Network Professional July 2011

BTX
The BTX, or Balanced Technology Extended form factor. BTX was developed to take advantage of technologies such as Serial ATA, USB 2.0, and PCI Express. Changes to the layout with the BTX form factor include better component placement for back panel I/O controllers and it is smaller than micro ATX systems. The BTX form factor provides the industry push to tower size systems with an increased number of system slots. One of the most talked about features of the BTX form factor is that it uses in-line airflow. In the BTX form factor the memory slots and expansion slots have switched places, allowing the main components (processor, chipset, and graphics controller) to use the same airflow which reduces the number of fans needed in the system; thereby reducing noise. To assist in noise reduction BTX system level Page No.177 Computer Hardware & Network Professional July 2011

acoustics have been improved by a reduced air turbulence within the in-line airflow system.

Motherboard Components
A modern motherboard has several components built in, including various sockets, slots, connectors, chips, and so on.

Chipsets
The chipset is the main component of a motherboard. The chipset contains the processor bus interface, which is called front-side bus (FSB), memory controllers, bus controllers, I/O controllers, and many more. The processor cannot talk to the memory, adapter boards, devices, and so on without going through the chipset. Two boards with the same chipsets are functionally same. System with slower processor but better chipset can perform better then a system with faster processor The chipset is the main hub and central nervous system of the PC. If you think of the processor as the brain, the chipset is the spine and central nervous system. Chipset determines: What type of processor you can fit on the motherboard? How fast the buses will run? What type, speed and amount of memory you can use?

Super I/O Chips


Another major chip seen on many PC motherboards is called the Super I/O chip. This chip normally integrates devices formerly found on separate expansion cards in older systems. On the newer motherboard the function of the I/O is performed by the main chipset. Most Super I/O chips contain, at a minimum, the following components: Floppy controller Dual serial port controllers Parallel port controller Mother Board Buses Buses are the hardware lines over which devices send and receive signals (Data). This pathway is used for communication between two or more computer elements. The PC is combination of different buses. Most modern PCs have at least three buses (Processor, AGP, PCI, ISA) while some have four or more. These are necessary because each slower bus is connected to the faster one above it. Each device in the system is connected to one of the buses, and some devices (primarily the chipset) act as bridges between the various buses. Page No.178 Computer Hardware & Network Professional July 2011

ROM BIOS
ROM BIOS stands for Read Only Memory; Basic Input/Out put System. ROM is a type of memory that stores data even when the main computer supply is turned off. So, the information that initially required to turn On or run the computer are stored on the ROM. The BIOS, software in the form of programs stored on ROM chips, is used during the startup (Boot up) routine to check out the system and prepared to run the hardware. More recent systems use a technology called flash ROM or flash BIOS that allows code in the core chips to be updated by software available through the BIOS or motherboard supplier. BIOS (also called firmware) can be subdivided into three classes, depending upon the type of hardware it controls.

ROM Chips
Mask ROM PROM EPROM EEPROM Flash ROM

A Typical CMOS Setup


CMOS stands for Complementary Metal Oxide Semiconductor. All PC,s have CMOS chip. In CMOS chip the basic information about computer are recorded permanently, such as date and time, number of installed Floppy Disk, Hard Disk, there configuration, and password etc. The CMOS setup programs Page No.179 Computer Hardware & Network Professional July 2011

are text-based. CMOS setting (such as booting sequence, Date, Time, so on) can be change by using keystrokes to navigate through the information. The Function of CMOS is same as RAM, but to maintain permanent information in CMOS chip a small battery is attached to CMOS chip called CMOS battery.

The CMOS Battery


The CMOS chip requires a small trickle voltage from a battery to keep its memory alive. When the battery gets low or runs out of current, the computer will experience a sudden memory loss and thus lose settings. The voltage of CMOS batteries ranges from 3 to 6 volts. These Batteries come as either on-board (NiCad batteries, soldered in place or in a fixture, that last from five to seven years) or external (No rechargeable AA alkaline batteries that last from two to four years). Some time to load the default setting of the CMOS setup; remove the CMOS Battery for few mints and place it again on the motherboard. The first clue that the battery is weakening is that the CMOS clock begins to slow down. Go to a C Prompt and type time. If you notice the clock is slow, it's time to change the battery.

POST-Power-ON Self Test


The system BIOS program starts by invoking a special program (stored in a ROM chip) called POST.ROM BIOS run the POST program that automatically performs a series of tests that check the primary component in the system, such as the CPU, RAM, motherboard support circuitry, memory and major peripherals such as expansion chassis etc. POST program is executed before the loading of the operating system. The POST has two stages. Test 1 occurs before and during the test of the video. Test 2 occurs after the video has been tested.

Beep Codes Before and During the Video Test


The purpose of POST to first test and check the most basic components of the system, then it transfers control to the boot drive, and the operating system is loaded. In a healthy system, the POST reports by using a series of beep codes and screen messages to convey that all components are working properly or not. Page No.180 Computer Hardware & Network Professional July 2011

If the POST detects a problem, that enough to keep the system from operating properly, and halts the system boot process. It sometime called fatal errors because they prevent the system from booting. The following table lists the basic beep codes for AMI and phoenix BIOS. (The following table is an example only. Each ROM BIOS encompasses its own beep codes & their respective problems).

Number of Beeps 1 2 3 4 5 6 7 8 9 10 1 long, short 1 long, short

Possible Problem DRAM refresh failure Parity circuit failure Base 64 KB or CMOS RAM failure System timer Processor failure Keyboard controller or Gate A20 error Virtual mode exception error Display monitor write/read test failure ROM BIOS checksum error CMOS RAM shutdown register failure 3 Conventional/extended memory test failure 8 Display test and display vertical and horizontal retrace test failure

Possible Troubleshooting After a Beep


Page No.181 Computer Hardware & Network Professional July 2011

After a beep code has been recognized, there are a few things to do for troubleshoot the error. The following table suggests some solutions. Keep in mind and troubleshoot the problems.

Problem
RAM refresh failure Parity error RAM bit error Base 64-KB error 8042 error (Keyboard chip) Gate A20 error BIOS checksum error Video errors Cache memory error Any other problems

Solution
Reseat and clean the RAM chips. Replace individual memory chips until the problem is corrected. Reseat and clean keyboard chip, Check operating system. Replace keyboard. Replace motherboard. Reseat ROM chip, Replace BIOS chip. Reseat video card, Replace video card. Reseat and clean cache chips, Verify cache jumper settings are correct, Replace cache chips. Reseat expansion cards, Clean motherboard, Replace motherboard.

Understanding Expansion Buses


Expansion cards are integrated circuit card that plug into an expansion slots on a motherboard to provide access to additional peripherals or features (such as video, sound, image capture cards, etc.) not built into the board. Also referred to as an add-in-board Expansion slot is a slot on the motherboard that physically and electrically connects an expansion card to the motherboard and the system busses. CPU speeds increased as technology improved, while the speeds of expansion cards remained relatively constant. It was not practical to redesign and replace every expansion card each time a new processor was releasedthis would have been complicated and expensive for manufacturers.. To resolve this problem, designers have divided the external data bus into two parts: System bus: This supports the CPU, RAM, and other motherboard components. The system bus runs at speeds that support the CPU. Page No.182 Computer Hardware & Network Professional July 2011

Expansion bus: A bus/slot on the motherboard that physically and electrically connects for expansion card to the motherboard and system buses. Expansion bus also called I/O buses. The main difference among buses consists primarily of their architecture the amount of the data they can transfer at a time and speed at which they can do it. Following section describes the different types of the PC buses.

ISA bus
ISA is abbreviation of Industry Standard Architecture, which was introduced as an 8-bit bus with the original IBM Pc in 1981. It was later expanded to 16-bus with the IBM PC/AT in 1984.

8-Bit ISA bus Slot

The EISA Bus


EISA is an abbreviation for Extended Industry Standard Architecture. IBM announced this Standard in September 1988 AT systems. The EISA bus essentially a 32-bit version of ISA. EISA is still use older 8-bit or 16-bit ISA cards in 32-bit EISA slots, providing for full backward compatibility. EISA also allowed for automatic configuration of EISA cards via software. EISA bus added 90 new connections (55 new signals plus grounds) without increasing the physical connector size of the 16-bit ISA. The 32-bit EISA slot looks a lot like the 16-bit ISA slots. The EISA adapter, however, has two rows of stacked contacts. The first row is the same type use in 16-bit ISA cards, while the other thinner row extends from the 16-bit connector.

Top view of ISA and EISA bus

Page No.183

Computer Hardware & Network Professional July 2011

Cross section of ISA and EISA bus

Peripheral Component Interconnect (PCI)


The PCI bus specification was released in June 1992 as version 1.0 & since then have several upgrades. PCI bypasses the standard I/O bus, it uses the system bus to increase the bus clock speed and take full advantage of the CPUs data path. The best features of the PCI slots are as bellow. PCI cards do not have any jumpers, switches and are configured through the software. PCI designs use special bus and chip set for advance bus mastering techniques. This allows to supports more then three PCI slots. The PCI bus has its own set of Interrupts number for each slot, if a PC have more then four PCI slots, some of them will be sharing interrupts and IRQ,s

Page No.184

Computer Hardware & Network Professional July 2011

Accelerated Graphic Port (AGP)


The AGP was created by Intel as a new bus specifically designed for highperformance graphics and video support. AGP is based on PCI, but it is physically, electrically, and logically independent of PCI. PCI is a true bus with multiple connectors (slots), while AGP is more of a point-to-point high performance connection designed specifically for a video card in a system because only one AGP slot is allowed for a single video card. The AGP specification 1.0 originally was released by Intel in July of 1996 and defined a 66MHz. Clock rate with 1X, 2X (1x means single signal send in 1 cycle, 2X means two signals are send in one cycle and so on.) signaling using 3.3 volts. AGP version 2.0 was released in May 1998 and added 4X signaling as well as a lower 1.5v operation capability. The latest version of AGP specification for PC,s is AGP 8X, which was announced in August 2000. It defines a faster 8x transfer mode for ever-greater performance then before. AGP command is found only on Pentium II and late compute systems The standard AGP 1x/2x, AGP 4x and AGP pro slots are compared to each other in the pictures. Page No.185 Computer Hardware & Network Professional July 2011

AGP 4x and AGP pro can accept AGP 1x, 2x and 4x cards.

PCI Express
The PCIe physical layer consists of a network of serial interconnects much like twisted pair Ethernet. A single hub with many pins on the main-board is used, allowing extensive switching and parallelism and the serial interconnects (known as lanes) can be grouped to provide higher bandwidth. This design was chosen because as clock rates increase, synchronization of parallel connections is hindered by timing skew. PCIe is just one example of a general trend away from parallel buses to serial interconnects. For other examples, see Hyper Transport, Serial ATA, USB, SAS or FireWire. A multichannel serial design also increases flexibility; slow devices can be given a single lane with a relatively small number of pins while fast devices can be given more lanes as necessary up to a maximum of 32.

Universal Serial Bus (USB)


Universal serial bus (USB) is an external peripheral bus standard designed to bring plug and play capability for attaching peripherals externally to the PC. The bus supports up to 127 devices simultaneously.

Page No.186

Computer Hardware & Network Professional July 2011

USB Series A and B plugs and receptacles


USB conforms to Intels plug and play (PnP) specification, including Hot plugging, which means that devices can be plugged in dynamically without powering down or rebooting the system. Simply plug the device, and the USB controller in the PC detects the device and automatically allocates the required resources and drivers. USB supports following data transfer rate, depending on the amount of bus bandwidth a peripheral device requires.

1.5 mega bits per second (Mbps) for devices, such as a mouse or keyboard, that do not required large amount of bandwidth. 12 Mbps transfer rate for high-bandwidth devices such as modem, speakers, Scanners etc. USB sends signals over simple four-wires the physically two series are specified for USB. Series A connector is designed for devices in which the cable remains permanently attached, such as hubs, keyboard, and mice. The USB ports on most motherboards are normally a series A connector. Series B connector are designed for devices that required data cable, such as printers, scanners, modems and telephones. The physical USB plugs are small and unlike a typical serial or parallel cable connector. Note: Maximum cable length between two USB full-speed (12Mb/sec) devices is 5-Meters; while for lower speed (1.5Mbp/sce) devices are 3meters. Page No.187 Computer Hardware & Network Professional July 2011

Chapter 5

INSTALLING AND CONFIGURING THE PERIPHERALS. Memory


All computer memory is used to hold binary strings of data destined to be manipulated by the CPU. Think of memory as a vast bank of switches with two positions: on or off. Off is given the value of "0"; on is given the value of "1." This allows the switches to hold binary data based on whether they are open or closed.

Nonvolatile and Volatile Memory


There are two major classes of computer memory: Nonvolatile and Volatile. Nonvolatile Memory is retained even if the power is shut off. The setup data held in CMOS, discussed in the preceding lessons, is a good example of nonvolatile memory. If the data is lost when the computer loses power, the memory is said to be Volatile.

ROM: Read-Only Memory


ROM (read-only memory) is nonvolatile memory, generally installed by the vendor of the computer during the process of manufacturing the motherboard or secondary components that need to retain code when the machine is turned off. ROM is used extensively to program operation of computers, as well as in devices like cameras, and controls for the fuel injectors in modern cars. However, ROM plays a limited role in the PC. Here, it holds the instructions for performing the POST routine and the BIOS information used to describe the system configuration.

RAM: Random Access Memory


Since the beginning of the digital age, memory has been a limiting factor in computer performance. Memory or more correctly known as RAM (Random Access Memory) is a vital hardware component in your computer and a major determining factor in your computer's overall performance. RAM is the form of volatile memory used to hold temporary instructions and data for manipulation while the system is running.

Page No.188

Computer Hardware & Network Professional July 2011

Types of Computer Memory


Three main types of physical memory are used in modern PCs: ROM. Read-only memory DRAM. Dynamic random access memory SRAM. Static RAM The speed of memory used to be expressed in ns (nanoseconds), and that of processor in MHz (megahertz). Newer and faster types of memory have speeds expressed in MHz A nanosecond is defined as one billionth of a second.

SDRAM
Synchronous DRAM (SDRAM) is for Synchronous DRAM, a type of DRAM that runs in synchronization with the memory bus. SDRAM delivers information in very high-speed bursts using a high-speed, clocked interface.

DDR SDRAM
Double data rate (DDR) SDRAM memory is an evolutionary design of standard SDRAM in which data is transferred twice as quickly. Instead of doubling the actual clock rate, DDR memory achieves the doubling in performance by transferring twice per transfer cycle: once at the leading (falling) edge and once at the trailing (rising) edge of the cycle. DDR SDRAM uses a new DIMM module design with 184 pins. DDR DIMMs are rated for either PC1600 (200MHz x 8) or PC2100 (266MHz x 8) operation or normally run on 2.5 volts. They are basically an extension of the PC100 and PC133 DIMMs redesigned to support double clocking, where data is sent on each clock transition (twice per cycle) rather than once per cycle as with standard SDRAM.

RDRAM
RDRAM is a wide-channel device. They transfer data only 16 bits (2 bytes) at a time (plus 2 optional parity bits), but at much faster speeds. RIMM typically runs at 800MHz, so the overall throughput is 800 2, or 1.6GB per second for a single channelthe same as PC1600 DDR SDRAM. Dual-channel PC800 RDRAM is also currently the fastest type of PC memory, followed by PC2100 DDR SDRAM. Whether your board supports (requires) dual-channel RDRAM is dictated by the motherboard chipset; currently, the Intel 840 and 850 chipsets support dual-channel RDRAM.

Page No.189

Computer Hardware & Network Professional July 2011

DIMM (Dual Inline Memory Module) 1. DDR SDRAM chips : Standard DIMMs have 168 pins, one notch on
either side, and two notches along the contact area. 2. DDR DIMMs, on the other hand, have 184 pins, two notches on each side, and only one notch along the contact area. 3. All DIMMs are either 64-bits (non-parity) or 72-bits (parity or error correcting code [ECC]) wide (data paths).

A typical 168-pin SDRAM DIMM. The one shown here is 72-bit, although the dimensions would be the same for 64-bit The pins are numbered from left to right and are connected through to both sides of the module on the SIMMs. The pins on the DIMM are different on each side, but on a SIMM, each side is the same as the other and the connections carry through.

A typical 184-pin DDR DIMM. The one shown here is 72-bit, although the dimensions would be the same for 64-bit.

RIMM (RAMBUS INLINE MEMORY MODULE)


RIMM is a type of memory module made using RDRAM chips. RIMMs are also double-sided. Only one type of RIMM is available, which has 184 pins, one notch on either side, and two notches centrally located in the contact area. All RIMMs Page No.190 Computer Hardware & Network Professional July 2011

are either 16-bits wide or 18-bits wide (data path) for non-ECC and ECC versions, respectively.

A typical 184-pin RIMM. The one shown here is 18-bit, although the dimensions would be the same for 16-bit.

Installing Memory
When you install or remove memory, you are most likely to encounter the following problems: Electrostatic discharge Improperly seated modules Incorrect memory configuration settings in the BIOS Setup

Installing DIMMs and RIMMs

Page No.191

Computer Hardware & Network Professional July 2011

DIMM keys match the protrusions in the DIMM sockets. DDR DIMM and RIMM keys are similar but not exactly the same. Installing RIMMs

Typical RDRAM bus layout showing a RIMM and one continuity module

DDR2 SDRAM
is a double data rate synchronous dynamic random access memory interface. It supersedes the original DDR SDRAM specification and the two are not compatible. In addition to double pumping the data bus as in DDR SDRAM, (transferring data on the rising and falling edges of the bus clock signal), DDR2 employs an I/O buffer between the memory and the data bus so that the data bus can be run at Page No.192 Computer Hardware & Network Professional July 2011

twice the speed of the memory clock. The two factors combine to achieve a total of 4 data transfers per memory clock cycle. With data being transferred 64 bits at a time, DDR2 SDRAM gives a transfer rate of (memory clock rate) 2 (for bus clock multiplier) 2 (for dual rate) 64 (number of bits transferred) / 8 (number of bits/byte). Thus with a memory clock frequency of 100 MHz, DDR2 SDRAM gives a maximum transfer rate of 3200 MB/s.

DDR3 SDRAM
In electronic engineering, DDR3 SDRAM or double-datarate three synchronous dynamic random access memory is a random access memory interface technology used for high bandwidth storage of the working data of a computer or other digital electronic devices. DDR3 is part of the SDRAM family of technologies and is one of the many DRAM (dynamic random access memory) implementations. DDR3 SDRAM is an improvement over its predecessor, DDR2 SDRAM, and the two are not compatible. The primary benefit of DDR3 is the ability to transfer at twice the data rate of DDR2 (I/O at 8 the data rate of the memory cells it contains), thus enabling higher bus rates and higher peak rates than earlier memory technologies. There is no corresponding reduction in latency, as that is a feature of the DRAM array and not the interface. In addition, the DDR3 standard Page No.193 Computer Hardware & Network Professional July 2011

allows for chip capacities of 512 megabits to 8 gigabits, effectively enabling a maximum memory module size of 16 gigabytes. With data being transferred 64 bits at a time per memory module, DDR3 SDRAM gives a transfer rate of (memory clock rate) 4 (for bus clock multiplier) 2 (for data rate) 64 (number of bits transferred) / 8 (number of bits/byte). Thus with a memory clock frequency of 100 MHz, DDR3 SDRAM gives a maximum transfer rate of 6400 MB/s.

