Top Banner
The Total Solution For A+ Certification Reference The Total Solution To A+ Certification Reference Material Click an item for more information: Chapter 1 – Working With Operating Systems Chapter 10 – Examining Power Chapter 2 – Exploring Control Settings Chapter 11 – Working With Media Chapter 3 – Learning Computer Hardware Basics Chapter 12 – Looking At Communications Chapter 4 – Working With Floppy Drives Chapter 13 – Working With Windows NT Chapter 5 – Working With Hard Drives Chapter 14 – Working With Windows 2000 Chapter 6 – Using Windows 9x Chapter 15 – Networking PCs Chapter 7 – Examining Troubleshooting Chapter 16 – Maintaining A System Chapter 8 – Working With Peripherals Chapter 17 – Building A Computer Chapter 9 – Installing And Managing Memory Chapter 18 – Understanding Customer Service Appendix
1973
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript

The Total Solution For A+ Certification

The Total Solution To A+ Certification Reference MaterialClick an item for more information:

Chapter 1 Working With Operating Systems Chapter 2 Exploring Control Settings Chapter 3 Learning Computer Hardware Basics Chapter 4 Working With Floppy Drives Chapter 5 Working With Hard Drives Chapter 6 Using Windows 9x Chapter 7 Examining Troubleshooting Chapter 8 Working With Peripherals Chapter 9 Installing And Managing Memory

Chapter 10 Examining Power Chapter 11 Working With Media Chapter 12 Looking At Communications Chapter 13 Working With Windows NT Chapter 14 Working With Windows 2000 Chapter 15 Networking PCs Chapter 16 Maintaining A System Chapter 17 Building A Computer Chapter 18 Understanding Customer Service Appendix

Reference

The Total Solution For A+ Certification

Reference

The Total Solution For A+ Certification

Chapter 1 Working With Operating SystemsClick an item for more informationWorking With DOS Working With Windows 9x Working With Windows 2000

Reference

1

The Total Solution For A+ Certification

2

Reference

The Total Solution For A+ Certification

Working With DOSClick an item for more information

1. DOS 2. Advantages And Disadvantages Of DOS 3. Loading And Launching Software In DOS

4. Using DOS Commands 5. The DOS Boot Record 6. Topic Summary

Reference

1

The Total Solution For A+ Certification

DOS DOS (Disk Operating System) was developed by IBM and Microsoft and was the first operating system used by IBM microcomputers. For years, DOS remained the unchallenged standard for operating systems used by IBM PCs and IBM-compatible machines. Most seasoned microcomputer users are comfortable and familiar with DOS. DOS uses a command-driven interface, where you are required to key in command lines to tell the operating system to perform operations.

2

Reference

The Total Solution For A+ Certification Filenames Under DOS

Under DOS, a files name has two parts. The first part, called the filename, contains up to eight characters. The second part, called the file extension, contains up to three characters. When you write the file extension in DOS commands, you separate the extension from the filename with a period. Acceptable file extensions for program files are .com, .bat, and .exe. For example, the WordPerfect program file is named WP.exe. Its filename is WP and its file extension is .exe. With the introduction of Windows 95, long filenames traditionally used only by the Macintosh operating system became available to IBM-compatible PCs. Under Windows 95 and later Windows generations, filenames can be as long as 255 characters and may contain spaces. You must be careful when using long filenames with Windows 9x because Windows 9x still contains a portion of DOS, which can only understand an 8-character filename, 3character extension format. When the DOS part of the system is operating, it will truncate long filenames and assign new 8-character ones.

Reference

3

The Total Solution For A+ Certification Memory Addressing Under DOS

In DOS, memory is divided into different areas. This division of memory began with DOS and later was used by Windows 3.x and Windows 9x. The first versions of DOS could only access the first megabyte of memory (0 to 1024K) addresses. Later, DOS extenders were included with the operating system so that memory above 1024K could be accessed.

Since DOS was only designed to use 1024K of memory addresses and since DOS assumed that only one application or program would be running at a time, DOS gave the running program direct access to the memory addresses and the data in RAM that they pointed to. Also, since the CPU at the time could only process 16 bits of data at one time, DOS was designed to pass segments of data to the CPU only 16 bits at a time. These standards of operation are collectively referred to as real mode, or MSDOS mode.

4

Reference

The Total Solution For A+ Certification

Advantages And Disadvantages Of DOS

Reference

5

The Total Solution For A+ Certification

Loading And Launching Software In DOS The major steps that take place in the process of loading and initializing software are: 1. The operating system receives the command to execute the program. 2. The operating system locates the program file for the program. 3. The operating system loads the program file into memory. 4. The operating system gives control to the program. 5. The program requests memory addresses from the operating system for its data. 6. The program initializes itself and possibly requests that data from secondary storage be loaded into memory. 7. The program turns to the user for its first instruction. If DOS is your operating system, the DOS prompt displays basic information and gives you the opportunity to enter some command for the operating system to perform. Most of the time, DOS is loaded from the hard drive, which is designated with the letter C. It is common for computers to provide a DOS prompt that looks like this when the machine is first turned on: C:\> This prompt is called the C prompt. The DOS prompt (C:\>) displayed immediately after booting means that the operating system was copied from drive C (where the operating system is stored) when the machine was first turned on. As part of the startup process, drive C becomes the default drive and default directory, sometimes called the current drive and directory, which DOS automatically uses to save and retrieve files. Sometimes the operating system is copied from a floppy disk rather than the hard drive. In this case, the default drive and directory will be A:\ or B:\, and the command prompt will be A:\> or B:\>. The > symbol is the prompt symbol that DOS uses to say, Enter your command here. When a hard drive is first formatted for use by an operating system, the format procedure creates a single directory on the drive. A directory is a table on a disk that contains a list of files that are stored on the disk. You can think of a directory as a list of files logically grouped together. When a hard drive is first formatted, the root directory is the only directory that is created. This directory is written in DOS command lines as a single backslash (\) with no other directory name following.

