Download as pdf or txt
Download as pdf or txt
You are on page 1of 39

Chapter 3:

Advanced Computer
Hardware

IT Essentials V7
POST, BIOS, UEFI
 BIOS Beep Codes and Setup
• As the computer boots, it checks its own critical components (POST).
• The firmware (BIOS or UEFI) uses beep codes to indicate any errors.
• Critical components include: video card(s), memory and I/O devices.
• A POST card can be used to help debugging POST problems.
 BIOS and CMOS
• BIOS is a firmware; all motherboards need a firmware to operate.
• Some aspects of BIOS can be configured by the user.
• BIOS settings are stored in CMOS to survive reboots.
Entering the BIOS Setup Program

 CMOS determines what types of


options are installed
 CMOS password can be configured to
protect settings.
• If forgotten, use the jumper on the
motherboard to reset or remove
battery.
 System BIOS allows access to
configuration information in CMOS
setup utility.
• proper key combination (F1, F2, Del,
F10, Ctrl + Esc are examples)
 Registers are examined each time the
system is booted up.
BIOS and UEFI Configuration
 BIOS Component Information
• BIOS or UEFI can provide information about the installed
hardware, including: CPU, RAM, hard drives and optical
drives.
• This information can be useful when trouble-
shooting.
 BIOS Configurations
• allows for customizing specific aspects of the
computer hardware
• The customizable variables and features are
manufacturer specific.
• BIOS settings typically have a direct impact on
hardware; incorrect settings have an adverse effect.
• Main BIOS configuration settings include: time and date,
disable devices, boot order, clock speed, virtualization.
BIOS and UEFI Configuration (cont.)
 BIOS Security Configuration
• BIOS includes features to protect BIOS settings,
data and recovery options.
• Common BIOS security features include: BIOS
passwords, Drive Encryption, LoJack, Trusted
Platform Module and Secure Boot.
 BIOS Hardware Diagnostics and Monitoring
• Useful for monitoring the activity of the
motherboard and connected hardware.
• Common BIOS hardware diagnostic features include:
temperature (CPU, RAM and airflow),
fan speeds, voltages, clock and bus speeds, intrusion
detection and built-in diagnostics.
• BIOS Settings, IDE, RAID, AHCI
• Flashing the BIOS could include using a boot
device or through the operating system. Losing
power during flashing can render system unusable.
Protecting Equipment
 LoJack
• This is a security feature that consists of
two programs: the Persistence Module,
which is embedded in the BIOS, and the
Application Agent, installed by the user.
When installed, the Persistence Module in
the BIOS is activated and cannot be turned
off. The Application Agent routinely
contacts a monitoring center over the
Internet to report device information and
location.