Page No.194

Computer Hardware & Network Professional July 2011

Hard Disk Drive


Definition of a Hard Disk
Hard Disk Drive may be defined as PC component that is used for the permanent storage of data. The data stored in the hard disk is not lost by power failure. Hard drives have rigid and round disk which are called platters. These platters are made of aluminum or glass. This is because of these rigid platters that the term hard disk is used. These platters cannot be removed. This is why they are sometimes called fixed disk drives.

Hard Disk Drive Construction

The two main components of the hard disk drive are the revolving disks and the heads which read/write the data on the disks. The data is read and written on tracks as shown bellow. The tracks are further divided into sectors, which normally store 512 bytes each.

Page No.195

Computer Hardware & Network Professional July 2011

The platters are stacked on top of each other and rotate together. Each platter has two sides on which the drive stores data. Most drives have two or three platters, resulting in four or six sides. The identically aligned tracks on each side of every platter together make up a cylinder. All the heads are mounted on a common carrier device or rack. The heads move radically across the disk together. They cannot move independently because they are mounted on the same carrier or rack, called an actuator. Originally, most hard disks spun at 3,600rpmapproximately 10 times faster than a floppy disk drive. Most of the modern drives spin the platters at 4,200; 5,400; 7,200; 10,000; or 15,000rpm. High rpm disks are normally faster than lower rpm drives. The heads in most hard disk drives do not (and should not!) touch the platters during normal operation. When the heads are powered off, however, in most drives they land on the platters as they stop spinning. While the drive is running, a very thin cushion of air keeps each head suspended a short distance above or below the platter. This air gap is in micro inches.

Tracks
A track is a single ring of data on one side of a disk.

Sectors
Tracks are divided into several numbered divisions known as sectors. These sectors represent arc-shaped pieces of the track. Different type of disk drives split their disk tracks into different numbers of sectors, Page No.196 Computer Hardware & Network Professional July 2011

depending on the density of the tracks. Hard disks can have 900 or more sectors per track physically. Each sector contains 512 bytes of data.

Disk Formatting
You have to perform following three steps to make the drive ready for data storage: Low-level formatting (LLF) Partitioning High-level formatting (HLF)

Low Level Formatting


Low-level formats of ATA and SCSI hard disk drives are performed by the manufacturer and should almost never be performed by the end user. The only situation when a low-level format may be performed on hard disk drives is that: 1. When you need to repair a damaged format (parts of the disk become unreadable). 2. When you wish to wipe away all data on the drive. First of all use the Low Level Formatting utility software provided by the manufacturers of your hard disk drives. Most manufacturers supply low-level format programs for their drives.

Partitioning

Page No.197

Computer Hardware & Network Professional July 2011

High-Level Formatting
During the high-level format, the operating system (such as Windows XP/Vista/Windows 7) writes the structures necessary for managing files and data on the disk. High-level formatting is not really a physical formatting of the drive, but rather the creation of a table of contents for the disk.

Boot Sector
This sector contains data that describes the partitions by their starting and ending cylinder, head, and sector locations. The partition table also indicates to the ROM BIOS which of the partitions is bootable and, therefore, where to look for an operating system to load.

Main Hard Disk Drive Components


Many types of hard disk drives are on the market, but nearly all share the same basic physical components. Some differences might exist in the implementation of these components (and in the quality of the materials used to make them), but the operational characteristics of most drives are similar. The basic components of a typical hard disk drive are as follows (see Figure 10.6): Disk platters Read/write heads Head actuator mechanism Spindle motor (inside platter hub) Logic board (controller or Printed Circuit Board) Cables and connectors Configuration items (such as jumpers or switches)

Page No.198

Computer Hardware & Network Professional July 2011

Hard Disk Platters (Disks)


A hard disk drive has one or more platters, or disks. Hard disks for PC systems have been available in a number of form factors over the years. Normally, the physical size of a drive is expressed as the size of the platters. Following are the platter sizes that have been associated with PC hard disk drives: 3 1/2-inch 2 1/2-inch

Read/write heads and rotary actuator assembly.


Page No.199 Computer Hardware & Network Professional July 2011

Spindle Motors
The motor that spins the platters is called the spindle motor because it is connected to the spindle around which the platters revolve. Spindle motors in hard disk drives are always connected directly; no belts or gears are involved. The platters in hard disk drives revolve at speeds ranging from 3,600rpm to 15,000rpm (60250 revolutions per second) or more.

Logic Boards
All hard disk drives have one or more logic boards mounted on them. The logic boards contain the electronics that control the drives spindle and head actuator systems and present data to the controller in some agreed-upon form. In many cases, logic boards plug into the drive and are easily replaceable. These boards are usually mounted with standard screw hardware. If a drive is failing and you have a spare, you might be able to verify a logic-board failure by taking the board off the known good drive and mounting it on the bad one.

Cables and Connectors


Most of the hard disk drives have at least these two types of connectors: Interface connector(s) Power connector

IDE (Integrated Drive Electronics) Interface


IDE stands for Integrated Drive Electronics. Integrated Drive Electronics refers to the fact that the interface electronics or controller is built into the drive and is not a separate board, as with earlier drive interfaces. The actual name of this interface is ATA (AT Attachment). This name was given to it as the combined drive and controller were designed to connect to the IBM AT computer. ATA is used to connect not only hard disks, but also CD-ROM and CD-RW drives, DVD drives and tape drives. ATA originally referred to a hard disk drive that plugged directly into a version of the AT-bus, more commonly known as the 16-bit ISA bus. There were many different types of IDE interface variations before the ATA IDE interface was developed with its present specifications. ATA IDE is the interface we will study in the following section.

Page No.200

Computer Hardware & Network Professional July 2011

TYPICAL ATA (IDE) HARD DRIVE CONNECTORS

ATA (IDE) 40-pin interface connector detail


To create a keyed connector, the manufacturer generally removes pin 20 from the male connector and blocks pin 20 on the female cable connector, which prevents the user from installing the cable backward.

Dual-Drive Configurations
The ATA standard provides the option of operating on the AT bus with two drives in a daisy-chained configuration. The primary drive (drive 0) is called the master, and the secondary drive (drive 1) is called the slave. You designate a drive as being master or slave by setting a jumper or switch on the drive or by using a special line in the interface called the cable select pin and setting the CS jumper on the drive. Most IDE drives can be configured with four possible settings: Master (single-drive) Page No.201 Computer Hardware & Network Professional July 2011

Master (dual-drive) Slave (dual-drive) Cable select

SATA
Serial ATA (SATA or Serial Advanced Technology Attachment) is a computer bus interface for connecting host bus adapters to mass storage devices such as hard disk drives and optical drives. Serial ATA was designed to replace the older ATA (AT Attachment) standard (also known as EIDE), offering several advantages over the older parallel ATA (PATA) interface: reduced bulk cables, 40 conductors replace with only 7 conductors that also cost effected. It has faster data transfer through higher signaling rates that is 1.5Gbit/s. Interface of power cable also change that is good for reverse connection. Page No.202 Computer Hardware & Network Professional July 2011

Disk management When we purchase a new hard-disk, it is all ready low-level formatted. But it is not ready for normal use we need first to divide it in portions logically with portioning softwares. The second step is high level formatting. Disk management utility Disk Manager is a utility that manages the system disks and the volumes or partitions contained. With Disk Management, you can initialize disks; create volumes, format volumes with file systems FAT, FAT32 or NTFS. Disk Manager allows you to perform most tasks related to disk without rebooting the system or interrupting users. Most configuration changes enter into force immediately.

To open Disk Management


1. Open Computer Management (Local). 2. In the console tree, click Disk Management.

To open Computer Management, right click on my computer icon, point to Manage, and then click Disk management.

Disk Partition Most operating systems allow users to divide a hard disk into multiple partitions, in effect making one physical hard disk into several smaller logical hard disks. Basic purpose of this logical splitting of disk is to organize data in a manner.

Page No.203

Computer Hardware & Network Professional July 2011

File System. After partition of a hard-disk operating system create a file system on the disk. A file system (often also written as filesystem) is a method of storing and organizing computer files and their data. Essentially, it organizes these files into a database for the storage, organization, manipulation, and retrieval by the computer's operating system. File systems are used on data storage devices such as hard disks or CD-ROMs to maintain the physical location of the files. Basic work of File system: Efficiently use the space available on your hard drive to store the necessary data Catalog all the files on your hard drive so that retrieval is fast and reliable. Provide methods for performing basic file operations, such as delete, rename, copy, and move. Provide some kind of data structure that allows a computer to boot off the file system.

Fat32
Derived of the file allocation table (FAT) file system. Fat32 supports smaller cluster sizes and larger volumes than Fat, which results in more efficient space allocation on Fat 32 volumes.

NTFS file system


An advance file system that provides performance, security, reliability, and advanced features that are not found in any version of Fat. For example, NTFS guarantees volume consistency by using standard transaction logging and recovery techniques. If a system fails, NTFS uses its log file and checkpoint information to restore the consistency of the file system. In windows 2000, windows XP, Vista and windows 7. NTFS also provides advanced features such as file and folder permissions, encryption, disk quotas, and compression.

CD-ROM Drives and Disc


The CD-ROM (compact disc read-only memory) is a technology taken directly from the audio world that has become standard equipment for computers. This lesson covers the basics of installing and using CD-ROM drives. CD-ROM stands for compact disc read-only memory. This is an optical and read only storage device. The CD-ROM is a read-only optical storage medium. It is capable of holding up to 650 MB to 700 MB of audio, data or video. Its normal size is a 120mm diameter, 1.2mm thick. It is made up of a plastic disc. CD-R (CD-record Page No.204 Computer Hardware & Network Professional July 2011

able) and CD-RW (CD-re-writ able) and DVD (digital versatile disc) are other variations of the compact disc.

CD-ROM Construction
The term CD-ROM refers to both the discs themselves and the drive that reads them. A CD is made of a polycarbonate wafer, 120mm in diameter and 1.2mm thick, with a 15mm hole in the center. This wafer base is stamped or molded with a single physical track in a spiral configuration starting from the inside of the disc and spiraling outward. The track has a pitch, or spiral separation, of 1.6 microns (millionths of a meter, or thousandths of a millimeter). The laser used to read the disc would pass right through the clear plastic, so the stamped surface is coated with a reflective layer of metal (usually aluminum) to make it reflective. Then, the aluminum is coated with a thin protective layer of acrylic lacquer, and finally a label or printing is added.

The construction of a CD-ROM CD-Writeable


There are two main types of recordable CD drives and discs are available. One of them is called CD-R (recordable) and the other is CD-RW (rewritable). All the CD-RW drives can also function as CD-R drives. All drives sold today are CDRW. Those drives can work with either CD-R or CD-RW discs. Page No.205 Computer Hardware & Network Professional July 2011

Once a CD-R is written with data, it is permanently stored and cant be erased. The write-once limitation makes this type of disc less than ideal for system backups or other purposes in which it would be preferable to reuse the same media over and over. However, because of the low cost of CD-R media, you might find that making permanent backups to essentially disposable CD-R discs is as economically feasible as tape or other media. In a CD-R the writing process is completed by burning an organic dye.
CD-RW discs can be reused up to 1,00 times, making them suitable for almost any type of data storage task. Most recordable CD drives are both CD-R and CD-RW in one. In a CD-RW the writing process is completed by phase change of a metal alloy. The writing speed of a CD-RW is less than a CD-R.

Burn a CD or DVD
If your computer includes a CD or DVD recorder, you can copy files to a writeable disc. This process is called burning a disc. By default, Windows burns discs in the Live File System format, but you can also choose to burn discs in the Mastered format.

Note: You can use Windows to burn a data disc, which is useful for storing, archiving, and sharing files among different computers. If you want to make a disc that will play in a music or video player, you should burn the disc using a music or video program. To burn a disc using the Live File System format 1. Insert a writeable CD or DVD into your computer's CD or DVD recorder. 2. In the dialog box that appears, click Burn files to data disc. 3. In the Burn a Disc dialog box, type a name for this disc, and then
click Next. It might take several minutes for the disc to be formatted in the default Live File System format. When the formatting is complete, an empty disc folder opens.

4. Open the folder that contains the files you want to burn, and then drag the
files into the empty disc folder. Page No.206 Computer Hardware & Network Professional July 2011

You can copy files to the disc folder by dragging them to the disc icon or to an open disc folder As you drag files into the disc folder, they are copied automatically to the disc.

Advantages of CD-ROM Drives


If a hard disk drive holds more information than a floppy disk drive, accesses the information faster, and reads and writes information, then why do we need CD-ROM drives? The answer is simple: a compact disc can hold large amounts (650 MB) of removable data and can be mass-produced at a very low cost.

Advantage
Large storage capacity Portability

Description
Up to 650 MB of data fit on a single 5-inch disc. (Smaller than the original 5.25-inch floppy disk, a CD holds almost 2000 times as much information) The CD is a portable medium.

Page No.207

Computer Hardware & Network Professional July 2011

Data cannot be changed Sturdiness

A CD is read-only, which prevents accidental erasure of programs or files. More durable than the standard 5.25-inch or 3.5-inch disks, CDs are not magnetic media and thus are not subject to the same dangers posed by proximity to electrical sources or magnets. CD-ROMs are audio-capable, allowing special compression of audio, image, and video data. They can be used to play standard audio CDs and have the capacity to store and record video data.

Special capabilities

Spiral layout of CD-ROM drive sectors

Caring for CD-ROM drives and discs

Causes of most problems


with CD-ROMs

Dust Fingerprints Scratches Defects on surface of CD Random electrical noise


CD-ROM drives and disc precautions Do:
Hold the CD by the edge Clean with a soft, dry cloth

Do not:

Write on, or paste paper to, the surface of the CD Subject the CD to heat Use cleaners, alcohol, and the like on the CD Make the center hole larger Bend, drop, or subject the CD to shock Page No.208 Computer Hardware & Network Professional July 2011

If a CD gets stuck in the drive, use the emergency eject hole to


remove it CD-R and CD-RW drives CD-recordable (CD-R)

A CD RW drive that can record or write data to a CD Data cannot be erased once it is written We can create multi-sessions in CD-R

Rewritable CD (CD-RW)

A CD drive that can record or write data to a CD Data can be erased and overwritten We can create multi-session in CD-RW
Installing a CD-ROM drive

Jumper pins on a SCSI CD-ROM drive can:


Control the SCSI ID for the drive Enable or disable SCSI parity checking Enable or disable the built-in SCSI terminator on the drive
Installation guidelines

Once installed, the CD-ROM drive becomes just another drive on


your system with these exceptions

It is read-only It holds more data than a hard drive It is a little slower to access than a hard drive

Page No.209

Computer Hardware & Network Professional July 2011

Configuring an IDE CD-ROM drive


Uses ATAPI standard

Digital Video Disc DVD


DVD stands for digital versatile disc and in simplest terms is a high-capacity CD. In fact, every DVDROM drive is a CD-ROM drive. It means that they can read CDs as well as DVDs (discs). DVD uses the same optical technology as CD. The main difference is the higher density. A CD-ROM can hold a maximum of about 700MB (80-minute disc) of data, which might sound like a lot but is simply not enough for many up-and-coming applications, especially where the use of video is concerned. DVD discs, on the other hand, can hold up to 4.7GB (single layer) or 8.5GB (dual layer) on a single side of the disc, which is more than 11 times greater than a CD. Double-sided DVD discs can hold up to twice that amount; although currently you must manually flip the disc over to read the other side. The 4.7 GB of digital data according to Moving Picture Experts Groupstandard 2 (MPEG-2) compression is enough to contain approximately 133 minutes of video, which is enough for a full-length, full-screen, full-motion feature film. Using both layers, a single-sided disc could easily hold 240 minutes of DVD video or more. DVD technology is similar to CD technology. Both use the same size (120mm diameter, 1.2mm thick, with a 15mm hole in the center).

Page No.210

Computer Hardware & Network Professional July 2011

Installing a DVD Drive


A DVD drives installs in a manner similar to that of a CD-ROM or any other type of drive.

Faster, larger, CD-ROM format Can read older CDs Can store over 8 gigabytes of data; can hold full-length motion picture videos Uses MPEG-2 video compression and requires an MPEG-2 controller card to
decode the compressed data

Optical Drives
Device CD-ROM CD-Writer DVD-ROM Combo Drive Super drive Descriptions Read only drive, Reading capacity 650MB to 700MB It is 2 in 1 device. It is CD-ROM and CD Writer. DVD looking just like CD Drive but it can read 4GB Disc It is 3 in 1 device. It cans CD, DVD read and CD Drive. It is 4 in 1 device. It cans read CD, DVD and write CD, DVD

Blu-ray Disc
Blu-ray Disc (also known as Blu-ray or BD) is an optical disc storage medium designed to supersede the standard DVD format. Its main uses are for storing high-definition video, PlayStation 3 games, and other data, with up to 25 GB per single layered, and 50 GB per dual layered disc. The disc has the same physical dimensions as standard DVDs and CDs. The name Blu-ray Disc derives from the blue-violet laser used to read the disc. While a standard DVD uses a 650 nanometer red laser, Blu-ray uses a shorter wavelength, a 405 nm blue-violet laser, and allows for almost six times more data storage than on a DVD. During the format war over high-definition optical discs, Blu-ray competed with the HD DVD format. Toshiba, the main company supporting HD DVD, ceded in February 2008, and the format war ended; in July 2009, Toshiba announced plans to put out its own Blu-ray Disc device by the end of 2009. Blu-ray Disc was developed by the Blu-ray Disc Association, a group representing makers of consumer electronics, computer hardware, and motion pictures. As of June 2009, more than 1000 Blu-ray disc Page No.211 Computer Hardware & Network Professional July 2011

titles are available in Australia, 2500 in Japan, 1500 in the United Kingdom, and 2500 in the United States and Canada.

Digital Cameras
A digital camera is an electronic device used to capture and store photographs electronically in a digital format, instead of using photographic film like conventional cameras, or recording images in an analog format to magnetic tape like many video cameras. Modern compact digital cameras are typically multifunctional, with some devices capable of recording sound and/or video as well as photographs. In the Western market, digital still cameras now outsell their 35 mm film counterparts. Webcam: A webcam is a video camera which feeds its images in real time to a computer or computer network, often via USB, ethernet or Wi-Fi. Their most popular use is the establishment of video links, permitting computers to act as videophones or videoconference stations.

Image sensing technology

Infrared sensor
Charge-coupled device (CCD)

MP3 Player
MP3 players are now the hottest items that everyone wants. Now you can store data or listen to your favorite music everywhere! These MP3 players and flash storage drive devices come in stylish designs with great functionality. MP3 A method to compress audio files that uses MPEG level 3 Can reduce sound files as low as a 1:24 ratio without losing sound quality Streaming audio Downloading audio data from the Internet in a continuous stream of data without first downloading an entire audio file. Page No.212 Computer Hardware & Network Professional July 2011

Expansion/ Adapter cards


An expansion card is an electronic circuit board that adds more functionality to a desktop computer. Expansion cards are installed into the expansion slot of a computer motherboard. They enhance the computers ability to perform additional functions not offered by the motherboard. Video cards and sound cards are common examples of PC expansion cards.