6

Reference

The Total Solution For A+ Certification After the drive is initially formatted, you can create other directories for file lists. These directories are given names and are listed in the root directory. These directories can, in turn, have other directories listed in them. These other directories are sometimes called subdirectories or child directories. A drive with a list of directories pointing to a file is called a path when used in a DOS command.

At the DOS prompt, when you type a single group of letters with no spaces, DOS assumes that you want to execute a program with the filename that you just typed, stored in a program file in the current directory. DOS first attempts to find the program file by that name, then copies the file into RAM, and then it executes the program. A program file executed at the DOS prompt can have one of three file extensions: .com, .exe, or .bat. The first place DOS looks for program files is in the default drive and directory. If DOS doesnt find any of the necessary program files, it stops looking and displays the error message: Bad command or file not found You can give DOS a list of paths in which to look for executable program files beyond the default directory. You give this list of drives and directories to DOS using the PATH command. To see the list of paths that are presently active, type PATH at the DOS prompt, and then press Enter. To enter a new list of paths, type the PATH command followed by each path name, separating one path from the next by a semicolon. 7

Reference

The Total Solution For A+ Certification

Using DOS CommandsDOS commands are divided into two groups: Internal DOS commands are part of the COMMAND.COM program and dont require COMMAND.COM to find and load another program file. External DOS commands are stored as separate program files in the DOS directory. COMMAND.COM must search for and load these program files before the command can be executed.

For more information about DOS commands, type HELP followed by the command name at a DOS prompt, or type the command name followed by /? (slash and a question mark). See also: ATTRIB Command CHKDSK Command COPY Command DEL Or ERASE Command DELTREE Command DISKCOPY Command FORMAT Command

8

Reference

The Total Solution For A+ Certification ATTRIB Command Use the ATTRIB command to unhide all files in the root directory, as follows: C:\> ATTRIB -H *.* You should see the two exposed hidden files if they are there. If they are missing or corrupted, you can use the COPY command to copy them from a disk to the hard drive root directory. (Unhide them on the disk first so COPY can find them.) Once they are on the hard drive, hide them again with this command: C:\> ATTRIB +H IO.SYS Substitute another filename as necessary. You can also use this command: A:\> SYS C: The SYS command copies the two hidden files and COMMAND.COM from the disk to the hard drive. COMMAND.COM must be in the root directory. If COMMAND.COM is missing, you should get the following error message or something similar: Command file not found You will probably find a spare copy in the \DOS directory or \WINDOWS\COMMAND, or you can copy it from your bootable disk. CONFIG.SYS and AUTOEXEC.BAT sometime give error messages when changes are made to them or they accidentally get erased. Keep a backup of these files so that you do not have to remember all the commands listed in them if you have to rebuild. To prevent a user from accidentally erasing COMMAND.COM, CONFIG.SYS, and AUTOEXEC.BAT, you might want to hide these files using the ATTRIB command in DOS or the Properties sheet in Windows 95. You also can make them read-only files using this version of ATTRIB: ATTRIB +R COMMAND.COM See also: FORMAT Command LABEL Command RECOVER Command SCANDISK Command SYS Command UNDELETE Command XCOPY Command

Reference

9

The Total Solution For A+ Certification FORMAT Command The external FORMAT command prepares a disk for use. If the drive is not specified, the command uses the default drive. The switches for the FORMAT command are outlined in the following table: FORMAT Command Switches

10

Reference

The Total Solution For A+ Certification LABEL Command The LABEL command changes the volume label or electronic name on a disk. The volume label is stored at the beginning of the root directory and also in the master boot record. The label is displayed at the top of the directory list that is produced by the DIR command. The label can be up to 11 characters long and can contain spaces.

Reference

11

The Total Solution For A+ Certification CHKDSK Command The CHKDSK command creates a status report of a disk, and it can repair lost clusters in the FAT. If you do not specify a drive, DOS uses the default drive. CHKDSK: Examines the directory, looking at the starting cluster number and the size of each file, and compares that information to the FAT. Checks that the FAT contains the correct number of entries for each file and that there is an end-of-file marker at the end of the chain. The /F switch tells CHKDSK to fix lost clusters, converting them to files that are stored in the root directory under the name FILE0000.CHK (or a higher number). The /V switch displays a list of files as it checks the directory and the FAT.

CHKDSK has two switches:

If CHKDSK finds entries in the FAT that dont belong to a chain, or if an entry in the FAT is in more than one chain, CHKDSK reports lost allocation units or cross-linked chains. DO NOT use CHKDSK on a hard drive if files are open. The command will mistake these open files as being lost clusters or lost file allocation units.

12

Reference

The Total Solution For A+ Certification SCANDISK Command SCANDISK is a utility in later versions of DOS that is an improvement over CHKDSK. SCANDISK checks for lost and cross-linked clusters as well as defragments the drive and does a surface scan for bad sectors. If you dont specify a drive, SCANDISK scans the current drive for errors. Options of the SCANDISK command are as follows: Use the /FRAGMENT option to defragment files on the drive. Use /UNDO to undo the last changes that SCANDISK made. Use /CHECKONLY to list the errors that SCANDISK finds without making any changes. Use /SURFACE to scan the drive for bad sectors.

There is a SCANDISK.INI file in the DOS directory that you can use to customize the SCANDISK utility.

Reference

13

The Total Solution For A+ Certification DEL Or ERASE Command The DEL or ERASE command erases files or groups of files. For example, if the default directory is A:\DOCS: To erase all the files in the C:\TEST directory, use the following command: ERASE C:\TEST *.* To erase all the files in the current default directory, use the following command: ERASE *.* To erase the file named MYFILE.TXT in the current directory, use the following command: ERASE MYFILE.TXT

See also: DOS Wildcards

14

Reference

The Total Solution For A+ Certification UNDELETE Command Use the UNDELETE command in later versions of DOS to try to recover deleted files. The following are some variations of the UNDELETE command: To undelete all files in the current directory: UNDELETE *.* To undelete the file TEST.TXT in the current directory: UNDELETE TEST.TXT To list the files that can be undeleted without actually undeleting them, use the following command: A:\UNDELETE /list To recover deleted files without prompting for confirmation on each file, use the following command: A:\UNDELETE /all The first character of the filename in the root directory is overwritten with the character s, which has the hex value E5. All entries in the FAT for this file are replaced with 00s.