• Drive Encryption
• Encryption changes the data on the drive
into code. Without the correct password,
the computer cannot boot and data read
from the hard drive cannot be understood.
Even if the hard drive is placed in another
computer, the data remains encrypted.
Protecting Equipment
• One form of hardware security is the
Trusted Platform Module (TPM).
• The TPM is a specialized chip installed
on the motherboard of a computer to be
used for hardware and software
authentication.
• The TPM stores information specific to
the host system such as encryption
keys, digital certificates, and
passwords.
• Applications that use encryption can
make use of the TPM chip to secure
things like user authentication
information, software license protection,
and encrypted files, folders, and disks.
• Secure Boot
• Secure Boot is a UEFI security standard
that ensures that a computer only boots
an OS that is trusted by the motherboard
manufacturer. Secure boot prevents an
“unauthorized” OS from loading during
startup.
POST, BIOS, UEFI (cont.)
 UEFI Setup Program
• UEFI is also a firmware.
• performs the same tasks performed by BIOS and more
• designed to eventually make BIOS obsolete
• can also be accessed by pressing the proper key or key combination during
startup
• Refer to the motherboard documentation for details.
UEFI . . .
• Because the BIOS sits on a chip on  Unlike the BIOS, the UEFI can exist on a
the motherboard, it’s more difficult to disk, just like any other program — or in
update than an operating system or nonvolatile memory on the motherboard
an application. The early PC BIOS was or even on a network share.
hard-coded on a chip so upgrading
 At this point, it’s important to note that
required replacing the entire chip or
systems can run either the BIOS or the
PROM.
UEFI — or both. When they’re both
 The UEFI is a more sophisticated system used, the BIOS goes first to run POST,
that runs before your primary OS kicks then the UEFI takes over and hooks into
in. Unlike the BIOS, UEFI can access all any calls that may be made to the BIOS.
PC hardware, including the mouse and (Windows typically doesn’t make calls
network connections. It can take directly to the BIOS, but other operating
advantage of modern video cards and systems might — and the UEFI will
monitors. It can even access the handle them, not the BIOS.)
Internet.
BIOS and UEFI Configuration (cont.)
 UEFI EZ Mode
• Newer computers replaced BIOS by UEFI firmware.
• UEFI includes many new major features to
address different BIOS shortcomings.
• Among the changes introduced by UEFI is a new
GUI.
• EZ Mode provides an overview of basic system
information.
 UEFI Advanced Mode
• Advanced Mode includes more involved features
including: Ai Tweaker, Advanced, Monitor and
Boot.
Let’s see what you have learned . . .
Q: Where are BIOS instructions stored?
A: CMOS (NVRAM)
Q: Typically, how many beeps indicate a computer is
working?
A: one
Q: How do you access the BIOS information?
A: press a combination of keys depending upon the
manufacturer of the BIOS chip
Q: How can CMOS settings be cleared?
A: remove the battery or change the motherboard jumper
Ohm’s Law
 There is a basic equation that expresses how three of the
terms relate to each other. It states that voltage is equal to
the current multiplied by the resistance. This is known as
Ohm's Law.
• V = IR
 In an electrical system,
power (P) is equal to the
voltage multiplied by the
current.
• P = VI
If wire from the power supply is
carrying 120W of power and 24A
of current, which color(s) of cable
is the wire?
• V = P/I
Power Supplies
 On the back of the power supply is a
small switch called the voltage selector switch.
 This switch sets the input voltage to the power supply to either
110V/115V or 220V/230V. The correct voltage setting is determined by the
country where the power supply will be used.
 Setting the voltage switch to the incorrect input voltage could damage the
power supply and other parts of your computer. If a power supply does not
have the voltage selector switch, your power supply will automatically
detect and set the correct voltage.
 If you suspect the power supply is not functioning, you can test it with a
power supply tester .

 A computer can tolerate slight fluctuations in power, but a significant deviation can cause the
power supply to fail. An uninterruptible power supply (UPS) can protect a computer from
problems caused by changes in power. A UPS provides power for a computer using a power
inverter. A power inverter provides AC power to the computer from a built-in battery by
converting the DC current of the UPS battery into AC power.
Procedures to Protect Equipment and Data
 Power Fluctuation Types
• Power fluctuations may impact the operation of computer components.
• Blackouts, brownouts, noise, spike and power
surge are types of power fluctuations that can
cause data loss or hardware failure.

 Power Protection Devices


• Surge suppressors, UPSs, and SPSs are devices
designed to protect computer systems from
power fluctuations by providing a constant level of voltage.
• UPSs helps protect against potential electrical power
problems by supplying electrical power to a computer
or other device for a length dependent upon the battery.
• SPSs helps protect against potential electrical power problems by providing a backup
battery to supply power when the incoming voltage drops below the normal level. It does
not provide constant power, like the UPS. An SPS is not as effective as a UPS because
the SPS must detect a power-out condition first and then switch over to the battery to
supply power to the computer.
• Laser printers should not be plugged to UPSs.
Central Processing Unit (CPU)
 Two major CPU architectures related to instruction sets:
• Reduced Instruction Set Computer (RISC)
• uses a small, highly optimized set of instructions, rather than a more
specialized set of instructions
• Complex Instruction Set Computer (CISC)
• uses a broad set of instructions, resulting in fewer
steps per operation
Central Processing Unit (CPU)
 Some CPUs incorporate hyperthreading or hypertransport (AMD
architecture) to enhance the performance of the CPU.
 The amount of data that a CPU can process at one time depends on the size of
the processor data bus (FSB).
 The front side bus (FSB) or system bus is the physical bi-directional data bus
that carries all electronic signal information between the central processing unit
(CPU) and the Northbridge. Some computers also have a back side bus which
connects the CPU to a memory cache.
 Speed of the CPU is measured in cycles per second-megahertz (MHz) or
gigahertz (GHz).
 Overclocking is a technique used to make a processor work at a faster speed
than its original specification.
 The opposite of overclocking is CPU throttling. CPU throttling is a technique
used when the processor runs at less than the rated speed to conserve power
or produce less heat. Throttling is commonly used on laptops and other mobile
devices.
Central Processing Unit (con’t)
 The latest processor technology has resulted in CPU
manufacturers finding ways to incorporate more than one CPU
core onto a single chip.