VGA Card
A video card, video adapter, graphics accelerator card, display adapter, or graphics card is an expansion card whose function is to generate output images to a display. Many video cards offer added functions, such as accelerated rendering of 3D scenes and 2D graphics, video capture, TV-tuner adapter, MPEG-2/MPEG4 decoding, FireWire, light pen, TV output, or the ability to connect multiple monitors (multi-monitor). Other modern high performance video cards are used for more graphically demanding purposes, such as PC games. Video hardware can be integrated on the motherboard. (See Pictures 5.1) VGA Port It is stander port for VGA card to connect Monitor, LCD, and Multimedia projector DVI Port The Digital Visual Interface (DVI) is a video interface standard designed to provide very high visual quality on digital display devices such as flat panel LCD computer displays and digital projectors. Sound Card A sound card (also known as an audio card) is an internal computer expansion card that facilitates the input and output of audio signals to and from a computer under control of computer programs. A sound card plays voice as well as music files, and can handle various audio file formats including .wav, .mp3 and .mp4 to name but a few. The typical sound card has an interface available at the back of the computer with various input and output ports. The quality of the sound card and speakers both affect the overall Page No.213 Computer Hardware & Network Professional July 2011

sound quality of the computer system. Speakers plug directly into the back of the sound card. (POST beeps are not produced by sound card) (See Pictures 5.2) Network interface Card A network interface controller is a computer hardware component that connects a computer to a computer network. The controller may also be referred to as a network interface card, network adapter, or a LAN adapter. A network either allows one or multiple computers to connect to each other in a Local Area Network (LAN), or it allows them to connect to the Internet in a Wide Area Network (WAN). Some networks are configured to allow both. In domestic applications, networking usually consists of allowing the computers in a household to share the same printer, to send and receive files, and to connect the computers to the Internet. (See Pictures 5.3) TV Tuner A TV tuner card is a computer component that allows television signals to be received by a computer. Most TV tuners also function as video capture cards, allowing them to record television programs onto a hard disk. The interfaces for TV tuner cards are most commonly either PCI bus expansion card or the newer PCI Express (PCIe) bus for many modern cards or USB devices also exist. In addition, some video cards double as TV tuners, and display card. (See Pictures
5.2)

Page No.214

Computer Hardware & Network Professional July 2011

Chapter 6

UPGRADING AND TROUBLESHOOTING.


Upgrading Computer, Disassembly and Reassembly
Computer upgrading and troubleshooting are most common tasks performed by a computer technician. With new technology coming out every day, it is a constant struggle to stay up to date. Before you can upgrade or repair a computer, you must know how to do it.

Collect Documentation Before Starting the Job


The following list provides examples of the types of documentation you should assemble before you begin a repair.

A computer configuration sheet. Copies of the computer and/or motherboard documentation. A list of all installed expansion cards. If possible, include the date on which they were originally installed. Copies of the operating-system documentation (especially if you are not familiar with the system). A plan of action. Writing down a checklist of tasks and related tools and parts before starting a project can help you keep focused and stay on target. Remember, plans can always be changed; but without a plan, you could find yourself wandering aimlessly through the project and perhaps getting sidetracked or lost.

Questions to Ask Yourself Before Starting the Job


Carefully consider the following questions before you open the case of any computer:

What I am going to do? Is this the right computer? Have I gather all necessary information about Hardware as well as software of working computer? Have I save/copy all necessary or important data? Have I all necessary tools that need to done this job? Have I all helping hardwares like Power supply, memory, monitor etc.

Page No.215

Computer Hardware & Network Professional July 2011

Example of configuration Sheet. Note: Student must prepare it

Page No.216

Computer Hardware & Network Professional July 2011

Disassembling
Disassembling a computer is a straightforward task. In most cases, computer systems has same fitting. But some branded companies have their unique case fitting. In this view you must careful and must find hidden locks and screws. Some time you need to disassemble whole computer or some peripheral, this is a general guideline. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. Make a complete backup of necessary operating-system and working files. Document the system (hardware and software). Create proper work area with good light. Gather all the necessary tools for the job. Remember all safety precaution. Ware antistatic wrist. Turn off the computer. Disconnect the power cables. Wear an antistatic wrist strap. Locate the locks or screws for removing cover. Document all the hardwares inside the computer. Disconnect all the data and power cables from the peripherals. Remove all the cards and memories and place them in antistatic bags. Remove the drives from their boxes. Remove the motherboard. Save the all cable and screws in component box.

Reassembly
To reassemble a computer, you simply follow the same procedures as for disassembly, but in the reverse order. When installing components, remember the following:

Do not force connectors into placeif they don't fit easily, they are probably in the wrong place. Expansion cards often require some force or side-to-side movement to fit into place, but do not force them. Connecting data cables must see their pin one. Some cable or connector may connect invert. When you all devices screwed then you will start to connect data and power cables. At the end you carefully observe the whole system before powering ON.

Upgrading a Computer
Page No.217 Computer Hardware & Network Professional July 2011

Most frequently performed task by a computer professional is to upgrade old systems to the latest technologies. This ability to expand and upgrade a computer can prolong the life and utility of a system.

The possible aspects of system upgrade


Processor Motherboard Memory Expression Card Optical Drives. Hard Disks USB Ports

Microprocessor upgrading
Now computer technology advancing day by day. In this regard new softwares force you to upgrade your microprocessor, because new software built with lifelike colors and more user friendly that need more and more power of CPU. That is why the whole computer goes slow. This time you need to replace your processor with heir clock speed, bus speed and cache memory. You can see software requirement form its documents.

Steps
1. 2. 3. 4. 5. 6. First check your operating system or software requirement. Check your current motherboard, is it support new selected processor. See CPU configuration on the CPU chip. Check its socket for new CPU. Check its bus speed for new CPU Find out what socket your motherboard has. The major sockets are: Socket 370: Intel Pentium III, Celeron. Socket 462 (socket A): AMD Athlon, Duron, Athlon XP, Athlon XP-M, Athlon MP, Sempron. Socket 423: Pentium 4. Socket 478: Intel Pentium 4, Celeron, Pentium 4 Extreme Edition. Socket 775: (LGA) Core series Socket 1366: (LGA) Core i7

Page No.218

Computer Hardware & Network Professional July 2011

If something is not mach with the requirement of new CPU, then you will need to replace motherboard also.

Reasons of upgrading Motherboard


A computer's motherboard, the backplane of circuits, ports and slots that allows the processor to communicate with all the other hardware in PC. Besides linking hardware together, it also acts as the focal point for the operating system, allowing it access to all the hardware components. It follows, therefore, that there are numerous reasons for deciding to upgrade your motherboard:

to enable an upgrade to a faster processor to allow use more or faster memory to support a faster AGP graphics card to support the latest internal bus technologies, such as ATA/133 or Serial ATA to enable you to use external peripherals using USB or FireWire technology to increase your expansion slot potential

if you have a branded system like Dell, IBM then you forget to change your motherboard only. Because the unique fitting of their chasing for hardwares and different power factor.

Memory upgrading (RAM)


A memory upgrading in a computer is most easiest task perform by a technician. But it is also important to flow the safety precautions.

The major reasons to upgrade the RAM:


1. Update the operating system and it need higher memory. 2. Playing high resolution game, that always memory hungry. 3. Edit videos with professional softwares also need more memory. If you want to update your computer memory then you must check first:

Page No.219

Computer Hardware & Network Professional July 2011

1. Software needed RAM can plug with motherboard (DDR-1, DDR-2, DDR3) 2. Is there empty any RAM expression slot. After checking possibilities of updating RAM you unplug the power wire of the computer and wear the antistatic wrist.
What are PC100, PC133, PC1600, PC2100, PC2700, and PC3200 memory? PC100 and PC133 are types of SDRAM. PC1600, PC2100, PC2700 and PC3200 are types of DDR. They are all DIMM's in physical construction. The type of memory, SDRAM or DDR that can be used in a computer is a characteristic of the motherboard. Most motherboards support either SDRAM or DDR, but not both. However, there are some motherboards that allow either, but not both at the same time. SDRAM and DDR use different types of memory slots for installation. The numbers identify the FSB speed of the RAM.

What is the front side bus? The front side bus (FSB) is the connection between the
processor and memory. Its speed is expressed in MHz The higher the MHz, the faster the FSB. The maximum speed of the FSB is a characteristic of the motherboard.

For SDRAM
100 FSB processor should be used with PC100 133 FSB processor should be used with PC133

For DDR 200 FSB processor should be used with PC1600 RAM 266 FSB processor should be used with PC2100 RAM 333 FSB processor should be used with PC2700 RAM

Page No.220

Computer Hardware & Network Professional July 2011

400 FSB processor should be used with PC3200 RAM Expansion Cards
Installing an expansion card is one of the most common system upgrades. Adding faster video cards, more ports, or improving sound quality are common reasons for plugging in a new card. Before installing (or purchasing) an expansion card, it is a good idea to make sure it will work in the system to be upgraded, and that appropriate expansion slot and drivers are available for the operating system to be used.

Motherboard and expansion card Reason of updating Display card:


Need dual channel Display to connect Monitor and projector both. Need digital display (DVI) LCD or video decoder. Need better GPU (graphic processing unit) and display memory for gaming. Built in or old card have some problem.

Reason of updating sound card:


Need sound card with sound effects. Need 4 or 5 channel with four sub-woofers for surrounding sound.

Page No.221

Computer Hardware & Network Professional July 2011

Need 2 or more input for audio mixing. Need professional sound card for high output and input. Built in or old card have some problem.

Reason of updating Modem card:


Current modem card is analog 56k, replace with ISDN. Analog modems also available as external device so save a expression slot. Low bandwidth replace with high bandwidth. Use DSL modem because DSL phone line has both facility phone and internet.

Plug And Play Technology


Plug and play shortly called PnP. This technology devolved for the new addition of hardwares in Microsoft Windows. Hardwares and Windows have both capability of PnP. Because of this technology when we add a new hardware, windows instantly try to recognize it and install its drive form driver library that developed by Microsoft with the coordination of manufacturers. Motherboard BIOS also controlled this function. Hot PnP Hot plug and play mean attach new hardware without restarting the computer like SATA drives, USB device and PCMCIA card in Laptop. Soft PnP Software Plug and play mean not only detection of hardware by the operating system but also installation its drive is call soft PnP.

Basic Hardware requirements of Operating System.


Operating system
Windows 2000 Windows XP Server 2003 Windows VISTA Page No.222

Processor
233MHZ 233MHZ 500MHZ 2GHZ

RAM
64MB 128MB 256MB 512MB

Hard disk
1.5GB 2GB 2GB 15GB

CD/DVD
CD CD CD DVD

Computer Hardware & Network Professional July 2011

Windows 7 Server 2008

2GHZ 2GHZ

512MB 512MB

15GB 15GB

DVD DVD

Recommendations:
Operating system
Windows 2000 Windows XP Server 2003 Windows VISTA Windows 7 Server 2008

Processor
500MHZ 1GHZ 1MHZ Core Core Core

RAM
256MB 512MB 1GB 1GB 1GB 1GB

Hard disk
2.5GB 3GB 5GB 20GB 20GB 20GB

CD/DVD
CD CD CD DVD DVD DVD

Viruses and Solution


A computer virus is a small program that interferes with normal functions of the computer. (A misconception, about the computer virus is that, it is a reall germ or insect.) The sole purpose of a virus is to replicate itself and make life miserable for computer users. Many viruses are simple annoyances, but some of them can cause irreparable harm to files. Viruses can be caught from various sources including shareware, files downloaded from the Internet, software from unknown origins, and bulletin boards. There are four basic types of viruses:

File Infectors: These attach themselves to executable files and spread to other files when the program is run. Boot Sector: These replace the master boot record (or boot sector on a floppy disk). They write themselves into memory any time the computer is booted. Trojan Horses: These are disguised as legitimate programs, but when loaded, they begin to harm the system. Macro Viruses: These common nuisances attach themselves as executable code to documents (such as Microsoft Word documents) and run when the document is opened. (They can also attach themselves to certain kinds of email.) It used to be true that you couldn't get a virus from opening a document; running a program was required. Unfortunately, this has changed thanks to the

Page No.223

Computer Hardware & Network Professional July 2011

widespread use of macros by computer users. While macros are very valuable, they mean that when you open a document you are running a program. Viruses have become a way of life in the computer world. With this in mind, there are several measures you can take to prevent, or at least minimize, the damage:

Purchase a good antivirus programthere are several available. Make sure your choice is compatible with Windows xp or windows vista. Viruses are often transmitted by USB flash drive. Currently, many viruses and macro viruses are transmitted over the Internet. Use extreme caution when you download files, especially if they come from sources other than a manufacturer's Web site. Trust no one when it comes to loading programs on your machine. Be aware that any program you load on your computer could contain a virus. Keep your antivirus program updated. Hundreds of new viruses are written and transmitted each month.

Troubleshooting Guidelines Note.


When you received a computer with problem you take first step to clean the system with Air-blower. This procedure clears the most problems regarding the hardware because dust convert in carbons and disconnect the small connections.
No power in monitor and system unit. Check power board, power cables of monitor and system unit. Check also power buttons is it working well? No change when you press power ON button of system. Test power cable, check power supply internal connector and reconnect them, test after replacing power supply. Power ON the system but no display. Clean the system with Air-blower, Reconnect all hardwares with mother board if problem not solve then disconnect all drives, sound, LAN and Modem card. If problem solve reconnect step by step. Try to replace the display card, RAM and power supply. System producing beep sound and no display. Its problem with RAM or display card replay or reconnect them. Beep sound with display. Problem with Keyboard or mouse.

Page No.224

Computer Hardware & Network Professional July 2011

Chapter # 7

DISPLAY DEVICES, PRINTERS & SCANNER


1) Monitors
The monitor displays the video and graphics information generated by the computer through the video card. Monitors are very similar to televisions but display information at a much higher quality. Repairing the inside of monitors is proper job of a TV repairman than a computer technician. Monitors generally carry warnings that they contain no userserviceable parts for good reason. Although we discuss the inner workings of monitors but we should not be taken as an invitation to probe inside them where the risk of serious electrical shock is high.

The Cathode-Ray Tube


The CRT is the main components of a traditional monitor. Cathode-Ray Tube, an electron tube, or evacuated glass container, having at one end a cathode, or negative electrode, and a device called an electron gun that projects a beam of electrons against a luminescent screen at the opposite end of the tube. A bright spot of light appears wherever the electrons strike the screen. Cathode-ray tubes, or CRTs, are used as picture tubes in television receivers and as visual display screens in computer Monitor. Most color monitors have three guns in back, one for each of the colors, red, green, and blue. This combination (usually refers to as RGB) allows the visual production of all colors. The wide end of the CRT is the display screen, which has a phosphors coating. When active, the guns beam a stream of charged electron on to phosphorus coating. When the coating is hit with the right amount of energy, light is produced in a pattern of very small dots. This same technology is used in X-Ray imaging. The name for a collection of all dots in a specific location is a pixel (which stands for picture element) Page No.225 Computer Hardware & Network Professional July 2011

Parts of CRT: 1. Electron guns 2. Electron beams 3. Focusing coils 4. Deflection coils 5. Anode connection 6. Mask for separating beams for red, green, and blue part of displayed image 7. Phosphor layer with red, green, and blue zones 8. Close-up of the phosphor-coated inner side of the screen

Refresh Rate
The refresh rate is the number of times a display's image is repainted or refreshed per second. The refresh rate is expressed in hertz so a refresh rate of 75 means the image is refreshed 75 times in a second. Its means more refresh rate, more clear and still picture. If refresh rate is low the picture will flicker or vibrate. The refresh rate for each display depends on the video card used. You can change the refresh rate in the display properties. However, if you change the refresh rate to a setting that the display or Monitor, the display goes blank or the image becomes distorted. It is recommended to consult the display (Monitor/LCD) and video card technical information from manufacturer website before changing the settings. Normal refresh rate of a monitor is 70HZ to 85HZ; LCD refresh rate is 60HZ to 75HZ and LED LCD have more refresh rate, which is 120HZ to 480HZ.
http://en.wikipedia.org/wiki/Image:Shadow_mask_closeup_cursor.jpgLCD

& TFT

Monitors
Flat-panel displays (FPDs) are becoming increasingly commonplace in today's commercial electronic devices. FPDs are finding widespread use in many new products, such as cellular phones, personal digital assistants (PDAs), camcorders, and laptop personal computers (PCs). This generation of handheld electronics places stringent demands on their displays. FPDs in these devices are expected to be lightweight, portable, rugged, low-power and high-resolution. Displays having all these attributes will enable a wide variety of commercial applications in the future. Page No.226 Computer Hardware & Network Professional July 2011

LCD Panels Borrowing technology from laptop manufacturers, most major monitor makers sell monitors with liquid crystal displays (LCDs). LCDs have low-glare; completely flat screens and low power requirements are (5 watts versus nearly 100 watts for an ordinary monitor). The color quality of an active-matrix LCD panel actually exceeds that of most CRT displays. Two basic LCD choices are available today on notebook computers: Passive matrix analog color and active-matrix digital --- the latest development. Passive matrix display In passive matrix LCD, such you would find on older and less expensive notebook computer and each cell is controlled by the electrical charge of two transistor, determined by the cells row and columns positions on the display. The number of transistor along the screen horizontal and vertical edges determines the resolution of the screen. For example, screen with 1,024 x 768 resolution has 1, 024 transistor on its horizontal edge and 768 on the vertical, for a total of 2000. As the cell reacts to the pulsing charge form its tow transistor, it twists the light wave, with stronger charges twisting the light waves more. Supper twists refer to the orientation of the liquid crystal, comparing on mode to off mode-the greater the twists the higher the contrast.

TFT Monitors A thin film transistor liquid crystal display (TFTLCD) is a variant of liquid crystal display (LCD) which uses thin film transistor (TFT) technology to improve image quality. TFT LCD is one type of active matrix LCD, though it is usually synonymous with LCD. It is used in televisions, flat panel displays and projectors. A thin film transistor (TFT) is a special kind of field effect transistor made by depositing thin films of a Page No.227 Computer Hardware & Network Professional July 2011

semiconductor active layer as well as the dielectric layer and metallic contacts over a supporting substrate. A common substrate is glass, since the primary application of TFTs is in liquid crystal displays. This differs from the conventional transistor where the semiconductor material typically is the substrate, such as a silicon wafer. Active-matrix Displays Most active-matrix used Thin film transistor (TFT) array. TFT is a method for packing from one (monochrome) to three (RGB colors) transistor per pixels with in a flexible material that is the same size and shape as the display. There for the transistor for each pixel lie directly behind the liquid crystal cells they control. Two TFT manufacturing processes account for most of the active active-matrix displays on the market today. Hydrogenated amorphous silicon (a-Si) and low temperature poly silicon (p-Si). These processes defer primarily in their cost. At first, most TFT displays were manufactured using the a-Si process because it required lower temperature (less then 400 C ) then the p-Si processes of the time now, lower temperature p-Si manufacturing processes are making this method and economically viable alternative to a-Si. Tuning of Monitor Display Allows adjustment of the top and bottom of the image. Image height changes. Allows adjustment of the location of the image between the top and bottom of the active viewing area. Adjusts the center of the image (vertically) to eliminate or reduce bowing in or out of the display image.