When DOS deletes a file from a disk or hard drive, it does so as follows:

When you issue the DOS UNDELETE command, DOS looks for an entry in the root directory matching the filename and replaces the first character of the filename in the root directory. From the root directory, DOS can read the starting cluster of the file and the size of the file. If the file is not too fragmented and the disk is otherwise healthy, DOS can locate the sectors belonging to the file and reconstruct the FAT.

Reference

15

The Total Solution For A+ Certification RECOVER Command The RECOVER command might mark clusters as bad in the FAT. Data that might have been saved by other methods can sometimes be destroyed by the RECOVER command. Dont use this command without first making a DISKCOPY of the disk. The RECOVER command attempts to recover a file from damaged sectors on a disk. Always specify the drive, path, and filename of the file you want to recover with the RECOVER command. If you have several files that need recovering, use the command on one file at a time. Sometimes the RECOVER command actually destroys data that might have been recovered by some other method. As with CHKDSK, the file created by RECOVER might need to be renamed so that its application recognizes it. To recover the file named MYFILE.TXT, use the following command: RECOVER MYFILE.TXT Whatever portion of the file that the RECOVER command can read is stored in the root directory and named A:FILE0000.REC (or a higher number). Copy this file to another disk before trying to recover the next file. There are applications like Norton Disk Doctor and PC Tools that do a better job than RECOVER of recovering damaged files.

16

Reference

The Total Solution For A+ Certification DISKCOPY Command The DISKCOPY command makes an exact duplicate (sector by sector) of one disk (called the source disk) to another disk of the same size and type (called the target disk). To duplicate a disk using only a single drive, use the following command: DISKCOPY A: A: DOS prompts you as many times as necessary to insert the source disk and then insert the target disk to make the exact copy. Data is copied from one disk to the other byte by byte, including any hidden files, bad sectors, fragmented files, or other contents. For this reason, the copy can be bad if the source disk has some bad sectors. DISKCOPY ignores sectors marked as bad in the FAT and copies to them anyway. The DISKCOPY command copies formatting information, so the target disk does not need to be formatted before executing the copy.

Reference

17

The Total Solution For A+ Certification COPY Command The COPY command copies a single file or group of files. The original files are not altered. When using the COPY command, use the following: To copy a file from one drive to another, use the following command: COPY drive:\path\filename.ext drive:\path\filename.ext The drive, path, and filename of the original source file immediately follows the COPY command, and the drive, path, and filename of the destination file follows the source filename. If you do not specify the filename of the destination file, DOS assigns the original name of the file. If you omit the drive or path of the source or the destination, then DOS uses the current default drive and path. DOS will always use the default drive and path if you dont enter another one. To copy the file MYFILE.TXT from the root directory on drive C to the current directory on drive A, use the following command: COPY C:\MYFILE.TXT A: To copy all files in the C:\DOCS directory to the disk in drive A, use the following command: COPY C:\DOCS\*.* A: To make a backup file named SYSTEM.BAK of the SYSTEM.INI file in the \WINDOWS directory of the hard drive, use the following command: COPY SYSTEM.INI SYSTEM.BAK If you use COPY to duplicate multiple files, the files are assigned the names of the original files.

18

Reference

The Total Solution For A+ Certification XCOPY Command XCOPY is more powerful than the COPY command. It follows the same general command-source-destination format of the COPY command, but it offers several options. To copy all files in the C:\DOCS directory as well as all subdirectories under the directory and their files to the A: drive, use the /S switch with XCOPY. XCOPY C:\DOCS\*.* A: /S To copy all files in the C:\DOCS directory created or modified after 3/14/98 to the A: drive, use the following command: XCOPY C:\DOCS\*.* A: /d:03/14/98

Reference

19

The Total Solution For A+ Certification DELTREE Command DELTREE deletes the directory you specify and all of its subdirectories and all files in all subdirectories. Use it with caution! DELTREE [drive:]path

20

Reference

The Total Solution For A+ Certification SYS Command Use the SYS command to add IO.SYS, MSDOS.SYS, and COMMAND.COM to a disk to make it bootable. To make a disk in drive A bootable, use the following command. SYS A:

Reference

21

The Total Solution For A+ Certification

The DOS Boot RecordTo make a disk bootable, certain parts of the operating system must be present. For DOS, this is the two hidden files, IO.SYS and MSDOS.SYS, and COMMAND.COM. These files can be loaded on the disk when it is formatted, or they can be loaded with the SYS command. When Windows 95 creates a system disk, it copies these three files to the disk to make the disk bootable. All DOS boot records, however, are the same whether or not the disk is bootable. When the PC is looking for a bootable disk during POST, if a disk is in the drive, the program stored in the DOS boot record is executed. This program loads the startup files of the operating system. The boot record contains the names of the two hidden files. For example, for IBM DOS 3.3, the filenames of the hidden files are IBMBIO.COM and IBMDOS.COM. The program looks for these two files on the disk. If it does not find them, a message appears, such as the following: Non-system disk or disk error...Replace and strike any key when ready...Disk boot failure. POST terminates until the user intervenes. Only the program in the DOS boot record can determine if the disk is bootable.