 Dual Core CPU - two cores inside a single CPU


Triple Core CPU - three cores inside a single CPU
Quad Core CPU - four cores inside a single CPU
Hexa-Core CPU - six cores inside a single CPU
Octa-Core CPU - eight cores inside a single CPU
 NX Bit -- also called the execute disable bit. This feature, when supported and enabled in the
operating system, is able to protect areas of memory that contain operating system files from
malicious attacks by malware.
RAID Levels
 RAID provides a way to store data across
multiple hard disks for redundancy.

RAID Min # of Description


Level Drives
0 2 Data striping without redundancy (i/o improvement)
1 2 Disk mirroring (no performance increase but data
protection)
2 2 Error-Correcting Coding
3 3 Byte-level data striping with dedicated parity
4 3 Block-level data striping with dedicated parity
5 3 Block-level data striping with distributed parity
6 4 Independent Data Disks with Double Parity
0/1 4 Combination of data striping and mirroring
10 4 Mirrored set in a striped set
Raid 0 and 1 Raid 5 and 10
Legacy Ports
Video and Graphics Ports
USB Cables and Connectors
SATA Connectors and Cables
Twisted-Pair Cables and Connectors
Coax Cables and Connectors
SCSI Cables and Connectors

SCSI was often found on server machines and high-end desktops because of speed
associated with it. SCSI configuration assigns unique IDs to components such as
SCSI adapter, hard drive, etc. The boot device must have the lowest ID in the daisy
chain.
Output Devices (Terms)
 Pixel - The term pixel is an abbreviation for picture element. Pixels are the tiny dots
that comprise a screen. Each pixel consists of red, green, and blue (RGB).
 Dot pitch - Dot pitch is the distance between pixels on the screen. A lower dot pitch
number produces a better image.
 Contrast ratio - The contrast ratio is a measurement of the difference in intensity of
light between the brightest point (white) and the darkest point (black). A 10,000:1
contrast ratio shows dimmer whites and lighter blacks than a monitor with a contrast
ratio of 1,000,000:1.
 Refresh rate - The refresh rate is expressed in Hertz (Hz) and refers to how often per
second the image is rebuilt. A higher refresh rate produces a better image.
 Aspect ratio - Aspect ratio is the horizontal to vertical measurement of the viewing
area of a monitor. For example, QSXGA measures 2,560 pixels horizontally by 2048
pixels vertically which creates an aspect ratio of 5:4. If a viewing area was 16 inches
wide by 12 inches high, then the aspect ratio would be 4:3. A viewing area that is 24
inches wide by 18 inches high also has an aspect ratio of 4:3.
 Native resolution - Native resolution is the number of pixels that a monitor has. A
monitor with a resolution of 1280x1024 has 1280 horizontal pixels and 1024 vertical
pixels. Native mode is when the image sent to the monitor matches the native
resolution of the monitor.
Legacy and Common Monitor Display Standards
Resolution Aspect
Ratio
CGA Color Graphics Adapter 320 x 200 16:10
VGA Video Graphics Array 640 x 480 4:3
SVGA Super Video Graphics Array 800 x 600 4:3
FHD Full High Definition 1920 x 1080 16:9
QHD Quad High Definition 2560 x 1440 16:9
UHD Ultra High Definition 3840 x 2160 16:9