Vertical height

Vertical center

Pincushion

Page No.228

Computer Hardware & Network Professional July 2011

Horizontal width

Allows adjustment of the size of the image on the horizontal axis.

Horizontal center

Allows the image to be horizontally centered

Keystone

Allows adjustment of the top and bottom edge widths so that the image is square. Available on newer, larger monitors. Demagnetizes the CRT to prevent an electron beam from bleeding over to an adjacent dot, causing shadowing and/or loss of color control.

Degaussing

a) Monitor Maintenance Monitor care and troubleshooting are usually simple tasks. Here are some general guidelines to follow. 1- Make sure the monitor is properly ventilated, No cover of cloth or book on it. 2- Clean it before regular use. 3- No magnetized material keeps near, like speakers or screw-drivers. 4- Do not put your mobile phone on the monitor. 5- Keep away the monitor from high voltage and EMI 6- If monitor is changing color and brightness rapidly check its data cable or connector, if find faulty replace them. 7- If you see fogy picture tune its focus variable found near fly-back. (Be careful from fly-back it has high voltages, you must use plastic tuner-set) 8- If your monitor have low brightness even you tune high, then tune the inside brightness variable that you will find on RGB gun circuit board. 9- After starting windows picture is flickering so much or goes black, make its resolution low or make its refresh rate high. (You done it with high resolution monitor or removing VGA driver in safe-mode) Page No.229 Computer Hardware & Network Professional July 2011

10- If monitors colors are fading press the degaussing button from front panel.

Multimedia Projector
A digital projector, also called a digital projection display system, is a specialized computer display that projects an enlarged image on a movie screen. Such devices are commonly used in presentations. There are two main types of digital projection display systems. The older, less expensive type employs three transparent liquid-crystal-display (LCD) panels, one for each of the primary colors (red, green, and blue). The light transmittivity of each pixel varies depending on the image data received from the computer. The light from a lamp is directed through the LCD panels, collimated using a lens, and projected onto a screen. The overall construction of the device is similar to that of a slide projector, where the "slide" consists of the three LCD panels placed close together near the focal point of the projection lens. Advantages of LCD technology include efficiency, ease of brightness and contrast adjustment, and high image resolution. A newer, more expensive scheme is known as Digital Light Processing (DLP), a proprietary technology developed by Texas Instruments. In a DLP display, tiny mirrors are used instead of transparent panels. Each mirror represents one pixel. The light, rather than passing through the panel, is reflected from it. The mirrors move back and forth, varying the amount of light that reaches the projection lens from each pixel. Color is obtained by passing the light from the lamp through a rotating wheel with red, green, and blue filters. This subjects the mirrors to light at each of the primary colors in a rapid rotating sequence. The result is a colormodulated image that the human eye sees as natural color. Advantages of DLP technology include light weight, high contrast, and lack of pixelation.

Page No.230

Computer Hardware & Network Professional July 2011

Printers, Scanners & Fax Machine


Introduction:
Printer is a device that accepts text and graphic from a computer and transfers the information to paper, usually to standard size sheets of paper. Printers vary in size, speed, sophistication, and cost. In general, more expensive printers are used for higher-resolution color printing. Personal computer printers can be divided in to two forms impact and nonimpact. Early impact printers worked something like an automatic typewriter, with a key striking an inked impression on paper for each printed character. The dot-matrix printer was a popular low-cost personal computer printer. It's an impact printer that strikes the paper a line at a time. The best-known non-impact printers are the inkjet printer, of low-cost color printers are an example, and the laser printer. The inkjet sprays ink from an ink cartridge at very close range to the paper as it rolls by. The laser printer uses a laser beam reflected from a mirror to attract ink (called toner) to selected paper areas as a sheet rolls over a drum.

Important Terms
Printer resolution: Resolution is usually measured in dots per inch (dpi). This indicates the number of vertical and horizontal dots that can be printed; the higher the resolution, the better the print quality. Speed: This is usually given in pages printed per minute, where the page consists of plain text with five percent of the printable page covered in ink or toner. Paper capacity: The number and types of paper trays available, the number of pages that can be placed in them, and the sizes of pages that can be printed all vary widely among printers. Some smaller units hold as few as 10 sheets, while high volume network printers hold several reams in different sizes. Some printers can also be set to automatically choose which tray to use based on the type of paper best suited for a job. Printer memory: Laser printers that will be used to print complex graphics and full-color images require larger amounts of memory than those which print simple text only. In many cases, this memory can be added as an option. Cost of consumables: When comparing the cost of various printers, be sure to calculate and compare the total cost per page for printing, rather than just the cost of a replacement ink or toner cartridge. Page No.231 Computer Hardware & Network Professional July 2011

Portrait: The vertical orientation of printing on a piece of paper so that the text or image is printed across the 8.5-inch width of the paper. Landscape: The horizontal orientation of printing on a piece of paper so that the text or image is printed across the 11-inch width of the paper. Duplexing: The ability to print on both sides of a page. This cuts operating costs and allows users to create two-sided documents quickly.

Dot-Matrix Printer
Introduction: Dot matrix printers are considered impact printers because they physically strike an inked ribbon with a metal pin to put characters on paper. A dot matrix printer wires off rows of pins that strike the ribbon in patterns to create the image or characters that need to be printed. Originally, dot-matrix printers used only nine pins in the print head. The 9-pin dot matrix printers were known as draft-quality printers and were later replaced by 17- and even 24-pin dot matrix printers. The quality of the 24-pin dot matrix was much better than that of the 9-pin because the greater number of dots creates a finer image. Old Dot-matrix printer use LPT connector to make connection with computer but new one are with USB. How it works: Dot matrix printer works by advancing paper vertically around a rubberized ruler one line at a time. At the same time a print head travels back and forward horizontal on a metal bar. The printer head contains matrix of metal pins that it extends in various combination to make a physically impression on the paper. Between the pins and paper there is a inked ribbon. This ribbons much like that use in a typewriter. The pin pressing through the ribbon on the page makes a series of small dots forming typographic on the page. The dot matrix printers are usually associated with continued sheet paper driven by print hole. On the edge of paper most of the models can handle single sheet. Maintenance: Maintaining a dot-matrix printer is very simple: 1. Adjust the print-head spacing. 2. Check the tension on the print-head positioning belt. Use a non-fibrous swab dipped in alcohol to clean the print head. Page No.232 Computer Hardware & Network Professional July 2011

3. 4. 5. 6. 7. 8.

Clean the printer's roller surfaces. Clean the surface of the platen. Clean the gear train of the paper-handling motor. Apply a light coating of oil to the rails. Move the carriage assembly to distribute the oil. Clean the printing head with connect cleaner to remove the extra ink.

Troubleshooting: Troubleshooting a dot-matrix printer usually requires a reference manual. There are so many printers on the market that no single to help a computer technician troubleshoots all printer problems. Sr. No. 1 2 Problem Printer does not function at all. Device does not print although power is on. Printer won't go online. Paper slips around platen 5 6 Head moves, but does not print. Print garbage on paper Possible Causes No AC power is getting to printer. Fuse is blown. Power cable fault. Printer is not online. Printer is out of paper. Printer data cable is disconnected. Printer is out of paper. (Check paper sensors.) Paper is not being gripped properly. (Adjust paper feed selector for size and type of paper.) Ribbon is not installed properly or is out of ink. Adjust the head space. Driver problem restart the computer. Reinstall the driver.

3 4

Inkjet Printer
Introduction: An inkjet printer was introduced mid of 1980s. This is a very famous printer for home and small biasness. The cost of printer is low but the cost of printing is high. It has both capabilities of black & white and color printing. Page No.233 Computer Hardware & Network Professional July 2011

How it works: Inkjet printer use liquid ink to print and spray it from tiny holes on paper. This ink is packed in a small box which we called ink cartridge. Some time the printing head is built on the cartridge. It makes a word or picture to spray ink from head with tiny dots of 60 microns. (Diameter of hair is 70 microns). For drawing color picture it uses three basic colors Red, Blue, Yellow but some high resolution printers use four colors. (Red, Blue, Green, Yellow) Ink cartridges - Depending on the manufacturer and model of the printer, ink cartridges come in various combinations, such as separate black and color cartridges, color and black in a single cartridge or even a cartridge for each ink color. The cartridges of some inkjet printers include the print head itself. Refilling is not recommended by the companies but it is cost-effective. Precautions 1. 2. 3. 4. Normally inkjet printers need little maintenance but need to save it from dist. If you not need this printer for a long time one month or more you must remove its ink cartridges and pack them in its special boxes. If you forget to remove the ink cartridges, the ink will dry in its holes. Normally every inkjet printer has their own maintenance system. You run this from its utility program. This utility program clean heads and try to remove dry ink form holes. You can also control the ink usage for ink saving and dark the image. If you want to refill the cartridge you must purchase recommended ink for the model otherwise you dont get good results.

5. 6.

Maintenance: 1. Clean the dist from the printer with Air-blower. 2. Check the tension on the print-head-positioning belt. 3. Clean the printer and its mechanism. 4. Clean the printer's roller surfaces. 5. Clean the surface of the platen. 6. Clean the surface of the ink-jet print head. 7. Clean the gear train of the paper-handling motor. 8. Apply light oil to the head assembly rod using a foam swab. 9. Move the carriage assembly to distribute the oil. Page No.234 Computer Hardware & Network Professional July 2011

Laser Printer
Introduction: The term laser printer, on the other hand, is a bit more mysterious -- how can a laser beam, a highly focused beam of light, write letters and draw pictures on paper? A laser printer is a popular type of personal computer printer that uses a non-impact (keys don't strike the paper), photocopier technology. When a document is sent to the printer, a laser beam "draws" the document on a selenium-coated drum using electrical charges. After the drum is charged, it is rolled in ink, a dry powder type of ink. The ink makes the image on the drum. Then ink is transferred onto a piece of paper and fused to the paper with heat and pressure. After the document is printed, the electrical charge is removed from the drum and the excess ink is collected. Most laser printers print only in monochrome. A color laser printer is up to 10 times more expensive than a monochrome laser printer.

The Laser Assembly Since it actually draws the page, the printer's laser system -- or laser scanning assembly -- must be incredibly precise. The traditional laser scanning assembly includes: Page No.235 Computer Hardware & Network Professional July 2011

A laser A movable mirror A lens The laser receives the page data -- the tiny dots that make up the text and images - one horizontal line at a time. As the beam moves across the drum, the laser emits a pulse of light for every dot to be printed, and no pulse for every dot of empty space.

The laser doesn't actually move the beam itself. It bounces the beam off a movable mirror instead. As the mirror moves, it shines the beam through a series of lenses. This system compensates for the image distortion caused by the varying distance between the mirror and points along the drum.

Troubleshooting:
Sr. No. Problem Possible Causes Photosensitive drum is not fully discharged. Previous images used too much toner, and the supply of charged toner is either insufficient or not adequately charged to transfer to the drum. Photosensitive drum is damaged so replace it. Clean the lens assembly inside mirrors. selenium-coating on drum has light so replace it Clean the drum. Replace the drum.

Ghost images appear at regular intervals on the printed page.

2 3 4 5

Line appears in center or sides. Printing is very light.

Random black spots or dots

Page No.236

Computer Hardware & Network Professional July 2011

appear on page. 6 Blank page out or garbage printing. Every is paper jamming in printer Print again and again last printing commands. Improper driver install driver according to the operating system. Reseat the all internal connections. Check the laser assembly connections. Check the brakeage of heater sleeve. Check the paper forwarding system. Check the printing status from device and printing may be you click the printing command more times. Clear all pending commands.

10

Image Scanners
Introduction:
Scanners have become an important part of the home office over the last few years. Scanner technology is everywhere and used in many ways: Flatbed scanners, also called desktop scanners, are the most versatile and commonly used scanners. In fact, this article will focus on the technology as it relates to flatbed scanners. Sheet-fed scanners are similar to flatbed scanners but it takes paper like a printer and moves the paper on the scanning assembly. This type of scanner usually use in fax machines and photocopiers. Handheld scanners use the same basic technology as a flatbed scanner, but rely on the user to move them instead of a motorized belt. This type of scanner typically does not provide good image quality. However, it can be useful for quickly capturing text. Major Components: Parts of a typical flatbed scanner include: Charge-coupled device (CCD) array (scanning cameras) Mirrors Scan head Glass plate Lamp Lens Cover Filters Stepper motor Page No.237 Computer Hardware & Network Professional July 2011

Stabilizer bar Belt Power supply Interface port(s) (LPT, USB, Fire Wire) Control circuitry

What is Charge-coupled device? (CCD)


The core component of the scanner is the CCD array. CCD is the most common technology for image capture in scanners. CCD is a collection of tiny light-sensitive diodes, which convert photons (light) into electrons (electrical charge). These diodes are called photo-sites and each photo-site is sensitive to light -- the brighter light that hits a single photo-site, the greater the electrical charge that will build up at that site. The image of the document that you scan reaches the CCD array through a series of mirrors, filters and lenses.

Fax Machine

A Samsung fax machine

Fax (short for facsimile, from Latin fac simile, "make similar", i.e. "make a copy").Fax machine is used to send data like pictures, text, certificates over long distance trough telephone line. Usually both-ends use same machine, one side machine is transmit the data and other side is receive the data. A fax machine is combination of image scanner, printer and Modem. Image scanner scans the hard copy of document and converts it in signal. Modem converts the digital data into analog and transmits on phone line. Printer prints the data that was received by Modem. Page No.238 Computer Hardware & Network Professional July 2011

Today many offices update their communication system with internet Emails and corporate environments, standalone fax machines have been replaced by "fax servers" and other computerized systems capable of receiving and storing incoming faxes electronically, and then routing them to users on paper or via secure email. Such systems have the advantage of reducing costs by eliminating unnecessary printouts and reducing the number of inbound analog phone lines needed by an office. But still many companies relays on the Fax.

Page No.239

Computer Hardware & Network Professional July 2011

Chapter 8

INSTALLATION & CONFIGURING OF OPERATING SYSTEM Recommendations:


When you will start your work on the computer, you should check first your CD-Bag; is it ready for your work and you have all needed CD or DVD. You need some recommended Softwares for basic installation and updating of computer. Discs of Dos bootable, windows XP bootable, windows 7 Bootable, Drivers software, MS-Office, Multimedia softwares and some other utility softwares like Antivirus , windows and hard-disk repair discs are also recommended. Remember always save data if you are installing operating system on old computer specially saved on C: drive and if you need to delete or create hard disk partition you must remember to save data first.

Disk management
When we purchase a new hard-disk, it is all ready low-level formatted by company. But it is not ready for normal use; we needed first to divide it in logical portions (not physical) with portioning softwares so we can save different types of data in these partitions including operating system. The second step is high level formatting. All Windows bootable discs have facility to create partition and high level format the hard disk, so we have no need to extra utility softwares for partition.

Disk Partition
Most operating systems allow users to divide a hard disk into multiple partitions, in effect making one physical hard disk into several smaller logical hard disks. Basic purpose of this logical splitting of disk is to organize data in a manner.

File System
After making partitions of a hard-disk operating system creates a file system on the disk. A file system is a method of storing and organizing computer files and data. Essentially, it organizes these files into a database for the storage, organization, manipulation, and retrieval by the computer's operating system. File systems are used on data storage devices such as hard disks or CD-ROMs to Page No.240 Computer Hardware & Network Professional July 2011

maintain the physical location of the files. Basically windows use two types of file systems are use, FAT and NTFS. Basic work of File system:
Efficiently use the space available on your hard drive to store the necessary data. Index all the files on your hard drive so that retrieval is fast and reliable. Provide methods for performing basic file operations, such as delete, rename, copy, and move. Provide some kind of data structure that allows a computer to boot off the file system.

FAT16
The FAT16 file system was introduced way back with MSDOS in 1981. It was designed originally to handle files on a floppy drive, and has had minor modifications over the years so it can handle hard disks, and even file names longer than the original limitation of 8.3 characters. (8 characters file names dot and 3 character extensions) The biggest advantage of FAT16 is that it is compatible across a wide variety of operating systems, including Windows 95/98/Me, OS/2, Linux, and some versions of UNIX.

FAT32
The FAT32 file system, originally introduced in Windows 95 Service Pack 2, is really just an extension of the original FAT16 file system that provides for a much larger number of clusters per partition. As such, it greatly improves the overall disk utilization when compared to a FAT16 file system. However, FAT32 shares all of the other limitations of FAT16, and adds an important additional limitationmany operating systems that can recognize FAT16 will not work with FAT32most notably Windows NT.

NTFS
The NTFS file system, introduced with first version of Windows NT, is a completely different file system from FAT. It provides for greatly increased security, filebyfile compression, disk quotas, and even file encryption. It is the default file system for new installations of Windows NT and higher.

Criteria
Page No.241

NTFS

FAT32

FAT16

FAT12

Computer Hardware & Network Professional July 2011

Supporting Operating System

Windows NT Windows 2000 Windows XP Server 2003 Windows Vista Windows 7 Server2008

Windows NT Windows 2000 Windows XP supporting for Server 2003 installation Windows Vista Windows 7 Server 2008 500GB for all OS. 16TB for some OS. 16 Tera Bytes 255 yes NTFS yes

DOS v7 and higher Windows 98 Windows ME Windows 2000 Windows XP Server 2003 Windows Vista Windows 7 DOS v7 and higher Windows 98 Windows ME Windows 2000 Windows XP

DOS All versions of Microsoft Windows

DOS All versions of Microsoft Windows

DOS Windows 3

DOS

Max Partition Size Max File Size Max File Name Length Compression Criteria Encryption Page No.242

32GB for all OS. 2GB for all 2TB for OS. some OS. 4GB 255 no FAT32 no 2GB DOS - 8.3 Windows255 no FAT16 no

16MB

16MB DOS - 8.3 Windows255 no FAT12 no

Computer Hardware & Network Professional July 2011

Object Permissions Disk Quotas Built-In Security Fault Tolerance

yes yes yes

no no no

no no no

no no no

yes

Average

no

no

Windows XP Installation
When you confirmed that you computer is ready for windows installation you start your computer and hit the key (dell, F1, F2, F10) which is necessary to enter BIOS setup. From BIO you change the boot sequence and set boot as CD or DVD drive. Save and restart the system.

Step By Step Installation


Step #01 Enter
to start installation.

Page No.243

Computer Hardware & Network Professional July 2011

Step #02
Press F8 for licensing

Step #03
Press C Create Partition to

Step #04
Space allocation for portions

Step #05
Format the created portion. Page No.244 Computer Hardware & Network Professional July 2011

Step #06 Formatting is started.

Step #07
Start copy system files on the hard disk.