See also: Bootable Disk For DOS

22

Reference

The Total Solution For A+ Certification Bootable Disk For DOS For DOS, make a bootable disk using the same version of DOS that is on your hard drive. Use this command: C:\> FORMAT A:/S The /S option tells DOS to copy to the disk the files needed to load DOS from this disk. On the disk will be a small boot record that identifies the layout of the disk and the names of the two DOS hidden files. This command also puts the two hidden files and COMMAND.COM on the disk. Its important that the boot disk has the same version of DOS that is on your hard drive. By being consistent with versions, once youre booted you can use some of DOS loaded from the disk and some DOS program files on the hard drive without DOS displaying error messages about using different versions of DOS. Use the VER command at the DOS prompt to display the current version of DOS. You can also add some DOS utility commands to the disk so that it can serve as a rescue disk if needed. In addition to the boot files, copy these files to the disk: ATTRIB.EXE CHKDSK.EXE EDIT.COM (which may also require QBASIC.EXE if you are using an older version of DOS) FDISK.EXE FORMAT.COM MSCDEX.EXE SCANDISK.EXE SYS.COM DEFRAG.EXE HIMEM.SYS UNDELETE.EXE

Reference

23

The Total Solution For A+ Certification DOS Wildcards DOS allows you to use wildcard characters to manage several files or directories at one time: Asterisk (*) stands for any character and any number of characters. Question mark (?) stands for one character at a time. To refer to all files with any name or extension, you would use *.* To refer to all files that have a two-character extension, you would use *.?? To refer to all files that have a five-character name and any extension, you would use ?????.*

For example:

24

Reference

The Total Solution For A+ Certification

Topic SummaryAfter finishing this topic, you should be able to answer the following questions: 1. What does the DOS message Incorrect DOS version mean? 2. What are the two DOS commands to make a bootable floppy disk? 3. What DOS command checks both disk and RAM? 4. Give the complete DOS command to fix lost clusters. 5. What DOS command can be used to unerase a deleted file? 6. Give the complete COPY command to make a second copy of AUTOEXEC.BAT called AUTOEXEC.JAN. 7. What does the DOS wildcard * refer to? 8. What does the DOS boot record do? 9. How does the XCOPY command differ from the COPY command? 10. What are two advantages of DOS? 11. What are two disadvantages of DOS?

Reference

25

The Total Solution For A+ Certification

Defragment

Defragmenting rewrites a file to a disk in one continuous chain, thus speeding up data retrieval.

26

Reference

The Total Solution For A+ Certification

External DOS Command

An external DOS command is a separate program usually stored in the DOS directory. FORMAT, BACKUP, and FDISK are examples.

Reference

27

The Total Solution For A+ Certification

Internal DOS Command

An internal DOS command is not a separate program and is always available to the user. DIR, COPY, and TYPE are examples.

28

Reference

The Total Solution For A+ Certification

Switch

Switches are usually one or more letters or numbers that alter the default mode of a DOS command. Enter them after the command, preceded by a forward slash (/).

Reference

29

The Total Solution For A+ Certification Filename The filename is the first part of the name assigned to a file. In DOS, the filename can be no more than eight characters long and is followed by the file extension. File Extension The file extension is a three-character portion of the name of a file that is used to identify the file type. The file extension follows the filename under DOS naming conventions. Default Drive The default drive is the drive that DOS automatically uses to save and retrieve files. Default Directory The default directory is the directory that DOS automatically uses to save and retrieve files. Directory A directory is an operating system table that contains file information such as name, size, time and date of last modification, and the cluster number of the files beginning location. Root Directory The root directory is the main directory created when a hard drive or disk is first formatted. Subdirectories In DOS, subdirectories are directories that are contained within another directory. Also called a child directory. Child Directories See Subdirectories. Path A path is the drive and list of directories pointing to a file. Real Mode Real mode is a single-tasking operating mode whereby a program only has 1024K of memory addresses, has direct access to RAM, and uses a 16-bit data path.

30

Reference

The Total Solution For A+ Certification

Working With Windows 9xClick an item for more information1. Looking At Operating Systems 2. Comparing Windows 9x, Windows 3.x, And DOS 3. Windows 9x Core Components 4. Customizing The Desktop 5. Microsoft Windows 9x Startup Menu 6. Plug-and-Play And Hardware Installations 7. Topic Summary

Reference

1

The Total Solution For A+ Certification

Looking At Operating SystemsOperating systems continue to evolve as hardware and software technologies improve. If you look at several operating systems, you will see the evolution process from DOS to DOS with Windows 3.x, to Windows 9x. To understand these gradual improvements in operating systems, you need to understand the following terms: Multitasking, as it applies to hardware, refers to the ability of a CPU to do more than one thing at a time. The first CPU for microcomputers with this ability was the Pentium by Intel. The older i386 and i486 CPUs could do only one thing at a time (80386 and 80486 CPUs are often abbreviated as i386 and i486 in documentation; the i stands for the chip manufacturer, Intel). Earlier operating systems did not need to support multitasking; newer operating systems now need to support some form of multitasking. Cooperative multitasking, sometimes called task switching, is not true multitasking, in that the CPU is only doing one thing at a time. The CPU is switching back and forth between applications so that more than one application can be loaded at the same time. There is only one active application and one or more inactive applications sitting in the background waiting for the active application to relinquish control. Youve observed cooperative multitasking if youve ever had two applications open, each in its own window. You dont need to close one application before opening another. DOS does not handle cooperative multitasking, but Windows does. Preemptive multitasking is another type of pseudo-multitasking whereby the operating system allots CPU time to an application for a specified period, and then preempts the processing to give the CPU to another application. The end result is that the computer appears to be doing true multitasking. Environment refers to the type of support the operating system provides to the applications software. For example, in order for applications software to offer you a window with mouse movement, buttons to click, and icons to view, a GUI environment, such as Windows, must support it. Such an application is said to need a GUI environment to work. Another example is the DOS environment that offers to its applications software only a single-tasking environment. The software does not expect another applications software package to be running concurrently with it. There is a unique situation with Windows 3.x. Its not really an operating system, but neither does it act like normal applications software. Windows 3.x provides an operating environment, which refers to the overall support that it provides to applications software, including cooperative multitasking and a GUI (which DOS does not offer). Windows 3.x is the middleman that manages this pseudomultitasking environment by passing tasks to DOS one at a time. DOS manages its single-tasking environment and relates to the hardware in single-task fashion. Windows provides the cooperative multitasking environment to the applications.

2

Reference

The Total Solution For A+ Certification

Comparing Windows 9x, Windows 3.x, And DOSIn the following figure, you see that Windows 9x is an operating system that bridges two worlds.