Support for multiple monitors and projection units can be


set up through the OS’s Display Settings.
Upgrading a Motherboard
 Step 1. Record how the power supply, case fans, case LEDs, and case buttons
attach to the old motherboard.
 Step 2. Disconnect the cables from the old motherboard.
 Step 3. Disconnect the expansion cards from the case. Remove each expansion
card and place them in antistatic bags, or on an antistatic mat.
 Step 4. Carefully record how the old motherboard is secured to the case. Some
mounting screws provide support while some may provide an important grounding
connection between the motherboard and chassis. In particular, pay attention to
screws and standoffs that are non-metallic, because these may be insulators.
Replacing insulating screws and supports with metal hardware that conducts
electricity might damage electrical components.
 Step 5. Remove the old motherboard from the case.
 Step 6. Examine the new motherboard and identify where all of the connectors
are such as power, SATA, fan, USB, audio, front panel connector, and any others.
 Step 7. Examine the I/O shield located at the back of the computer case. Replace
the old I/O shield with the I/O shield that comes with the new motherboard.
Upgrading a Motherboard (cont’d)
 Step 8. Insert and secure the motherboard into the case. Be sure to consult the case and
motherboard manufacturer user guides. Use the proper types of screws. Do not swap
threaded screws with self-tapping metal screws, because they will damage the threaded
screw holes and might not be secure. Make sure that the threaded screws are the correct
length and have the same number of threads per inch. If the thread is correct, they fit easily.
If you force a screw to fit, you can damage the threaded hole, and it will not hold the
motherboard securely. Using the wrong screw can also produce metal shavings that can
cause short circuits.
 Step 9. Next, connect the power supply, case fans, case LEDs, front panel, and any other
required cables. If the ATX power connectors are not the same size (some have more pins
than others), you might need to use an adapter. Refer to the motherboard documentation for
the layout of these connections.
 Step 10. After the new motherboard is in place and the cables are connected, install and
secure the expansion cards.
 It is now time to check your work. Make sure that there are no loose parts or unconnected
cables. Connect the keyboard, mouse, monitor, and power. If a problem is detected, shut
the power supply off immediately.
CPU Upgrade
 The new CPU must fit into the existing CPU socket.
 The new CPU must be compatible with motherboard chipset.
 The new CPU must operate with the existing motherboard
and power supply.
Storage Device Upgrade
 Reasons
• increase storage space
• increase hard drive speed
• install a second operating system
• store the system swap file
• provide fault tolerance
• backup
Peripheral Upgrade/Power Supply Upgrade
 keyboard and mouse
 Added components may require a need for more power.
Specialized Computer Systems
 Thick and Thin Clients
• Thin clients have little processing power and are designed to act as a terminal
to a server (thick client).
• Thick clients have more powerful CPUs, more memory and their own storage.
They serve as processing stations for thin clients.
 CAx Workstations
• designed to support CAD and CAM applications
• plenty of RAM, fast disks, powerful CPU and special
input devices are common resources.
 Audio and Video Editing Workstations
• common editing workstation resources include
much RAM, fast disks, powerful CPU and
special adapter cards such as audio and video capture.
Specialized Computer Systems (cont.)
 Virtualization Workstations
• These workstations are designed to run virtual computers
• Virtual computers use and share the workstation’s physical resources such as CPU,
memory and disks.
• The selection of physical resources will depend on the number and purpose of the
virtual machines. Powerful CPU and sufficient RAM are suggested.

 Gaming PCs
• Due to high resource requirements of modern games, gaming PCs are very resource
demanding.
• A few requirements of gaming PCs are: top end CPU, lots of
fast RAM, fast disks, high performance input devices and audio
systems.

 Home Theatre PCs


• These computers must be able to play various media formats
and, in some cases, receive TV signals.
• Common HTPC requirements include powerful CPU, fast RAM, large disks,
fast NIC and video card with TV input.
NAS
 Network attached storage (NAS) devices are servers that are
connected to a network to provide file-level data storage to
clients.
 This specialized computer is sometimes single-purposed,
running a stripped-down operating system to perform only the
function of file serving.
 Security is an important.
Procedures to Protect the Environment
 Safety Data Sheet
• Use an SDS to obtain information about a material,
including procedures for proper disposal.
• The SDS contains information on the material’s
composition, how it can affect personal health, fire
hazards, and first-aid requirements.
• It also includes protective measures for the safe
handling and storage of materials and spill, leak, and
disposal procedures.
 Equipment Disposal
• Computer equipment contains hazardous materials and
should be properly disposed.
• Follow regulations to protect the environment and avoid
fines.
• Batteries, monitors, toner kits, cartridges, developers,
chemical solvents and aerosol cans are examples of
equipment that must be properly disposed.
• Older CTRs often retain residual electricity due to
capacitors inside.

You might also like