Step #08

Page No.245

Computer Hardware & Network Professional July 2011

Press Enter to restart the computer.

Step #09 Click next if you do not need to change US English.

Step #10 Put user information and click next.

Step #11 Enter license key and click next.

Page No.246

Computer Hardware & Network Professional July 2011

Step #12 Enter computer name and Password and click next.

Step #13 Set Date and Time and click next.

Step #14 Setup completes the remaining process.

Page No.247

Computer Hardware & Network Professional July 2011

Step #15 After installation process, Windows showing Startup screen.

Step #16 Welcome screen click next.

Step #17 This time not essential to update windows from

Page No.248

Computer Hardware & Network Professional July 2011

internet. So select Not right now and click next.

Step #18 This window allows you to create five user login. Enter user name and click next.

Step #19 Thanks for installation. Click next.

Step #20 Welcome to windows Desktop.

Page No.249

Computer Hardware & Network Professional July 2011

Technical Information about Windows 7


Windows 7 is the latest release of Microsoft Windows, a series of operating systems produced by Microsoft for use on personal computers, including home and business desktops; laptops, tablet PCs, and media center PCs. Its hardware requirement for installation and running smoothly is very high as comparatively previous Microsoft operating systems. Basically this operating is system designs for core processors. It need near about 1GB of RAM and 20GB hard disk space for smooth running. DVD ROM Drive is essential because the copy of uninstall windows 7 is available only on DVD Disc. When we take about its file structures it is totally different from windows XP. But windows7 fully supported files, which are created in windows XP environment. Windows 7 and Vista have new file system for partitioning and formatting. These reason windows XP could not support partition and disk formatting; created by windows vista and windows 7 partition managers.

Step by step installation of windows 7

Page No.250

Computer Hardware & Network Professional July 2011

Step #01 The first step of windows 7 installation is set boot sequence form BIOS setup to start computer from DVD Rom Drive. When you start computer from DVD you see this window.

Step #02 After start the installation process you will see this window for select US English language and keyboard. After selection click next:

Page No.251

Computer Hardware & Network Professional July 2011

Step #03
Click Install now for next step. You can also find; windows repair option and installation help to take information about installation.

Step #04
Accept windows7 license agreement to click check Box.

Step #05 Upgrade allows you to replace the previous version of windows with windows 7. Custom allow you to install new copy of windows.

Page No.252

Computer Hardware & Network Professional July 2011

Step #06 This windows show you partition manager of windows 7. You can create delete and format the hard disk partitions.

Step #07 This windows show you all installation steps written on it.

Step #08 Click Restart now for restart the computer to start next process.

Page No.253

Computer Hardware & Network Professional July 2011

Step #09 You can see new flash screen of window7 after restating.

Step #10 Setup is continue

Step #11 Setup is preparing to run windows 7.

Page No.254

Computer Hardware & Network Professional July 2011

Step #12 Enter the User Name and Computer Name.

Step #13 Type the same password in first two boxes. Third text box is for hint password that is use when you will forget your password.

Step #14 Enter the windows 7 license key of

Page No.255

Computer Hardware & Network Professional July 2011

Step #15 Click Use settings recommended the

For automatic update windows 7 from internet.

Step #16 Set Date, Time and time zone of Pakistan.

Step #17 Complete process the installation

Page No.256

Computer Hardware & Network Professional July 2011

Step #18 A beautiful desktop will appear after complete installation.

Step #19 Desktop with Basic Icons Right click on desktop click on personalize then you will see windows with display properties: click on change desktop Icons in left pan. Select icon which you want on the desktop.

Page No.257

Computer Hardware & Network Professional July 2011

DEVICE MANAGER ABCs


Device manager first introduced in Microsoft Windows 95. Microsoft Windows device manager is a program that allows users to view hardware devices detected in Windows and manage those hardware devices easily. Now device manager is

available in all new Windows 95.

DEVICE MANAGER ERRORS


Within device manager the user can locate three types of problems an exclamation mark, a red X, or another device. Exclamation Mark - When a device has an explanation mark this is an indication that the device is conflicting with another hardware device by windows sources. (IRQ, IO address, DMA or memory address) Red X - Indication that the device has been disabled, removed or that Windows is unable to locate the device. Other Devices - Windows was unable to locate the drivers for the device and cannot determine the type of device being installed.

Device Driver
Page No.258 Computer Hardware & Network Professional July 2011

Device drivers are small files that act like connection between hardwares and operating system (OS). Operating system required device drivers so that it can see the devices and handle them effectively and efficiently. User interacts and order through the operating system and operating system delivered through device driver to the hardwares. This means every hardware needs software to take orders from operating system. Most device drivers are already included in windows library for general and specific hardwares. But some need to be installing. Device drivers prepared by hardware manufacture and free deliver with their hardwares so they can work with different operating systems. Remember every version of windows and other operating systems needed specific device driver; provided by company in CDs or DVDs. But the major source of device drivers is internet.

Step by Step Driver Installation


Step #01 For installation of device driver take my computer Properties.

Note. Before installation of driver for hardware you should confirmed that
your driver software is compatible with your windows version. Like driver for windows XP or windows 7. You also do not forget the type of device and manufacturer like Intel display 815E.

Page No.259

Computer Hardware & Network Professional July 2011

Step #02 From my computer properties click Device Manager to open.

Step #03
After installation; if you find In Device manager, yellow marked devices. Its mean drivers of these devices are not installed. Just like this picture you can see that the audio device is yellow marked. So right click on audio device and then click on update driver software from appeared menu.

Page No.260

Computer Hardware & Network Professional July 2011

Step #04 Click on Brows my computer.

Step #05 From next window click on brows button to give the path of audio driver folder and click ok

Page No.261

Computer Hardware & Network Professional July 2011

Step #06 If your path and drive is matched with hardware that you want to install, this window will appear.

Step #07 After successfully installing driver it will show the proper name of device.

Page No.262

Computer Hardware & Network Professional July 2011

Chapter 9

LAPTOP AND PDA DEVICES


Portable Computing Devices All portable devices share certain features. For output, they have LCD screens, although these vary from 17-inch to 2-inch screens. Portable devices employ sound of varying quality, from simple beeps for nice music reproductions. All of them run on DC electricity stored in batteries, although several different technologies offer a range of battery life, life span, and cost. Other than screen, sound, and battery, portable computing devices come in an amazing variety of shapes, size, and intended uses.

Personal Data Assistant (PDA)


PDA Short for personal digital assistant, (also called palm top) a handheld device that combines computing, telephone, Internet and networking features. Today's PDAs allow you to organize your schedule, take notes, do math calculations, play games, write memos, and even surf the Internet and send e-mail. Unlike portable computers, most PDAs began as pen-based, using a stylus (small stick) rather than a keyboard for input. This means that they also incorporated handwriting recognition features. Some PDAs can also react to voice input by using voice recognition technologies. The first PDA, called the Newton, was created by Apple in 1993. Since then, numerous other companies have jumped on the bandwagon and have added many new designs and options to the PDA market. The Palm Pilot, Handspring Visor, HP Jordana, Compaq Aero, Sharp Mobilon, and Sony Cli are all common PDAs.Today, one of the most popular brands of PDAs is the series of Palm Pilots from Palm, Inc. (See picture 9.1) PDA Memory Almost every PDA has both internal flash ROM memory of I MB or more, and some sort of removable and upgradeable storage medium. Compact flash (CF) technology has the strongest market share among the many competing standards, but youll find a bunch of different memory card types out there. CF card are about an inch and a half square and fit in a special CF slot. Other popular media Page No.263 Computer Hardware & Network Professional July 2011

include the much smaller secure Digital (SD) cards and Sonys proprietary Memory Stick. Youll find capacities for all standards ranging from 8 MB up to 512 MB. Operating System Many operating systems use with PDA Devices like Windows CE (Compact Embedded), palm operating system, Linux, MAC, and Black Barry operating system. These operating systems embedded or installed by manufactured companies. But you have facility to update install, uninstall compatible softwares. You can also restore it on company default setting.

Laptop Computer
A laptop computer also called notebook computer. It takes AC current 220V from wall outlet and its adaptor supply converts it in DC 12 to 18 volts. This DC current is used to charging battery as well as run the computer. After power failure it uses current from battery. The personal computer generally smaller than a briefcase that can easily be transported and conveniently used in temporary spaces such as on airplanes, in libraries, temporary offices, and at meetings. A laptop typically weighs less than 5 pounds and is 3 inches or less in thickness. Among the best-known makers of laptop computers are IBM, Apple, Compaq, Dell, and Toshiba. (See Picture 9.2) Laptop computers generally cost more than desktop computers with the same capabilities because they are more difficult to design and manufacture. Laptops usually come with displays that use thin-screen technology. The thin film transistor or active matrix screen is brighter and views better at different angles than CRT screen. Laptops use several different type of integrated mouse, keyboard, including the touch pad, the trackball, and the pointing stick. A serial port also allows a regular mouse to be attached. Todays laptops have two to six USB ports to connect different external devices with the laptops. Every laptop has also a VGA or DVI port to connect external display like LCD, Monitor or Digital projector.

Pointing Devices
Today's portable computers come with built-in pointing devices. Pointing devices work like a desktop computers mouse. Most of these pointing devices are one of three types: trackball, track point, or track pad.

Page No.264

Computer Hardware & Network Professional July 2011

Track-ball. This small ball (approximately .5 inch in diameter) is partially embedded in the keyboard below the spacebar. The user's fingers manipulate the ball. These devices are accurate and serviceable, but they are unpopular because of their tendency to gather dirt and dust, which dramatically reduces performance. Track-point. IBM developed the track-point, which many manufacturers install in their systems. It is a small, rubberized button (approximately .25 inch in diameter) located above B and below G and H on the keyboard. The user nudges it in any direction (rather like a tiny version of a joystick) to move the cursor around the screen. It is convenient because the user's hands don't need to leave the keyboard to manipulate the track-point. Track-pad. The track-pad (also known as the touchpad) is the most recent development of the three. It is an electromagnetically sensitive pad measuring about 1 inch 2 inches located in the keyboard below the spacebar. It responds to the movement of a finger across its surface to move the cursor. Tapping the pad simulates mouse clicks (although buttons are also provided). It is a truly innovative device, but does tend to be overly sensitive to accidental touches and taps. It is also sensitive to humidity, so moist fingers can cause unpredictable performance. PC Cards (PCMCIA CARD) Personal Computer Memory Card International Association (PCMCIA) is a non-profit partnership of over 500 companies, founded in 1989. Their aim has been to set an international standard for Laptop cards. PC cards were originally used to add memory to notebook computers, but are now used in many other devices. PCMCIA cards are the size of a credit card. There are basically three different types of PCMCIA cards. They are all the same rectangular size, but they differ in width. If you look at the side of your Laptop, you should see slots that PCMCIA cards fit into. There are three types of card available. The type I card is used for adding extra memory, ROM or RAM to your PC. The Type II card adds fax modem and LAN Card. The type III card, use for Hard disk and CD ROMs RAM SO DIMM (Small Outline DIMM), is use in most Laptops which is a smaller version of the DIMM modules that are used in desktops. What Page No.265 Computer Hardware & Network Professional July 2011

differentiates the notebook RAM from desktop RAM is its form factor; that is, its physical size and its pin configuration. A full-size DIMM has 100, 168, 184, or 240 pins and is usually 4.5 to five inches in length. In contrast, a SO DIMM has 72, 100, 144, or 200 pins and is smaller 2.5 to 3 inches. There is also SO RIMM, which is similar to SO DIMM, but like DIMM/RIMM, it uses Rambus, Inc. technology and also has a different pin count. Configuration 1997 (SDRAM) PC66 SDRAM 66MHz 1999 (RDRAM) RDRAM 800MHz 2000 (DDR-SDRAM) DDR SDRAM 266MHz 2004 (DDR2-SDRAM) DDR2 SDRAM 533MHz 2007 (DDR3-SDRAM) DDR3 SDRAM 1066 - 1333MHz How to Add/Replace RAM Upgrading the RAM in a portable PC requires a couple of steps. You need to get the correct RAM. Many portables PC makers use proprietary RAM solutions, which mean you need to order directly from Dell, HP, or Sony and pay exorbitant prices for the precious extra megabytes. Here are some simple steps for installing ram in a laptop computer. (See Pictures 9.3) 1. Turn off the computer and remove all power cords from the computer system. 2. Locate the panel used for access to the memory modules. This is generally located on the bottom of the laptop computer. Refer to your laptop instruction manuals for locating 3. the panel. 4. Remove any screws that the panel in place and place somewhere safe to prevent losing it. 5. Remove the panel from the laptop and set aside. 6. If replacing or upgrading an existing memory module, remove the memory modules by undoing and module clamps and gently lifting the edge of the module to a 45degree angle and then pulling the module out of the slot.
7.

Align the notch of the memory module with that of the memory slot and gently insert the module into the slot at a 45-degree

Page No.266

Computer Hardware & Network Professional July 2011

angle.
8.

Once all the pins are in the slot, gently rotate the module down flat until the clamps lock into the module into place. Replace the computer. place. memory access panel onto the laptop

9.

10. Replace

any screws or fasteners that hold the panel in

11. Replace the power cord and power up your computer system. Once the memory has been installed into the computer, the physical process is complete. When the computer is powered back up, it may be necessary to go into the computer BIOS to let the system properly detect the new RAM that has been installed in the computer. Please refer to the user manual for the computer system for any additional information. Hard Drives ATA drives in the 2.5 inch drive format now rule in all laptops. Although much smaller than regular ATA drives, they still use all features and configurations. These smaller hard drives have suffered, however, from diminished storage capacity compared to their 3.5-inch brothers. Currently, large 2.5 inch hard drives hold less than 80 GB, while the 3.5 inch hard drives can hold more than 200 GB of data. Some manufacturers may require you to set the drive to use a cable select setting as opposed to master or slave, so check with the laptop maker for any special issues. Otherwise, no different exists between 2.5 inch drives and their larger 3.5inch brethren. (See Pictures 9.4) Optical Drives In order to add functionality to laptops, manufacturers have started to include modular drives with their machines. CD-ROMs, DVD-ROMs, CD-RWs and floppy disk drives are the most common modular drives that are portables, although combination CD-RW/DVD-ROM drives that are included many higher end laptops. The beauty of modular drives is that you can swap easily back and Page No.267 Computer Hardware & Network Professional July 2011

forth between different types of drives. Need that floppy disk drive? Just pull out the CD or DVD media drive and stick in the floppy disk drive. Need more storage space: pull out floppy disk drive and put another hard drive. Many laptops enable you to replace a drive with a second battery, which obviously can extend the time you can go before you have to plug the laptop in to AC outlet. I have laptop that allows me to swap out my CD-ROM drive for floppy disk drive. If I dont need either drive, I just take out the drive thats currently installed and put a blank faceplate into the empty slot-this is great to do when Im traveling and I know that I wont be needing the CD-ROM. Video Cards Video card makers have rushed to join the modular laptop components arena. Although no signal standard works in all systems, a quick phone call to tech support department of the laptop maker often reveals upgrade options. Modular video cards are the least standardized of all modular components, but as manufacturers adopt more industry-wide standards, well be able to replace video cards in laptops more readily. Batteries Manufacturers use three different types of batteries for portable PCs and each battery type has its own special needs and quirks. Once youve got a clear understanding of the quirks, you can usually spot and fix battery problems. The three types of batteries commonly used in mobile PCs are NickelCadmium(Ni-Cd) Nickel metal Hydride and Lithium-Ion batteries. Manufacturers have also started working with fuel cell batteries, although most of that work is experimental at this writing. Nickel- Cadmium The nickel-cadmium battery (commonly abbreviated NiCd or NiCad) is a type of rechargeable battery using nickel oxide hydroxide Page No.268 Computer Hardware & Network Professional July 2011

and metallic cadmium as electrodes. Sealed NiCd cells may be used individually, or assembled into battery packs containing two or more cells. These batteries made with NiCd cells use in portable devices like laptops. NiCd batteries can be recharged 1,500 times or more, which combined with their high current output, makes them ideal for portable two-way radios or other applications in which high demands are made for short periods of time. NiCd cells are rated at a nominal 1.2V per cell, and in laptop systems were normally combined in packs with 6 or 7 cells combined to produce 8.4V to 9.6V. Despite their durability, their lower energy density (resulting in lower battery runtimes) has caused them to fall out of favor in laptop and portable computers, which is reason no new systems use NiCd batteries today.

Nickel-Metal Hydride A nickel-metal hydride cell, abbreviated NiMH, is a type of rechargeable battery similar to the nickel-cadmium cell. The NiMH battery uses a hydrogen-absorbing alloy for the negative electrode instead of cadmium. As in NiCd cells, the positive electrode is nickel oxyhydroxide (NiOOH). A NiMH battery can have two to three times the capacity of an equivalent size nickelcadmium battery. Ni-MH batteries were the next generation of mobile batteries and are still quite common today. Basically, NiMH batteries are Ni-CD batteries. Ni-MH batteries are much less susceptible to memory problems, can better tolerate over charging, can take more recharging and last longer between recharging. Like Ni-Cds, Ni-MH batteries are still susceptible to heat. Lithium Ion A lithium-ion battery (sometimes Liion battery or LIB) is a family of rechargeable battery types. Chemistry, performance, cost, and safety characteristics vary across LIB types. They are one of the most popular types of rechargeable battery for portable electronics, with one of the best energy densities, no memory effect, and a slow loss of charge when not in Page No.269 Computer Hardware & Network Professional July 2011

use. Lithium-ion batteries in laptop systems are really battery packs normally constructed of several individual cells. Each cell puts out between 2.5V (discharged) to 4.2V (fully charged) and is normally rated about 3.6V nominal. The cells are combined in battery packs of normally between 2 to 12 cells, arranged in serial and parallel connections resulting in 7.2V, 10.8V, or 14.4V (nominal) voltage ratings. Power Management Many different parts are included in the typical laptop, and each part uses power. The problem with early laptops was that every one of these parts used power continuously, whether or not the system needs that device at that time. for example , the hard drive would continue to spin whether or not it was being accessed, and the LCD panel would continue to display, even whether user walked away from the machine. The optimal situation would be a system where the user could instruct the PC to shut down unused devices selectively, preferably by defining a maximum period of interactivity which, when reached, would trigger the PC to shut down the inactive device. Longer periods of inactivity would eventually enable the entire system to shut itself down, leaving critical information loaded in RAM ready to restart. The system would have to be sensitive to potential hazard, such as shutting down in the middle of writing to a drive and so on. Also this feature could not add significantly to the cost of the PC. Clearly a machine that could perform these functions would need specialized hardware, BIOS and to operating system to operate properly. (See Pictures 9.5) Requirements for APM/ACPI APM and ACPI require a number of items in order to function fully. First is an SMM capable CPU. As virtually all CPUs are SMM capable this is easy. Second is an APM compliant BIOS which enables the CPU to Shut off the peripherals when desired. The third requirement is devices that will accept being shut off. These devices are usually called energy star devices which signal their compliance with the EPAs energy star standard. To be an energy star device a peripherals must have the capability to shut down without actually turning off and show that they use much less power than the non-energy star equivalent. Last, the systems OS must know how to request that a particular device be shut down and APM standard by supplying support for hot swappable devices always Page No.270 Computer Hardware & Network Professional July 2011

a huge problem with APM. This feature aside, it is a challenge to tell the difference between an APM system and an ACPI system at first glance. APM/ACPI Levels APM defines four different power-usage operating levels for a system. These levels are intentionally fuzzy to give manufacturers considerable leeway in their use: the only real difference among them is the amount of time each takes to return to normal usage. These levels are as follows: Full On Everything in the system is running at full power theres no power management. APM Enabled CPU and RAM are running at full power. Power management is enabled. An unused device may or may not be shut down. APM Standby CPU is stopped. RAM still stores all programs. All peripherals are shut down, although configuration options are still stored. APM Suspend Everything in the PC is shut down or its lowest power consumption setting. Many system use a special type of suspend called hibernation, where critical configuration information is written to the hard drive. Upon a wake up event the system is reinitialized and the data is read from the drive to return the system to the APM enabled mode. Cleaning Most portable PCs take substantially more abuse than a corresponding desktop model. Constant handling travel air port food on the run and so on can radically shorten life of a portable if you dont take action. One of the most important things you should do is clean the laptop regularly. Use appropriate screens cleaner to remove fingerprints and dust from the fragile LCD panel. Compressed air works great for blowing out the dust and crumbs from the keyboards, and for air keeping PC Card sockets clear. Dont use water on your keyboard! Even a minor amount of inside the portable can toast a component.