DOS/Windows 3.x is a 16-bit world with memory management centered on conventional, upper, and extended memory limitations. Windows 9x still has a DOS-based core, still uses many 16-bit programs, and must manage base, upper, and extended memory in basically the same way as DOS does. However, Windows 95 introduced 32-bit programming, dynamically loaded device drivers, memory paging, networking, and many other features available in Windows NT and Windows 2000. Windows 9x claims to be completely backward compatible with older software and hardware designed to work in a DOS and Windows 3.x environment. Windows 9x uses cooperative multitasking when supporting 16-bit applications and preemptive multitasking when supporting 32-bit applications. Windows NT is the break with the past. It does not claim total backward compatibility because it is a freshly designed operating system with new ways of managing software and hardware resources. Software written for DOS or Windows 3.x might not work in Windows NT because the methods and rules have changed. While Windows 95 and Windows 98 are actual operating systems, Windows 3.x is just a GUI, or graphical user interface, used as a user-friendly intermediate program between DOS and the user.

See also: 16-bit And 32-bit Programming Virtual Machines

Reference

3

The Total Solution For A+ Certification 16-bit And 32-bit Programming DOS is a 16-bit operating system. All portions of the operating system are written using 16-bit code, and DOS will only support 16-bit drivers and 16-bit application programs. Windows 9x contains some 16-bit code and some 32-bit code. Programs written in 32-bit code require more memory and are generally faster than programs written in 16-bit code. The programming that supports VFAT in Windows 9x is written with 32-bit code. Windows 9x is a hybrid between 16-bit and 32-bit code. Although Windows 9x supports 16-bit device drivers, the preference is to use the 32-bit drivers supplied with Windows 9x, for three main reasons. They are generally much faster, and 32-bit drivers can be stored in extended memory, releasing more of the first megabyte of memory to application programs. Also, 32-bit drivers can be dynamically loaded, meaning that they are loaded into memory when they are needed and then removed when not needed, thus conserving memory. In contrast, 16-bit drivers must be stored in conventional or upper memory. When Windows 9x is installed over DOS, it searches for these 16-bit drivers and replaces them with the 32-bit drivers if it can.

4

Reference

The Total Solution For A+ Certification Comparing Windows 95 And Windows 98 Windows 95 and Windows 98 (collectively referred to as Windows 9x) take us two steps closer to a new operating system but do not completely eliminate DOS. Windows 95 is the marriage of Windows for Workgroups (Windows 3.11) with an updated version of DOS sometimes known as DOS 7.0, together with some completely new additions and improvements to the operating system. Windows 95 also introduced an improved and more automated method of installing new hardware devices, called Plug-and-Play. Windows 98 made several improvements on Windows 95 but is fundamentally the same operating system. Windows 98 offers additional support for larger hard drives and more hardware devices, includes more software utilities, and is faster than Windows 95. The underlying DOS portion of Windows 98 is named DOS 7.1. Microsoft has announced that Windows 98 will be the last operating system it distributes that has a DOS foundation. Currently, there have been three editions of Windows 98 released. The first two are Windows 98 and Windows 98 SE (Second Edition). The third edition is Windows Me (Millennium Edition). The following table summarizes the advantages and disadvantages of Windows 9x.

Reference

5

The Total Solution For A+ Certification

Windows 9x Core Components The three core portions of the Windows 9x operating system are: KERNEL USER GDI

In the following figure, you can see that the basic Windows 9x core component, the KERNEL, uses mostly 32-bit code. The 16-bit code is only retained as entry points into the KERNEL from 16-bit application programs. The USER portion uses mostly 16-bit code, primarily because it uses less memory than the 32-bit equivalent and does not have a need for significant speed. The GDI uses a mix of 16-bit and 32-bit code in order to maintain compatibility with 16-bit application programs.

See also: Windows 9x Core Files And Functions

6

Reference

The Total Solution For A+ Certification Windows 9x Core Files And Functions The locations and purposes of each of the three Windows 9x components are listed in the following table.

Reference

7

The Total Solution For A+ Certification Virtual Machines Windows 9x uses virtual machines. Think of virtual machines (VM) as several logical machines within one physical machine, similar in concept to several logical drives within one physical hard drive. DOS programs dont share resources. A DOS program expects to control the hardware and memory of the entire PC. If a DOS program begins to use memory addresses not assigned to it, errors occur in a multitasking environment. Windows 9x provides the DOS program with its own logical machine. In effect, the application program says, I want all of memory and all of this and all of that. Windows 9x says, OK, here they are, and gives the program its own PC, including all the virtual memory addresses it wants from 0 to 4 GB, as well as its own virtual hardware. As far as the DOS program is concerned, it can go anywhere and do anything within its own PC. Thats why it can be called a virtual machine. The DOS application program does not try to communicate with another application program or access the data of another program because it thinks there are no other programs. One important result of running DOS programs in their individual virtual machines is that, when a program makes an error, the virtual machine it is using locks up, but the rest of the actual PC is isolated from the problem. As shown in the following figure, the System Virtual Machine can support 32-bit and 16-bit Windows application programs, but DOS programs are put aside into their own virtual machines.

Windows 16-bit applications make some of the same mistakes that DOS programs do and can cause the system to lock up. However, they also sometimes expect to be able to access other programs and their data. The 16-bit Windows programs dont expect to control the hardware directly, and are content to route their requests to Windows. Windows 9x places these programs within the system VM because they communicate with hardware through the operating system, but Windows 9x puts these programs together in their own memory space so they can share memory addresses.

8

Reference

The Total Solution For A+ Certification The result of this arrangement is that, when a 16-bit Windows program causes an error, it can disturb other 16-bit programs, causing them to fail, but it does not disturb DOS programs in their own VM or 32-bit programs that dont share their virtual memory addresses.