Centrino Technology
On March 12, 2003 Intel formally released a new line of products Centrino Laptop technology. Three updates in this technology are CPU, motherboard chipset and wireless connectivity. Centrino = Pentium-M + Intel 855 chipset + Intel wireless 802.11b Page No.271 Computer Hardware & Network Professional July 2011

Better Performance. Intel claims that Centrino mobile technology-based systems can deliver up to five hours of battery life or more, compared to about four hours on mobile Intel Pentium III processor-M-based system and about 3 hours on mobile Intel Pentium 4 processor-M-based systems. Intel Centrino mobile technology offers 15 percent faster performance on multitasking office productivity applications compared to the mobile Intel Pentium 4 processor-M 2.4 GHz system. Intel Centrino mobile technology based-systems will find a 13 percent improvement gain in their Internet experience when compared to the mobile Intel Pentium 4 processor-M 2.4GHz.

Page No.272

Computer Hardware & Network Professional July 2011

Chapter 10 MAINTENANCE, TROUBLESHOOTING & LAB MANAGEMENT Good PC maintenance involves a number of different jobs, from keeping your keyboard and mouse clean, to cleaning up your hard drive by removing temporary files. The frequency of the maintenance will depend on how often the computer is used. Basic maintenance, such as wiping over the keyboard and the screen should be done as often as possible, at least once a week for computers that are used daily.

Tips to Keeps Computer Running Smoothly


1. Never, never, turn your computer off with the power switch directly, until Windows has shut down. Deny this rule only when you have no way to OFF your computer. If your computer hangs up because of software or hardware problem, you must try first Ctrl + Alt + Delete keys pressing at time from keyboard. This function calls task manager utility to close open programs. If its not work press these key one or two time for rebooting computer softwarely. It you do not do this; it may be your data or hard disk destroyed. 2. Never unplug peripherals from the computer when it is powered up. Unplugging with the power on can short out the connector socket or the motherboard. The only exception to this rule is if you know a peripheral is "hot pluggable". If you do not know what "hot pluggable" means then ignore this exception. 3. It is highly recommend that you UPS (uninterruptable power supply) for your computer. This will keep your computer from crashing during power outages, and will protect your computer from low and high voltage occurrences. An UPS is far superior to a surge protector and will save your computer from almost any type of power disaster. 4. Backup, backup, backup, any data you cannot afford to lose to at least two separate physical drives. Data and softwares are more valuable than a computer machine, so backup data to external hard drives, Flash drive, CD-RWs etc. Page No.273 Computer Hardware & Network Professional July 2011

5. Run Scandisk and Defragment at least once a month. This will keep your hard drive healthy and prevent crashes. Alternatively, c cleaner or advance system care Utilities and use it to keep your hard drive healthy. 6. Do keep at least 300 MBs to 500 MBs of your C: drive free for Windows to use. If you use Windows XP or windows7 then you should have 400-600 MBs of free space on your C: drive. For this you can uninstall some softwares, empty your my documents and recycle Bin. 7. Do not lot of install and uninstall softwares. You should install only those softwares which you are needed. Uninstalling rapidly is not good for your windows directory and registry. 8. Do not let a lot of programs load up when you start your computer. When windows is starting: that time it executing many files to starting desktop. So if extra software also run with them, the windows starting goes slow. So uncheck option of software to Run windows startup. You can also type on Run msconfig to cleaned windows system tray. 8. Do use a virus checker regularly. Every good antivirus has schedule to scan the windows. So do not disable it. Update your antivirus always if your antivirus has not facility to update automatically.

Windows Maintenance Tools Scan Disk


Scan Disk is one of the most common maintenance tools bundled with an operating system such as Windows. This is an application that is used in checking the hard drive of your computer for errors and bad sectors. Once Scan Disk finds an error in the hard drive, it will attempt to fix it. The errors found inside a hard drive are caused by a number of reasons. These include: Frequent system crashes. Critical system applications that have been improperly closed. Existence of harmful programs such as viruses, spywares etc. Page No.274 Computer Hardware & Network Professional July 2011

Defragmentation
Fragmentation happens to a hard disk over time as you save, change, or delete files. The changes that you save to a file are often stored at a location on the hard disk that's different from the original file. Additional changes are saved to even more locations. Over time, both the file and the hard disk itself become fragmented, and your computer slows down as it has to look in many different places to open a file. Disk Defragmenter is a tool that rearranges the data on your hard disk and reunites fragmented files so your computer can run more efficiently with better speed. Windows Registry The Windows Registry is a database that stores configuration settings and options on Microsoft Windows operating systems. It contains settings for low-level operating system components as well as the applications running on the platform: the kernel, device drivers, services, SAM, user interface and third party applications all make use of the Registry. For view this you need to run registry editor. Regedit type in run.

Computer Virus
Computer viruses are programs written by "mean" people. These virus programs are placed into a commonly used program so that program will run the attached virus program as it boots, therefore, virus "infects" the executable file or program. A virus is inactive until you execute an infected program or application OR start your computer from a disk that has infected system files. Once a virus is active, it loads into your computer's memory and may save itself to your hard drive or copies itself to applications or system files on disks you use. Virus recognize the file type form its files extension like .exe, .ini, .sys. com, .zip, .jpg etc. Some viruses are programmed specifically to damage the data on your computer by corrupting programs, deleting files, or even erasing your entire hard drive. Many viruses do nothing more than display a message or make sounds / verbal comments. Computer virus spreads through internet or exchanging data by disks. Todays flash drive is a most involved to spreading virus.

Symptoms of a computer virus


The computer runs slower than usual. Page No.275 Computer Hardware & Network Professional July 2011

The computer stops responding, or it locks up frequently. The computer crashes, and then it restarts every few minutes. The computer restarts on its own. Applications on the computer do not work correctly. Disks or disk drives open slowly. You see unusual error messages. Duplicate the program files. Hide some or all data from disk. Some options and menu not work or hide. An antivirus program is disabled for no reason. Additionally, the antivirus program cannot be restarted. An antivirus program cannot be installed on the computer, or the antivirus program will not run.

Solutions

If possible the scan hard disk to attach separately with the computer that have running antivirus program updated. Install a good antivirus or update installed antivirus program. Viruses are often transmitted by USB flash drive. When you use flash drive you must scan it with antivirus. If your problem is not solved then you can format your c: drive and reinstall windows and antivirus without opening other drive. If you remain facing problem then you will again partitioned your hard drive.

Preventive Maintenance Schedule


There are no universal preventive maintenance schedules that work on every computer. Each schedule must be individualized to meet the needs of the work environment. Use the following suggestions as maintenance guidelines:

Do This Daily

Check computer ventilation to ensure that it is clear. Remove any paper, books, or boxes that might impede the flow of air into or out of the computer. Clean the external Hardwars on daily base like keyboard, mouse, monitor/LCD, system unit, and printer.
Computer Hardware & Network Professional July 2011

Page No.276

Back up data.

Do This Weekly

Clean the outside of the case. Clean the screen. Run CHKDSK or Scandisk on all hard disk drives. Windows XP and windows7 come with scheduling programs to help you accomplish this on a regular basis. Run a current antivirus program and check all drives. These programs also come with scheduling features so this can be accomplished on a regular basis. They will also remind you when to update the virus list (usually done through the manufacturer's Web site). Inspect all peripheral devices.

Do This Monthly

Clean the inside of the system. Clean the inside of any printers. Vacuum the keyboard. Clean the mouse ball and x and y wheels. Defragment all hard disk drives. Delete any unnecessary temporary files.

Do This Every Six Months


Perform an extensive preventive maintenance check. Apply an antistatic solution to the entire computer. Check and reseat all cables. Run the printer's self-test programs.

Do This Annually

Reformat the hard disk drive and reinstall all software. Don't forget to back up data first. Check the performance of CD Disc.
Computer Hardware & Network Professional July 2011

Page No.277

Consider an upgrade to your computer. Check to see that your components can handle your workload.

Troubleshooting fundamentals
Unit objectives Identify the available troubleshooting tools Isolate problems and design a course of action Troubleshoot problems that happen after a successful boot and add-on device problems Develop a preventive maintenance plan Protect yourself, the hardware, and the software Best protections against ESD

A ground bracelet

A ground mat

Page No.278

Computer Hardware & Network Professional July 2011

Management of Computer Lab


When Computer Lab is set up, many things are considered for its setup so that the computer user may work easily and effectively and the computers may also work in recommended situation. The things which are considered in the set up of computer lab are as under.

The Number of Computers


First of all, it is necessary to know how many computers will be installed in the computer lab and what will be their accessories? So that, we have may prepare computer tables accordingly.

Sitting Arrangement
A Computer table must have such a space so that the computers as well as its accessories may be placed easily. The design of the computer table would be such as the system unit may be placed in the airy space it can be opened and closed very easily and it should be of appropriate size. The chair should be revolving so that the user may move easily. Furniture of the lab should be short so that atmosphere of the lab should look spacious and airy.

Right Sitting Style


Page No.279 Computer Hardware & Network Professional July 2011

Area of the lab is always according to the number of PCs so that the temperature may be maintained. If lab is small the number of PCs is more, the temperature of lab will shoot up. The recommended area for single user is 4 X 4 fit. Lab shell be carpeted and furnished cur tans. There should be proper light system embellished with energy savers and tube lights. Bulbs and ammonia lights should not be used for they consume more energy and create heat in the labs.

Lab Temperature
It is very important for the set up of computer lab, so that the user and computer may work more effectively and efficiently. According to our atmospheres, the temperature should be 30C to 35 C. Many areas of Pakistan is to hot and it is very harmful for the computer. Computer runs smoothly in 30c to 35c but our outdoor environment in summer reached at 45c to 50c. It can destroy our computer and this reason our computers are not work long life. So it is recommend to install Air-condition in computer labs according to your space and number of computers. Beside this; the lab should be completely dust-

proof. Smoking should be strictly tabooed in computer lab.

Power Management
A Computer consumes energy according to its type. If it is Pentium I, it consumes more energy than Pentium II and so on. Because the rate of power consumption is different in all these PCs Power Supply from Factor 1. 2. 3. 4. AT Power Supply ATX Power Supply Micro-ATX Power Supply BTX Power Supply 200W to 250 W 235 W 235W to 250W 300W to 350W

Different types of monitors consume energy with different ratio. Page No.280 Computer Hardware & Network Professional July 2011

14`` 17`` 19`` LCD 17``

1.3 A to 1.5 A 2.5A to 2.7A 3.2A to 3.8 A 1.5A to 1.7A

If there are fax machine, printer, photo state machine or any other device attached their load will be considered besides PC and monitor.

Uninterruptable Power Supply (UPS)


A power supply that includes a battery to maintain power in the event of power failure. Typically, a UPS keeps a computer running for several minutes or few hours after a power OFF. UPS acts as both surge suppresser and power leveler. Many UPSs now offer a software component that enables you to automate backup and shut down procedures in case there's a power failure while you're away from the computer.

Wiring
The wiring of computer lab is done under ground with PVC pipe and never opens. Because there is no danger effects of atmosphere and magnet flux on other electrical appliances. The details of compute is already discussed above, so that the wired used in the preparation of lab should be quite according to the requirement. The category of wire is given below. Wire Size 3/0.029`` 3/0.036`` 7/0.029`` 7/0.036`` Ampere =11A =13A =20A =28A

7/0.044``

=36A

Electric Safety
Page No.281 Computer Hardware & Network Professional July 2011

In the preparation of new lab, safety measures should kept in mind. The following points are necessary for this purpose. 1. Short Circuit Breaker 3. Main Switch 2.Ground 4.Power Plug

Short Circuit Breaker


Its use is inevitable in the wiring of computer lab. In this way, there should not be the danger of fire in case of short circuit either in wiring or in any device. Short circuit breakers are available in the market in different amperes. This is used in the series of wiring according to the lab load.

Power Plug
Power plug is used always in place of socket because heavy copper material is used in power plug rather than in a more socket. So a power plug has more capacity to endure more energy that a socket and it is also durable. Its grip is better and it has also an earth terminal and there is no danger of sparking.

Ground
Computer lab is properly grounded for connecting every plug with ground wire. In this way every plug every PC is jointed with ground wire. Ground is prepared according to the lab load.

Main Switch
It is used in the input of wiring. It should be off while closing the lab. It also works when it is necessary to change the power plug or wire. So that, there should not be danger of an electric shock.

Fuse
Fuse is also used with circuit breaker in the switch board during wiring, which gives double protection in case of high voltage or short-circuits for the safety of PCs as well as other devices. When there is short circuit in the lab, total Ampere in crease, when they pass thought the fuse, the electrode of the fuse melts and eclectic supply stops. Therefore, the PCs and other devices remain safe from any danger. Electrode in a fuse is used according to the load of the lab. If load is 10A, the electrode will be of 13A because a computer takes much load at the time of commencement (start).

Page No.282

Computer Hardware & Network Professional July 2011

Chapter 11

NETWORK CONFIGURATIONS
Networks A network is defined as two or more computers linked together for the purpose of communicating and sharing information and other resources. Most networks are constructed around a cable connection that links the computers. This connection permits the computers to talk (and listen) through a wire. Networking Next we look at how the basic elements of connections, communications, and services work together to make networks function properly: The connections must operate so that any computer can send or receive electrical signals (data) across the physical media that link them. Communications must function so that when one computer sends a message, the receiving computer can listen and understand the message. Computers on a network must either provide a service to other computers or make use of a service provided by other computers. Communications Communications establish the rules concerning how computers talk and understand each other. Because computers often run different software, in order to communicate with each other they must speak a "shared language." Without shared communications, computers cannot exchange information. Connections Connections include the hardware (physical components) required to hook up a computer to the network. Two terms are important to network connections: The network medium: The network hardware that physically connects one computer to another. This is the cable between the computers. The network interface: The hardware that attaches a computer to the network medium and acts as an interpreter between the computer and the network. Attaching a computer to a network requires an add-in board known as a network interface card (NIC). Page No.283 Computer Hardware & Network Professional July 2011

Terminology Device Network Host Guest Server Client/workstation Workgroup Domain Gateway Synchronization Data Bandwidth Network Traffic Peripherals Protocol Softwares

Description Any type of electrical or electronic Machine. Two or more Devices that are linked together for the purpose of sharing resources. Main machine or Computer that shares their resource. A machine or Computer that receive resource. A computer that control the shared resources on the network. A computer that run under the server computer. All computers on the network, that have equal rights. All computers on the network work under the master computer. A machine or computer that connects the local computers to the other network, like internet. Link between two Devices before data transferring. Shared or save files. Quantity of data that transferring per second. Data being transfer by the medium. Devices that are used to make a network. Softwares that are used to share files, application and make user policies.

Page No.284

Computer Hardware & Network Professional July 2011

Types of Networks
Local Area Networks
A LAN (local area network) is a network that covers a limited distance and allows sharing of information and resources. A LAN can be as simple as two connected computers, or as complicated as a large site. This type of network is very popular because it allows individual computers to provide processing power and utilize their own memory, while programs and data can be stored on any computer in the network. The primary benefit of a LAN is its ability to share. The following table lists some of the benefits of sharing the most common resources on a LAN. In addition to the ability to share resources, LANs offer many other benefits that include: Data backup: Regular backups of the entire system greatly reduce the risk of data loss. Copying data to backup servers allows network operations to continue in the event of primary server failure. Communication gateways: Low-cost access to fax and Internet connections. Electronic mail: Cost-effective and convenient communication throughout the network.

Wide Area Networks


A wide area network (WAN) spans relatively large geographical areas. Connections for these sites require the use of ordinary telephone lines, DSL (Digital Subscriber Line) lines, radio waves, or satellite links. WANs can be accessed through dial-up connections, using a modem, or leased line direct connection. The leased-line method is more expensive but can be cost-effective for transmission of large volumes of data.

Internet
It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by electronic signals and optical networking technologies. The Internet carries a vast range of information resources and services.

Intranet
Page No.285 Computer Hardware & Network Professional July 2011

An intranet is a private network that is contained within an Organization. It may consist of many interlinked local area networks and also use leased lines in the wide area network. Typically, an intranet includes connections through one or more gateway computers to the outside Internet. The main purpose of an intranet is to share company information and computing resources among employees. An intranet can also be used to facilitate working in groups and for teleconferences. Example NADRA network.

Extranet
An extranet is a computer network that allows controlled, access from the outside, inside for specific business or educational purposes. An extranet can be viewed as an extension of a company's intranet that is extended to users outside the company, usually partners, vendors, and suppliers. Example Banks ATM of web account, mobile banking, and Virtual university students web sharing.

Types of local Area Networks


There are essentially two types of networks. They differ in how information is stored, how security is handled, and how the computers on the network interact. In a peer-to-peer/Workgroup network, each computer acts as either a server (sharing its data or services with other computers), or a client (using data or services on another computer) depending on the user's needs. Each user, or workstation, establishes its own security and determines which resources are available to other users. Typically these networks are limited in size (15 to 20 workstations). Windows XP, Windows VISTA Windows 7 and Linux are some software packages available for peer-to-peer networking. A server type network requires a central server (dedicated computer) to manage access to all shared files and peripherals. This is a secure environment suitable for most organizations. In this case, the server is a computer that runs the network operating system, manages security, and administers access to resources. The client is a computer that connects to the network and uses the available resources. The most common server operating systems are Microsoft's Windows 2000 Server and windows 2003 server.

Page No.286

Computer Hardware & Network Professional July 2011

Network Topology
LAN design is called topology. Topology describes the appearance or layout of a network and how data flows through the network. There are three basic types of topologies: star, bus, and ring. Bus Topology In a bus network, all devices are connected to a single line cable. Both ends of the cable must be terminated to stop the signal from bouncing. Because a bus network does not have a central point, it is more difficult to troubleshoot than a star network. A break or problem at any point along the bus can cause the entire

network to go down. Star Topology In a star network, all devices are connected to a central point called a hub. These hubs collect and distribute the flow of data within the network. Signals from the sending computer go to the hub and are then transmitted to all computers on the network. Large networks can feature several hubs. A star network is easy to troubleshoot because all information goes through the hub, making it easier to isolate problems. Ring Topology In a ring network, all workstations and servers are connected in a closed loop. There are no terminating ends; therefore, if one computer fails, the entire network will go down. Each computer in the network acts like a repeater and boosts the signal before sending it to the next station. This type of network transmits data by passing a "token" around the network. If the token is free of data, a computer waiting to send data grabs it, attaches the data and the electronic address to the token, and sends it on its way. When the token reaches its destination computer, the data is removed and the token sent on. Page No.287 Computer Hardware & Network Professional July 2011

Network Interface Cards


Network interface cards (NICs) link a computer to the network cable system. They provide the physical connection between the computer's expansion bus and the network cabling. The low-powered digital signals that transmit data inside a computer are not powerful enough to travel long distances. A network interface card boosts these signals so they can cross a network cable. The network interface card takes data from the computer, packages the data for transmission, and acts as a gatekeeper to control access to the shared network cable. Because the NIC functions as an interface between the computer and the network cabling, it must serve two masters. Inside the computer, it moves data to and from Computer. Most cards today allow connection for either thin Ethernet or UTP (unshielded twisted-pair) cabling. Thin Ethernet uses a round BNC connector, and UTP uses a RJ-45 connector (similar to a telephone jack who is called RJ-11).

Wireless LAN
A wireless local area network (WLAN) is a local area network (LAN) that doesn't rely on wired Ethernet connections. A WLAN can be either an extension to a current wired network or an alternative to it. Use of a WLAN adds flexibility to networking. A WLAN allows users to move around while keeping their computers connected. WLANs have data transfer speeds ranging from 1 to 54Mbps, with some manufacturers offering proprietary 108Mbps solutions. The 802.11n standard can reach 300 to 600Mbps. Because the wireless signal is broadcast so everybody nearby can share it, several security precautions are necessary to ensure only authorized users can access your WLAN. A WLAN signal can be broadcast to cover an area ranging in size from a small office to a large campus. Most commonly, a WLAN access point provides access within a radius of 65 to 300 feet.

Wireless LAN: How Does it Work? Reduce costs by eliminating duplicate data entry in the office. Capture data at the sourc and transfer directly. Max Distance from Access Point 200 feet
Page No.288 Computer Hardware & Network Professional July 2011

Use Multiple Access Points to extend range Speeds up to 11 Mbps Wireless Access point is wired to server Pocket PC talks to the Access Point Wirelessly through wireless card Network Cabling
Networks need cables and three main types are twisted-pair cable (TP), coaxial cable, and fiber-optic cable (FDDIFiber Distributed Data Interface).

Coaxial Cable
Coaxial cable is made of two conductors. The center is a copper wire that is insulated by a plastic coating and then wrapped with an outer conductor (usually a wire braid). This outer conductor around the insulation serves as electrical shielding for the signal being carried by the inner conductor. Outside the outer conductor is a tough insulating plastic tube that provides physical and electrical protection. At one time, coaxial cable was the most widely used network cabling. However, with improvements and the lower cost of twisted-pair cables, it has lost its popularity.

Coaxial cable Coaxial cable is found in two types: thin (ThinNet) and thick (ThickNet). Of the two, ThinNet is the easiest to use. It is about one-quarter of an inch in diameter, making it flexible and easy to work with (it is similar to the material commonly used for cable TV). ThinNet can carry a signal about 605 feet (185 meters) before the signal strength begins to suffer. ThickNet, on the other hand, is about threeeighths of an inch in diameter. This makes it a better conductorit can carry a signal about 1,640 feet (500 meters). The disadvantage of ThickNet over Page No.289 Computer Hardware & Network Professional July 2011

ThinNet is that it is more difficult to work with. The ThickNet version is also known as standard Ethernet cable. When compared to twisted-pair, coaxial cable is the better choice even though it costs more. It is a standard technology that resists rough treatment and EMI. Although more resistant, it is still susceptible to EMI. Fiber-Optic Cable Fiber-optic cable is made of light-conducting glass or plastic fibers. It can carry data signals in the form of modulated pulses of light. The plastic-core cables are easier to install, but do not carry signals as far as glass-core cables. Multiple fiber cores can be bundled in the center of the protective tubing.

Fiber-optic cable When both material and installation costs are taken into account, fiber-optic cable can prove to be no more expensive than twisted-pair or coaxial cable. Fiber has some advantages over copper wire; it is protect from EMI and detection outside the cable and provides a reliable and secure transmission media. It also supports very high bandwidths (the amount of information the cable can carry), so it can handle thousands of times more data than twisted-pair or coaxial cable. Cable lengths can run from .25 to 2.0 kilometers depending on the fiber-optic cable and network. If you need to network multiple buildings, this should be the cable of choice. Fiber-optic cable systems require the use of fiber-compatible NICs.

Page No.290

Computer Hardware & Network Professional July 2011

Twisted-Pair Cable Twisted-pair cable consists of two insulated strands of copper wire twisted around each other to form a pair. One or more twisted pairs are used in a twisted-pair cable. The purpose of twisting the wires is to eliminate electrical interference or EMI (Electro magnetic interference) from other wires and outside sources such as motors. By twisting the wires, any electrical noise from the adjacent pair will be canceled. The more twists per linear foot, the greater the effect. Twisted-pair wiring comes in two types: shielded (STP) and unshielded (UTP). The STP cable uses a woven-copper braided jacket, which is a higher-quality, more protective jacket than UTP.

Twisted pair cable UTP is the most common. UTP cables can be further divided into five categories: Category 1: Traditional telephone cable. Carries voice but not data. Category 2: Certified UTP for data transmission of up to 4 Mbps (megabits per second). It has four twisted pairs. Category 3: Certified UTP for data transmission of up to 10 Mbps. It has four twisted pairs. Category 4: Certified UTP for data transmissions up to 16 Mbps. It has four twisted pairs. Category 5: Certified for data transmissions up to 100 Mbps. It has four twisted pairs of copper wire. Category 6: Certified for data transmissions up to 1000 Mbps. It has four Shielded twisted pairs of copper wire. Twisted-pair cable has several advantages over other types of cable (coaxial and fiber-optic)it is readily available, easy to install, and inexpensive. Among its disadvantages are its sensitivity to EMI (electromagnetic interference) and susceptibility to eavesdropping; it does not support communication at distances of greater than 100 feet; and it requires the addition of a hub (a multiple network connection point) if it is to be used with more than two computers. Page No.291 Computer Hardware & Network Professional July 2011

Name 10BaseT 10Base2 10Base5 100BaseT 1000BaseT

Description Common Ethernet Net ThinUTP pair

Type

Segment 100

Speed 10 Mbps 10 Mbps 10 Mbps 100 Mbps 1000Mbps

twisted- .5 to meters

Coaxial Coaxial Twisted-pair Shielded Twisted Pair

185 meters 500 meters .5 to meters .5 to meters 100 100

Thick Ethernet common Becoming Common

Connectors
RJ-45 is the standard connector utilized on 4-pair (8-wire) UTP Unshielded Twisted Pair) cable. RJ mean Registered Jack and 45 is size number of the connector. (Rj11 and RJ12 is use with phone line) It is generally implemented for network and telephone cabling. Sometimes, it's also utilized for serial network connections. The color arrangements of UPT cable connection is set by TIA/EIA (Telecommunication Industry Association) for local Area network. (See the picture for tools 11.1)

Straight and Cross Cable Connections of Rj-45


Straight type cable connection is use with dissimilar devices like LAN card and Hub switch and Cross Cable connection is use with similar devices like Computer to Computer or Laptop to computer connectivity without using Hub switch.

Straight cable Connection


Pin 1 (White/Orange) Left HAND Pin 8 (Brown) Right HANDS 1st-Side

Pin-1
Page No.292

Pin-2

Pin-3

Pin-4

Pin Pin-

Pin-7

Pin-

Computer Hardware & Network Professional July 2011

-5
White/Oran ge Orang e White/Gre en White/Bl ue Blu e

6
Gree n White/Bro wn

8
Brow n

2nd-Side

Pin-1
White/Oran ge

Pin-2
Orang e

Pin-3
White/Gre en

Pin-4
White/Bl ue

Pin Pin-5 6
Blu e Gree n

Pin-7
White/Bro wn

Pin8
Brow n

Straight cable Connection


1st-Side

Pin-1
White/Oran ge

Pin-2
Orang e

Pin-3
White/Gre en

Pin-4
White/Bl ue

Pin Pin-5 6
Blu e Gree n

Pin-7
White/Bro wn

Pin8
Brow n

2nd-Side

Pin-1
White/Gre en

Pin2
Gree n

Pin-3
White/Oran ge

Pin-4
White/Bl ue

Pin Pin-6 -5
Blu e Orang e

Pin-7
White/Bro wn

Pin8
Brow n

What is DSL Internet service?


DSL (digital subscriber line) technologies, often grouped under the term DSL, connect a computer to the Internet. DSL uses existing copper pair phone line wiring in conjunction with special hardware on the switch and user ends of the line. This special hardware allows for a continuous digital connection over the phone lines. Since the connection is digital, DSL technology doesn't have a digital-to-analog conversion like traditional modems. It eludes voice audio spectrum frequency boundaries because it can use frequencies above the voice audio spectrum. This means you can use your phone while maintaining your Internet connection.

Page No.293

Computer Hardware & Network Professional July 2011

These different frequencies allow DSL to encode more data, and allow Internet connection speeds of up to 50 times faster than standard modems, and up to 12 times faster than an ISDN connection. Additionally, since DSL is not a bus technology, it offers more consistent bandwidth than cable modems in which multiple users share very high bandwidth media. However, distance limitations can affect the transmission rates or can be too great, rendering DSL infeasible. Also, the condition of your existing wiring can affect transmission rates. The most commonly available DSL technology is ADSL, or asymmetric DSL. It is asymmetric in that it is designed to accommodate typical consumer Internet use, with much more data flowing toward the user (multimedia and text) than from the user (mostly keystrokes and mouse behavior). The downstream rate (receiving rate) varies from 1.5 to 9Mbps; the upstream rate (sending rate) varies from 16 to 640Kbps. These speeds depend greatly on the distance to the telephone company's central office.

DSL Modem Setup


Installing Phone Filters You must install the included Phone Line Filters on every device (phones, fax machine, satellite receivers etc.) that is connected to the same line as your new DSL.

Installing DSL Modem 1. Plug the included Phone Line Splitter into your Wall Jack. If you are going to be using another device (phone, fax machine, satellite receiver
Page No.294 Computer Hardware & Network Professional July 2011

etc.) plug-in one of your Phone Line filters into the Splitter and then plug your phone into the filter. On the other side of the splitter hookup your DSL modem directly with the supplied phone cable. Be sure to plug it into the LINE or DSL port on the back of your modem. 2. Make sure your computer is turned off. 3. Take the supplied Ethernet cable and plug it into the LAN or ETHERNET port on the back of the modem. Plug the other end of the cable into the Ethernet port on the computer. 4. Plug the supplied power cord into the modem and then into an available plug nearby. Once you plug-in the power supply, the modem will turn on automatically. If there is a switch on the back of the modem make sure to flip it to the ON position.

5. Once the READY, SYNC/PPPoE or LINE light on the front of the modem stops blinking, turn your computer on and you will be ready to surf the internet!

Page No.295

Computer Hardware & Network Professional July 2011

What is the future of DSL?


The future of DSL is very bright, as businesses and consumers increasingly move toward an information-based economy. As companies implement more sophisticated applications that require high bandwidth capability. Today, many service providers are presently offering or implementing one form of DSL technology or another.

Infrared (IrDA)
Infrared is light comprised of electromagnetic energy. Infrared waves are shorter than a microwave but longer than visible light rays. Infrared is invisible to the human eye. The human body naturally receives and gives off infrared light. IrDA is used to transfer data to short distance at 5 to 7 meters and mostly use in house hold devices like remote controls of TV, home security locks, audio, Video Players etc. It is also used in mobile phones to exchange data. When IrDA used for data exchange, the length reduced to one meter.

Bluetooth
Bluetooth is an open wireless technology standard for exchanging data over short distances (using short length radio waves) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. The name Bluetooth belongs to an emperor who was very famous to get political calibration b/w countries. It was created by telecoms vendor Ericsson in 1994. A master Bluetooth device can communicate with up to seven devices in a Wireless User Group devices can link computers with Bluetooth with a distance of 100 meters. Version Data Rate Version 1.2 1 Mbit/s Version 2.0 + EDR 3 Mbit/s Version 3.0 + HS 24 Mbit/s

Page No.296

Computer Hardware & Network Professional July 2011

Chapter 12

Network Administration
Network Operating systems (NOS)
Network operating systems are specially designed for network properties. These operating systems have extra application to support computer network. Linux and novel are open source operating systems that are designed for network. In this comparison Microsoft has also creates operating system for network. Microsoft has designed two types of NOS. First is Server operating system and second is Client or workstation operating system. The first NOS introduced in 1993 with the name of Windows NT server and workstation. After this Server 2000 and workstation, at the end Server 2003 and window XP were released.

Roles of Server
Domain An Internet domain is a site with a common general interest or purpose, often run by a single firm or institution. The domain suffix gives a general idea of the site's purpose: .com, for businesses, or .edu, for educational institutions. The following table lists common Internet domains. Domain-Name Server A domain-name system/domain name service is a computer that matches IP addresses with domain names. The domain name makes it possible for you to use the easy-to-remember domain name www.pakistan.com without having to memorize the string of numbers in the IP address. It is use in local area network for network naming. DNS binds all the computers on the network in a single name. It is work with active directory. Domain .com Page No.297 Description Commercial organizations Computer Hardware & Network Professional July 2011

.net .edu .org


.gov .mil com.pk

Networks (the backbone of the Internet) Educational institutions Nonprofit organizations


US Government nonmilitary institutions US Government armed services Two-letter country code.

Active Directory
Active Directory is Microsoft's trademarked directory service, an integral part of the Windows 2003 architecture. Like other directory services, such as Novell Directory Services (NDS), Active Directory is a centralized and standardized system that automates network management of user data, security, and distributed resources, and enables interoperation with other directories. Active Directory is designed especially for distributed networking environments. Active Directory includes enough information about users, groups, organizational units and other kinds of management domains and administrative information about a network to represent a complete digital model of the network.

DHCP
The Dynamic Host Configuration Protocol (DHCP) is an auto configuration protocol used on IP networks. Computers that are connected to IP networks must be configured before they can communicate with other computers on the network. DHCP allows a computer to be configured automatically, without the need of network administrator. Prevents IP address conflicts by preventing the use of previously assigned

IP addresses.
Reduces the time spent configuring and reconfiguring computers by

selecting the DHCP server to supply a full range of additional


Page No.298 Computer Hardware & Network Professional July 2011

configuration values when assigning address leases.


Prevents clientssuch as users with mobile or portable computers who

change locations frequentlyfrom missing updates by using the lease renewal process.

Printer Server
Printer server is role of a server 2003 in which server share their printer service to all network computers or clients. The other benefits of this role in domain network administrator can control or block printing services for typical users and can fix the printing jobs for the user.

File Server
File server is a computer attached to a network that has the primary purpose of providing a location for shared disk access, i.e. shared storage of computer files (such as documents, sound files, photographs, movies, images, databases, etc.) that can be accessed by the workstations that are attached to the computer network.

Application server
The role of Application server is to share softwares on the network. The basic purpose of this server is to reduce the cost of register software. In this role software is installing on server computer and it can use all the network computer, web server is also an example of file server.

Mail Server
The basic work of mail server is to send and receive e-mails on the network. It is a combination of SMTP (simple mail transfer protocol) and POP (post office protocol).

Web Server
Web server is part of application server the basic role of this server is that to share websites on the local and wide area network.

Page No.299

Computer Hardware & Network Professional July 2011

Media Streaming Server


Media streaming server is done the sharing of multimedia service. It gives the facility to use see videos, live T.V and listen music. It can share only its service rather than downloads.

Proxy server
The basic purpose of Proxy server is to share internet on the network. The note able point about the proxy server is that, it is not a part of 2003 server. It is available in from of separate software. Microsoft provides this software with name of ISA server. Third party proxy software is win-proxy, squid and Wingate etc. ISA server has four functions. 1- Internet Sharing 2- Web caching 3- Firewall 4- Web monitoring

Terminal server
It is use to access any computer of the network by the administrator. This Server utility is used to configure client computers from server computer.

Network Protocols
A network protocol is a set of rules that govern the way computers communicate over a network. In order for computers using different software to communicate, they must follow the same set of networking rules and agreements, called protocols. A protocol is like a language; unless both computers are speaking and listening in the same language, no communication will take place. Networking protocols are grouped according to their functions, such as sending and receiving messages from the NIC, or talking to the computer hardware and making it possible for applications to function in a network. The following is a list of standard network protocols: IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange): The NetWare core protocol developed by Novell in the early 1980s. Page No.300 Computer Hardware & Network Professional July 2011

NetBIOS/NetBEUI (Networked Basic Input/output System/NetBIOS Enhanced User Interface): A local area protocol developed by IBM and refined by Microsoft. TCP/IP (Transmission Control Protocol/Internet Protocol): A set of standard protocols and services. It was developed by the Department of Defense beginning in the early 1970s as part of an effort to link government computers. This project led to the development of the Internet. Because TCP/IP is the foundation of the Internet, as well as the most widely used networking protocol, it is a good choice for networks. AppleTalk: A networking protocol utilized by Macintosh computers.

File Transfer Protocol (FTP)


The file transfer protocol is special application used for uploading and downloading file from internet. It is built-in in the windows operating system and also available third party software like smart FTP, cute FTP.

What is an IP Address?
Introduction to TCP/IP, we mentioned that each system attached to an IP -based network must be assigned a unique 32-bit IP address value. The administrator assigns the IP address to computer. IP addresses are neither built into the operation system, nor are they part or the network adapter interface. Configured by the administrator, the IP address provides the logical identification number of a computer connected to an IP-based network. For exp.192.168.0.1 Class A: 1.0.0.1 Class B: 128.1.0.1 Class C: 192.0.1.1

What is subnet mask?


Subnet mask is use with IP address as a sub network address. If an organization have a big local Area network and it need to be same class of IP address on the all servers of the network then all servers should use different subnet masks. For example: Server A: Server B: Page No.301 IP. 192.168.0.1 IP. 192.168.0.1 Subnet mask. 255.255.255.0 Subnet mask. 255.255.255.1

Computer Hardware & Network Professional July 2011

Static and Dynamic IP address


Static IP address adds or fixed by the user and it cannot be changed automatically. Dynamic IP address assign to the device or computer by the DHCP server. Dynamic IP address can be changed automatically on every restart of device or computer.