Reference

9

The Total Solution For A+ Certification

Customizing The Desktop A shortcut on the Desktop is an icon that points to a program that can be executed. The user double-clicks on the icon to load the software. To create a shortcut, use the Properties option on the Taskbar. Right-click on the Taskbar and select Properties from the menu that appears. The Taskbar Properties sheet appears.

10

Reference

The Total Solution For A+ Certification

Microsoft Windows 9x Startup Menu You can get this menu at any time by pressing F8 when the message Starting Windows 9x displays during the boot process. The Microsoft Windows 9x Startup Menu options are: 1. Normal 2. Logged (\BOOTLOG.TXT) 3. Safe mode 4. Safe mode with network support 5. Step-by-step confirmation 6. Command prompt only 7. Safe mode command prompt only 8. Previous version of MS-DOS What to expect when you select each option on the menu is described in the links below. See also: Normal Logged (\BOOTLOG.TXT) Safe Mode Safe Mode With Network Support Step-by-step Confirmation Command Prompt Only Safe Mode Command Prompt Only Previous Version Of MS-DOS

Reference

11

The Total Solution For A+ Certification Normal If BootGUI=1, then this option starts Windows 9x. If BootGUI=0, then this option will boot to the DOS 7.0 or DOS 7.1 prompt. Either way, the commands in AUTOEXEC.BAT and CONFIG.SYS are executed.

12

Reference

The Total Solution For A+ Certification Logged (\BOOTLOG.TXT) This option is the same as choosing Normal, except that Windows 9x tracks the load and startup activities and logs them to this file. This file can be a helpful tool when troubleshooting.

Reference

13

The Total Solution For A+ Certification Safe Mode On the Startup Menu, Safe mode is an option. Safe mode starts Windows 9x with a minimum and default configuration to give you an opportunity to correct an error in the configuration. Windows 98 includes support for networks, but Windows 95 does not. For example, if you selected a video driver that is incompatible with your system, when Windows 9x starts, it detects the problem and enters Safe mode with a standard VGA driver selected. You can then go to Device Manager, select the correct driver, and restart Windows.

From the Startup Menu, you can choose to enter Safe mode yourself if you know of a problem that you want to correct. For example, if you had previously selected a group of background and foreground colors that makes it impossible to read the screens, you can reboot and choose Safe mode. Safe mode gives you the standard color scheme along with the VGA mode. Go to Display Properties, make the necessary corrections, and reboot.

In Safe mode, the commands in AUTOEXEC.BAT and CONFIG.SYS are not executed. You can also go to Safe mode by pressing F5 when the message Starting Windows 9x displays.

14

Reference

The Total Solution For A+ Certification Safe Mode With Network Support This option allows access to the network when booting into Safe mode. It is useful if Windows 95 is stored on a network server and you need to download changes to your PC in Safe mode. This option is not available in Windows 98.

Reference

15

The Total Solution For A+ Certification Step-by-step Confirmation The option asks for confirmation before executing each command in IO.SYS, CONFIG.SYS, and AUTOEXEC.BAT. You can accomplish the same thing by pressing Shift-F8 when the message Starting Windows 9x displays.

16

Reference

The Total Solution For A+ Certification Command Prompt Only This option executes the contents of AUTOEXEC.BAT and CONFIG.SYS, but doesnt start Windows 9x. You will be given a DOS prompt. Type WIN to load Windows 9x.

Reference

17

The Total Solution For A+ Certification Safe Mode Command Prompt Only This option does not execute the commands in AUTOEXEC.BAT or CONFIG.SYS. You will be given a DOS prompt.

18

Reference

The Total Solution For A+ Certification Previous Version Of MS-DOS This option loads a previous version of DOS if one is present. You can get the same results by pressing F4 when the message Starting Windows 9x displays. This option is not available in Windows 98 SE.

Reference

19

The Total Solution For A+ Certification

Plug-and-Play And Hardware Installations Plug-and-Play (PnP) is a set of design specifications for both hardware and software that work toward effortless hardware installations. For a system to be truly Plug-andPlay, it must meet three criteria: The System BIOS must be PnP. All hardware devices and expansion cards must be PnP-compliant. The operating system must be Windows 9x or another operating system that supports PnP. A 32-bit device driver (VxD) must be available (provided by the device manufacturer or Windows).

If all these things are true and you have the latest 32-bit drivers, hardware installation should be very easy and is only a matter of installing the new hardware device, turning on the PC, and perhaps providing the 32-bit driver, if it is not included with Windows 9x. During the boot process, Windows 9x surveys the devices and their needs for resources and allocates resources to each device. Windows 9x is free to assign these resources to the devices and avoids assigning the same resource to two devices. For PnP to work, each device in the system must be able to use whatever resources the operating system assigns to it.

See Also: How Plug-And-Play Works

20

Reference

The Total Solution For A+ Certification How Plug-And-Play Works A Plug-and-Play operating system like Windows 9x provides two main services: resource management and runtime configuration. Resource management occurs at startup as system resources are allocated to devices. Runtime configuration is an ongoing process that monitors any changes in system devices, such as the removal of a PC Card on a notebook or docking and undocking a notebook to and from a docking station. The BIOS must be able to recognize these changes during operating system runtime (any time the operating system is running) and communicate them to the operating system. Windows 9x uses four components in implementing PnP architecture: The configuration manager controls the configuration process of all devices and communicates these configurations to the devices. The hardware tree is a database built each time Windows 9x starts up that contains a list of installed components and the resources they use. The bus enumerator locates all devices on a particular bus and inventories the resource requirements for these devices. The resource arbitrator decides which resources get assigned to which devices.

When Windows 9x is started, if the systemboard BIOS is PnP, the configuration manager starts the PnP process by receiving the list of devices from the BIOS. If the BIOS is not PnP, the bus enumerator for each bus on the system provides the information to the configuration manager. The configuration manager oversees the process of assigning resources by loading one device driver after another for each installed device, and instructing the driver to wait until resources have been assigned to it. The configuration manager performs a process of examining and reexamining required resources until it determines an acceptable configuration of all resources and devices. For example, for ISA devices, according to the PnP standards, each device has a unique 72-bit ID derived from the manufacturer ID, a product ID, and a serial number. Each ISA device competes for resources, and the device with the largestvalue ID is assigned resources first. The bus enumerator manages this process and receives the resource assignments from the configuration manager. The configuration manager interacts with the resource arbitrator, allowing the arbitrator to determine what resources are assigned, and then receives that information from the arbitrator, passing it on to the bus enumerator. The bus enumerators collectively build the hardware tree, which is stored in memory. Information to build the hardware tree comes from the configuration at the current moment as well as from information kept in the registry about devices that have been installed, including what device drivers are used to operate the device and userdefined settings for the device. The hardware tree is built each time Windows 9x is started, and is dynamically changed as hardware is plugged and unplugged while the system is running.

Reference

21

The Total Solution For A+ Certification

Topic Summary Windows 9x, Windows 2000, and Windows NT are the most popular operating systems for new single-user PCs, although DOS and Windows 3.x are still used and supported. Files with an *.INI extension are organized into sections, key names, and values and can be edited using a text editor. Lines in *.INI files that begin with a semicolon are comments and ignored by the operating system. Application software conflicts can occur if more than one application program uses the same *.DLL file stored in the Windows/system directory. Utility software can track changes to the Windows/system directory, as well as changes to Windows *.INI files and the registry during software installation. Windows 3.x is mostly a 16-bit application, whereas Windows 9x is a mixture of 16bit and 32-bit code. The core components of Windows 9x are the kernel, the user, and the GDI processes. Windows 9x, as well as Windows NT and Windows 2000, uses the virtual machine concept to protect against program faults from other software currently running. Press F8 when Windows 9x is loading to view and use the Windows 9x Startup Menu, which can be helpful in troubleshooting Windows problems. The Windows 9x registry keeps information that was previously kept in Windows 3.x *.INI files. The Windows 9x registry uses six major branches or keys.

22

Reference

The Total Solution For A+ Certification

16-Bit Operating System

A 16-bit operating system allows information to be transferred at a rate of 16 bits at a time.

Reference

23

The Total Solution For A+ Certification

32-Bit FAT

A 32-bit FAT (file allocation table) enables the operating system to accommodate filenames of up to 256 characters.

24

Reference

The Total Solution For A+ Certification

Shortcut

A shortcut is an icon that points to a program or document existing elsewhere on the system. Double-clicking the icon will launch the program or open the appropriate folder or window.

Reference

25

The Total Solution For A+ Certification

Resource Management

Resource management is the Plug-andPlay process of allocating resources to devices at startup.

26

Reference

The Total Solution For A+ Certification

Runtime Configuration

Runtime configuration is a Plug-and-Play ongoing process that monitors changes in system devices, such as the removal of a PC Card on a notebook computer or the docking of a notebook computer to a docking station.

Reference

27

The Total Solution For A+ Certification

Configuration Manager

The configuration manager is a Windows 9x Plug-and-Play component that controls the configuration process of all devices and communicates these configurations to the devices.

28

Reference

The Total Solution For A+ Certification

Hardware Tree

A hardware tree is a database that contains a list of installed components and the resources they use. It is built each time Windows 9x starts up

Reference

29

The Total Solution For A+ Certification

Bus Enumerator

A bus enumerator is a component of Windows 9x Plug-and-Play that locates all devices on a particular bus and inventories the resource requirements for these devices.

30

Reference

The Total Solution For A+ Certification

Resource Arbitrator

A resource arbitrator is a Plug-and-Play component that decides which resources are assigned to which devices.

Reference

31

The Total Solution For A+ Certification

32

Reference

The Total Solution For A+ Certification

Working With Windows 2000Click an item for more information1. The Windows 2000 Suite Of Operating Systems 2. Advantages And Disadvantages Of Windows 2000 3. Comparing Windows 2000 To Windows 98 4. Comparing Windows 2000 And Windows NT 5. Windows 2000 For Notebook Computers 6. Topic Summary

Reference

1

The Total Solution For A+ Certification

The Windows 2000 Suite Of Operating Systems Windows 2000 is actually a suite of operating systems, each designed for a different sized computer system. Windows 2000 is built on the Windows NT architecture and is designed to ultimately replace both Windows 9x for low-end systems and Windows NT for midrange and high-end systems. Windows 2000 includes four operating systems: o Windows 2000 Professional: This operating system is designed to ultimately replace both Windows 9x and Windows NT Workstation as a personal computer desktop or notebook operating system. It is an improved version of Windows NT Workstation, using the same new technology approach to hardware and software, and includes all the popular features of Windows 9x, including Plug-and-Play. o Windows 2000 Server: This operating system is the improved version of Windows NT Server and is designed as a network operating system for low-end servers. o Windows 2000 Advanced Server: This network operating system has the same features as Windows 2000 Server, but is designed to run on more powerful servers. It supports up to eight processors on one machine, and up to 8 GB (gigabytes) of memory. o Windows 2000 Datacenter Server: This network operating system is another step up from Windows 2000 Advanced Server and is designed to support up to 32 processors and up to 64 GB of memory. It is intended to be used in large enterprise operations centers. The following table shows the maximum number of CPUs supported in a single system and the maximum amount of memory supported by the four operating systems. Hardware and software must qualify for all the Windows 2000 products just as they must qualify for Windows NT.

Windows 2000 also has built-in disk duplication support so that you can copy the operating system from one hard drive to another with a minimum of interaction.

2

Reference

The Total Solution For A+ Certification

Advantages And Disadvantages Of Windows 2000The following table summarizes the advantages and disadvantages of Windows 2000.