Adding IP (windows7) address Step by Step


Step# 01
If you need to add fix to static IP address to computer right click on the Network Icon then Click on Properties in appeared menu.

Page No.302

Computer Hardware & Network Professional July 2011

Step# 02
Click on Change adapter settings to open the network adapter properties or click on Local Area Connection in this page.

Page No.303

Computer Hardware & Network Professional July 2011

Step# 03
In this window you can see all network connection including wireless and Bluetooth. So select the required connection and take its properties.

Step# 04
From properties window double click on Internet Protocol Version 4 or take its properties. Internet Protocol Version 6 is latest 64 bit Transmission protocol. Some old operating systems are not support it.

Page No.304

Computer Hardware & Network Professional July 2011

Step# 05
Click on Use the following IP address to Enable IP address Boxes. Enter required IP address with Subnet mask. This option can also enable the DNS server IP address Boxes.

Ipconfig Utility.
ipconfig is a command line utility available on all versions of Microsoft Windows starting with Windows NT. ipconfig is designed to be run from the Windows command prompt. This utility allows you to get the IP address information of a Windows computer. C:\ ipconfig Page No.305 Computer Hardware & Network Professional July 2011

C:\ ipconfig/all (for more detail)

Ping Utility.
Ping (Packet Inter Net Groper) is a computer network administration utility used to test connectivity of other computers by name or IP address. Ping operates by sending an echo request packets to the target computer and waiting for response. In the process it measures the time from transmission to reception (round-trip time) and records any packet loss. The results of the test are printed in form of a statistical summary of the response packets received, including the minimum, maximum, and the mean round-trip times. (on command prompt type ping space destination computers IP address or name) C:\ping 192.168.0.10 C:\ping 192.168.0.10 t for continuous pinging

Page No.306

Computer Hardware & Network Professional July 2011

Configure of server 2003 Set by Step.


First phase (Domain Configuration)
This wizard of domain configuration will configure DNS, Active Directory, DHCP. Before confutation of server 2003 for Domain network you must considered these. 1. Disk partitions should be formatted on NTFS format. Otherwise applied security polices will not work. If you have already formatted partitions on FAT then you can convert them with command of Convert. For example: Syntax [ Convert c: /fs:ntfs ] 2. Computer name should be added in the computer Properties. 3. Network Card should be installed and connected with the Hub switch. 4. Internet services must be stop; weather it will run from USB or LAN card. 5. If you have Second LAN Card in the system it should be disable.
6. IP address should be added in LAN card TCP/IP. If you do not done this it

take 192.168.0.1 automatically. 7. Done all configurations Before Configuring or login the Workstation.

Step# 01
For domain network configuration click Start the click Programs the click Administrator Tools and then click Configure Your Server Wizard.

Page No.307

Computer Hardware & Network Professional July 2011

Step# 02
Configuration wizard is started click next.

Page No.308

Computer Hardware & Network Professional July 2011

Step# 03
This window will check all the hardwares and communication devices connected with the computer.

Step# 04
Configuration wizard is started. Select Typical Configuration and click next.

Page No.309

Computer Hardware & Network Professional July 2011

Step# 05
Add the Domain Name like vtisahiwal.net with no space and small letters and then click next.

Step# 06
Domain Name will disable in this window but it gives you option to change DNS for network BIOS. You can choose same name for NetBios and click next.

Page No.310

Computer Hardware & Network Professional July 2011

Step# 07
Select Do not forward queries and click next.

Step# 08
After completion of this process computer will restart, while this; do not open any application. Click ok to continue.

Page No.311

Computer Hardware & Network Professional July 2011

Step# 09
Configuration is started.

Step# 10
This window is showing Configuration progress, when it done click next.

Page No.312

Computer Hardware & Network Professional July 2011

Step# 11
Click Finish to end the configuration wizard and computer will restart.

Step# 12
After restart the computer you this window. It shows you all configured item. You can also uninstall any item from this window.

Page No.313

Computer Hardware & Network Professional July 2011

Second phase (Password Policy)


If you no need the fix password length, complexity, and age of password then you can disable it. This policy must be done before creating a user name in active directory. Otherwise you should need to complete all the requirements to create a user name.

Step# 01
Click on Start then click program then click Administrator Tools and then click Domain security policy.

Page No.314

Computer Hardware & Network Professional July 2011

Step# 02
Default Domain Security Settings window will open. Click on Password Policy in left pan. You can see its properties in right pan of the window.

Step# 03
Double click on policy and configure it.

Page No.315

Computer Hardware & Network Professional July 2011

Step# 04
At the end apply changes: open Run command and type gpupdate /force click OK.

Third phase (Active Directory Configuration)


For creation of user name and Password you need to be configured active directory for user and computers. This option also allows you to bond the domain user with many restrictions. Server 2003 allows to unlimited user login and groups creation but the recommendation is five thousand.

Step# 01
For active directory click Program then click Administrator Tools and last click on Active Directory. Users and Computer

Page No.316

Computer Hardware & Network Professional July 2011

Step# 02
Here for can see your domain name (vtisahiwal.net) in left Pan.

Page No.317

Computer Hardware & Network Professional July 2011

Step# 03
In this step we create Organizational Unit, is also called OU. It is a group for users. In this group User logins are created. We can create one or more OU in a Domain. Right click on Domain Name then click on new and click on Organization Unit.

Step# 04
Type the name of OU like Computer hardware or software Trade.

Page No.318

Computer Hardware & Network Professional July 2011

Step# 05
Creation of new user login, Right on new created OU, then click on New and then click in User.

Step# 06
In this form fill the user basic information and also write the User login name. Then click next.

Page No.319

Computer Hardware & Network Professional July 2011

Step# 07
Type the password which appears in dots; also select the login options for the user.

Step# 08
Click Finish to complete the Wizard. If you want create more user copy this user and add new user information.

Page No.320

Computer Hardware & Network Professional July 2011

Step# 09
For remote profile and user driver, you create two folders with the name of Profile and Drive. Share these folders with full control.

Step# 10
Link the Profile and Drive folders to the created User. Right click on the user Name and take it properties.

Page No.321

Computer Hardware & Network Professional July 2011

Step# 11
Type the server name or IP address in Run with backslash you can see here your share folders. Copy this address from run and paste it in the user profile Path and drive. For example: \\192.168.99.1\drive\bilal
\\server\drive\%username%

Step# 12
When will you click OK user Profile and Drive folders will link with the user Login. Now when will you logon any other computer you can see an extra drive in My computer and your documents and desktop appearance will move on every computer when you are logon.

Page No.322

Computer Hardware & Network Professional July 2011

Step# 13
To restrict users for some work. Take properties of OU (computer hardware).

Step# 14
Click Group Policy (GP) then click on New. Name the new policy. And click Edit.

Page No.323

Computer Hardware & Network Professional July 2011

Step# 15
After clicking Edit you will see this window. Here you click Administrator Templates then can. Click on Remove My Documents Icon on The desktop. You can select any option from the list.

Page No.324

Computer Hardware & Network Professional July 2011

Step# 16
First you read the security statement carefully and then you select option.

Client or Workstation Configurations.


1. Assign the proper computer name to the Client 2. Add the Domain Name the Client. You can do this to open the properties of My Computer. When you are adding Domain Name; A window will appear for administrator Password. Here you will add servers user name and password. 3. Reboot the computer after adding the DNS.

Page No.325

Computer Hardware & Network Professional July 2011

4. After restating the client: you put the client user name and password which you are created in Active directory.

Page No.326

Computer Hardware & Network Professional July 2011

Chapter 13

Proxy Server & Internet Securities


Proxy server is a server (a computer system or an application) that acts between clients computers and Internet. Proxy server entertained the requests from clients. A slandered Proxy server shares the internet, Web caching, Control the network traffic and monitor the data traffic.

Internet Sharing
In this method a single Computer or Device linked with the internet via Phone line or satellite and this device like DLS or computer shares the service of internet to other computers and device that are linked with it, via wire or wireless.

Web caching
Web caching is the caching of web documents (HTML pages, images) to reduce bandwidth usage and proxy server load. A web cache store copies of documents passing through it; and when this file calls again by the client, the proxy server will send personal saved file. This way saved the time and efforts of the proxy server.

Firewall
A firewall is software that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings. Firewall softwares also provides you the facility to monitor the network traffic and control the traffic.

ISA Server
Microsoft's ISA Server (Internet Security and Acceleration Server) is the next version of Microsofts Proxy Server. This application is not built in Server operating system. So Microsoft provides it separately.

Terminology of ISA
Local Host: ISA install on that computer or server computer that has ISA. Internal: Clint computers which takes the service of internet. Page No.327 Computer Hardware & Network Professional July 2011

External: Internet or other network

Step by Step Installation of ISA Step# 01


Remember: Before installation of ISA you should be ON the service of internet
on your computer which you are configuring as a proxy server. Check internet ON, by opening websites.

From ISA source software click on ISAAutorun.exe. ISA installation screen will appeared in front of you. In this screen click on the Install ISA Server.

Page No.328

Computer Hardware & Network Professional July 2011

Step# 02
Done this procedure auto

Step# 03
Accept the license agreement of ISA by clicking radio button and then click next.

Page No.329

Computer Hardware & Network Professional July 2011

Step# 04
Type the User Name and license product key.

Page No.330

Computer Hardware & Network Professional July 2011

Step# 05
Chose typical and click next.

Step# 06
From: add first IP address in your selected IP range. To: add last IP address in your selected IP range. Click Add and then click ok.

Page No.331

Computer Hardware & Network Professional July 2011

Step# 07
Done this procedure auto complete. After this installation process will be done.

Step by Step Configuration of ISA


When the installation of ISA will be done. Your all network activities will be stopped. No data transfer, no sharing and no Pinging. Because ISA firewall Page No.332 Computer Hardware & Network Professional July 2011

stopped all your data transfer services and you need to configure you ISA for you network. Two basic configurations are needed; one is Firewall and second is Web cache. Three basic firewall Access Rules are must be defined. Configuring of Access Rules is same for all. 1. Local host to External. 3. Local host to Internal. 2. Internal to Local host. 4. Internal to External

Do not delete Default Rule that is already created. Give it last Number.

Step# 01
Click on Firewall Policy then click on New and then click on Access Rules.

Step# 02
Type the rule name and click next. Page No.333 Computer Hardware & Network Professional July 2011

Step# 03
Select Allow and click next.

Step# 04
Select All outbound traffic and click next. Page No.334 Computer Hardware & Network Professional July 2011

Step# 05
Click add then open new window, in this window click Network and then double click on Local Host. It will automatically add in behind window and then click next.

Step# 06
Page No.335 Computer Hardware & Network Professional July 2011

Click add then open new window, in this window click Network and then double click on External. It will automatically add in behind window and then click next.

Step# 07
Allow data transfer to all users. Click next.

Step# 08
Page No.336 Computer Hardware & Network Professional July 2011

Click Finish and apply it.

Step# 09
All Access Rules will be added in same way. At the end click on Apply.

Step# 10
Page No.337 Computer Hardware & Network Professional July 2011

In this step define we the Cache. Click on Cache in left Pan and then Click on Define Cache Drives.

Step# 11
In this window select the dive, in which you want to take space for cache memory. Normally you can take 1GB space. Type this space figures in text box and click Set. To close this windows click Apply and Ok

Page No.338

Computer Hardware & Network Professional July 2011

Step# 12
Select the Save changes and restart the services and click OK

The Internet
Introduction The Internet, sometimes called simply "the Net," is a worldwide system of computer networks - a network of networks in which users at any one computer can, if they have permission, get information from any other computer (and sometimes talk directly to users at other computers). More than 100 countries are linked into exchanges of data, news and opinions. Unlike online services, which are centrally controlled, the Internet is decentralized by design. Advantages of the Internet The Internet provides opportunities glowing your personality, it is a bundle of thousands information libraries. But some advantages as are under: E-mail: E-mail is an online correspondence system. With e-mail you can send and receive instant electronic messages, which work like writing letters. Your messages are delivered instantly to people anywhere in the world, unlike traditional mail that takes a lot of time. Access Information: The Internet is a virtual treasure of information. Any kind of information on any topic under the sun is available on the Internet. The search engines on the Internet can help you to find data on any subject that you need. Shopping: Along with getting information on the Internet, you can also shop online. There are many online stores and sites that can be used to look for Page No.339 Computer Hardware & Network Professional July 2011

products as well as buy them using your credit card. You do not need to leave your house and can do all your shopping from the convenience of your home. Online Chat: There are many chat rooms on the web that can be accessed to meet new people, make new friends, as well as to stay in touch with old friends. Downloading Software: This is one of the most happening and fun things to do via the Internet. You can download numerous, games, music, videos, movies, and a host of other entertainment software, Moves, from the Internet, most of which are free. Disadvantages of the Internet There are certain cons and dangers relating to the use of Internet that can be summarized as: Personal Information: If you use the Internet, your personal information such as your name, address, etc. can be accessed by other people. If you use a credit card to shop online, then your credit card information can also be stolen which could be akin to giving someone a blank check. Pornography: This is a very serious issue concerning the Internet, especially when it comes to young children. There are thousands of pornographic sites on the Internet that can be easily found and can be a detriment to letting children use the Internet. But you can ban it with parental control softwares and ISA servers firewall. Viruses: Internet is big source of spreading viruses with high speed that infects the thousands computers in the world at a time.

Project:
Note: Trainees should complete these projects in Groups and teacher evaluates the project marks. Trainee prepared their CV (Ms-Word) Trainee Prepared a Salary Sheet (Ms-Excel) Make a slide show on computer hardware & Network Professional Trainee Assemble a complete PC Trainee Prepared a cross Cable. Trainee Create a domain network with group policies. Trainees install ISA server and block selected Websites Computer Hardware & Network Professional July 2011

Page No.340

Abbreviations
Sr#
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29

TERMS
AGP ACPI AMD APM AT ATAPI AC ASCII ANSI AVO API ALU AMR BIOS BASIC BTX Bit bps BNC BPS CAT CRT CPU CGA COBOL COM CD CMOS CU

STAND

FOR

Accelerated Graphics Port Advance Configuration and Power Interface Advance Micro Devices Advance Power Management Advance Technology Advance Technology Attachment Packet Interface Alternative Current American Standard Code of Information Interchange American National Standard Institute Ampere Volt Ohm Application Program Interface Arithmetic and Logic Unit Audio Modem Riser Basic Input Output System Beginners All Purpose Symbolic Instruction Code Balanced Technology eXtended Binary Integer OR Binary Digit bit per second British Naval Connector Byte Per Second Category Cathode Ray Tube Central Processing Unit Color Graphic Adapter Common Business Oriented Language Communication Compact Disc Complementary Metal Oxide Semiconductor Control Unit Computer Hardware & Network Professional July 2011

Page No.341

DOS DSL DNS DHCP DMM DVD DVOM DC DVI DMA DDRRAM DDR SDRAM 42 DIMM 43 DIP 44 DRAM 45 EIDE 46 EEPROM 47 EMI 48 ESD 49 EPA 50 EPROM 51 ECC 52 EDO 53 EISA 54 FDDI 55 FAT 56 FTP 57 FC-PGA 58 FDD 59 FORTRA N 60 GPU 61 HP Page No.342

30 31 32 33 34 35 36 37 38 39 40 41

Disk Operating System Digital Subscriber Line Domain Name Service / Domain Name System Dynamic Host Configuration Protocol Digital Multi Meter Digital Vertical Disc OR Digital Video Disc Digital Volt Ohm Meter Direct Current Digital Video Interface Direct Memory Access Double Data Rate Random Access Memory Double Data Rate Synchronous Dynamic Random Access Memory Dual Inline Memory Module Dual Inline Packages Dynamic Random Access Memory Enhanced Integrated Drive Electronic Electrically Erasable Programmable Read Only Memory Electro Magnetic Interference Electro Static Discharge Environmental Protection Agency Erasable Programmable Read Only Memory Error Correcting Code Extended Data Out Extended Industry Standard Architecture Fiber Distributed Data Interconnection File Allocation Table File Transfer Protocol Flip Chip Pin Grid Array Floppy Disk Drive Formula Translation Graphics Processing Unit Hewlett Packard Computer Hardware & Network Professional July 2011

62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93

HLF HAN HTTP IP IPX/SPX ISP ISA ISDN I/O IEEE ISO IRQ JP LASER LCD LAN LLC LED LGA LLF MCP MCSE MAC MCA MDA MIDI MMX NIC NOS NetBUIE NTFS NT

High Level Formatting Home Area Network Hyper Text Transfer Protocol Internet Protocol Internet work Packet Exchange/Sequenced Packet Exchange Internet Service Provider Industry Standard Architecture Integrated Service Digital Network Input / Output Institute of Electrical and Electronic Engineers International Standard Organization Interrupt Request Jumper Light Amplification by Stimulation Emission of Radiation Liquid Crystal Display Local Area Network Logical Link Control Light Emitting Diode Land Grid Array Low Level Format Microsoft Production Specialist Microsoft Certified System Engineer Media Access Control Micro Channel Architecture Monochrome Display Adapter Musical Instrument Digital Interface Multi Media Extensions Network Interface Card Network Operating System NetBIOS Enhanced User Interface New Technology File System OR Network Technology File System New Technology OR Network Technology Computer Hardware & Network Professional July 2011

Page No.343

NVRAM OSI OS OEM PGA PLCC 100 PCMCIA 101 PCI 102 PPGA 103 PnP 104 PPP 105 POP 106 PDL 107 POST 108 PCB 109 RAM 110 ROM 111 RST 112 RPM 113 RAID 114 SCAM 115 SATA 116 STP 117 SMTP 118 SEC 119 SECC 120 SIMM 121 SCSI 122 SVGA 123 SW 124 SGRAM 125 TD 126 TA 127 TCP/IP Page No.344

94 95 96 97 98 99

Non-Volatile Random Access Memory Open System Interconnection Operating System Original Equipment Manufacture Pin Grid Array Plastic Leaded Chip Carried Personal Computer Memory Card International Association Peripheral Component Interconnect Plastic Pin Grid Array Plug and Play Point to Point Protocol Post Office Protocol Page Description Language Power On Self Test Printed Circuit Board Random Access Memory Read Only Memory Restart Round Per Minute OR Revolution Per Minute Redundant Array of Independent Disks SCSI Configuration Auto Magically Serial Advance Technology Attachment Shielded Twisted Pair Simple Mail Transfer Protocol Single Edge Contact Single Edge Contact Cartridge Single Inline Memory Module Small Computer System Interface Super Video Graphic Adapter Switch Synchronous Graphics Random Access Memory Tape Disk Terminal Adapter Transmission Control Protocol / Internet Protocol Computer Hardware & Network Professional July 2011

128 129 130 131 132 133 134 135 136 137 138 139 140

TFT TXD UPS URL USB UTP VRR VRM VPN VDU VGA WAN WWW

Thin Film Transistor Transmit Data Uninterruptible Power Supply Universal Resource Locator Universal Serial Bus Unshielded Twisted Pair Vertical Refresh Rate Vertical Regulation Module Virtual Private Network Video Display Unit Video Graphic Adapter Wide Area Network World Wide Web

Page No.345

Computer Hardware & Network Professional July 2011

You might also like