Reference

3

The Total Solution For A+ Certification

Comparing Windows 2000 To Windows 98 Unlike Windows 98, which is a combination of 16-bit and 32-bit operating systems, Windows 2000 is a true 32-bit operating system. Windows 2000 supports true multithreading and isolates 32-bit applications in different processes so that one bad application cannot hang the entire system. Drivers and Windows system files under Windows 2000 are protected from being altered by applications and users, which prevents corruption and improves system reliability. By contrast, Windows 98 does not always ask for your permission before allowing an application to alter or overwrite a critical system file. Windows 2000 has some new tools to help application developers build installation disks for their products and troubleshoot application problems. Windows 2000 and Windows 98 use Advanced Configuration and Power Interface (ACPI), which enables a computer to power down unused devices to conserve power, and gives the user much more control over power to the system. The Windows 2000 features for ACPI are improved over those of Windows 98. Both require the cooperation of ACPI-compliant system BIOS. For example, on a PC with ACPI BIOS, to set the Power Options of Windows 2000, open the Control Panel. Double-click the Power Options icon. The Power Options Properties dialog box opens. Click the Advanced tab. From the list of power options, select what will happen when you press the power button on your computer case. For example, you can set the computer to change to Standby mode when you press the power button. On the Hibernate tab, you can also control when and how the system goes into hibernation. On the UPS tab, you can control and monitor an intelligent UPS device, if one is attached. ACPI specifications were developed by Compaq, Intel, Microsoft, Phoenix, and Toshiba to allow for reliable power management through hardware and software cooperation. Notice in the following figure that the Network and Dial-Up Connections and Scheduled Tasks icons are in the Windows 2000 Control Panel rather than in the My Computer window of Windows 98. This is a much more logical place to put them because they control system resources.

4

Reference

The Total Solution For A+ Certification

Also, in Windows 2000, Network Neighborhood is replaced by My Network Places.

Reference

5

The Total Solution For A+ Certification

Comparing Windows 2000 And Windows NT The Windows 2000 registry is organized and edited the same way as the Windows NT registry. Windows 2000 Help and Troubleshooter utilities are much more comprehensive than the Windows NT or Windows 98 utilities. Windows 2000 supports multiple monitors, IEEE 1394 (FireWire), USB, and ACPI. Network Neighborhood is replaced by My Network Places, which intelligently shows recently visited network resources and lets you assign user-friendly names to these resources. Windows NT does not support Plug-and-Play, but Windows 2000 uses an advanced version of Plug-and-Play that does all the work for configuring a system and does not use the Plug-and-Play programs in system BIOS. Also new to Windows 2000 is Active Directory, a service that allows for a single point of administration for all shared resources on a network. It can track the location of files; peripheral devices, including printers; scanners, and other hardware; databases; Web sites; users; services; and so forth. It uses a locating method similar to that used by the Internet. A Windows NT client/server network has one primary domain controller and may have one or more backup domain controllers. A Windows NT network can have no more than one primary domain controller, which maintains the only copy of the directory database that can be edited. With Windows 2000, a network can have any number of domain controllers, each keeping a copy of the directory that can be edited, as shown in the following figure. An administrator can update the directory on any one of these domain controllers, which will then communicate the change to the other domain controllers on the network.

6

Reference

The Total Solution For A+ Certification

When both Windows NT and Windows 2000 domain controllers are on the same network, conflicts can result because of the differences in the way the domain controllers work. For this reason, Windows 2000 runs in two modes, mixed mode and native mode. Native mode is used when no Windows NT domain controllers are present, and mixed mode is used when there is at least one Windows NT domain controller on the network. Mixed mode is necessary in a situation where a large network is being upgraded from Windows NT to Windows 2000, and some servers have received the upgrade but others have not. Windows 2000 includes several new diagnostic and recovery tools, including Recovery Console, Safe Mode, and File Protection. For backups, Windows NT provides a backup utility to tape only, but Windows 2000 allows backups to tape, Zip drives, recordable CD-ROMs, and external hard drives. Windows 2000 uses the Internet Printing Protocol (IPP), so users can print directly to a printers URL anywhere on the Internet. Another feature new to Windows 2000 is Encrypting File System (EFS). EFS can only be used with the NTFS file system, and uses a public key encryption method to encrypt files and folders. Public key encryption requires a public key installed on the computer doing the encryption and a private key on the computer decrypting the files. If the files are encrypted and then decrypted on the same computer, the computer must have both the public and private key. A public or private key is binary data stored in the Windows Registry that belongs to a single user; its the users responsibility to protect a key.

Reference

7

The Total Solution For A+ Certification To encrypt a folder or file, using Windows Explorer, right-click the file or folder name and select Properties from the shortcut menu. Select the General tab and click the Advanced button. Select Encrypt contents to secure data.

8

Reference

The Total Solution For A+ Certification

Windows 2000 For Notebook Computers The following features are available for notebook computers using Windows 2000, but are not a part of Windows 98: o A feature called Offline Files and Folders allows you to download files and folders from a network to the PC so you can work on them offline. When the PC is later connected to the network, the files and folders can be uploaded to the network so that any changes are kept current on the network. o The technology is included in Windows 2000 to allow a notebook to connect to a Virtual Private Network (VPN) so that a user can work from home and connect to the corporate network over the Internet in a secure connection. To do this, Windows 2000 encrypts data before it is transmitted over the Internet using Point-to-Point Tunneling Protocol (PPTP), Layer Two Tunneling Protocol (L2TP), and Internet Protocol security (IPSec). o The power management features of Windows 2000 are enhanced and improved over those of Windows 98. Windows 2000 Professional is designed as a Desktop computer operating system for a large network in a corporate or educational environment. Windows 98 is best used on a PC in a home or on a small network. Finally, for a notebook computer, Windows 2000 is the best choice.

Reference

9

The Total Solution For A+ Certification

Topic Summary Windows 2000 is the next evolution of Windows NT with the added user-friendly features of Windows 98. Windows 2000 is a suite of four operating systems, each designed for a different size computer system. The suite includes Windows 2000 Professional, Windows 2000 Server, Windows 2000 Advanced Server, and Windows 2000 Datacenter Server. Windows 2000 Professional is designed for the corporate desktop computer and provides more security and reliability than Windows 98 and has added support for large hard drives. The minimum requirements for Windows 2000 Professional are 133 MHz Pentium-compatible CPU, 64 MB RAM, and 1 GB of hard drive storage. Recommended requirements are 300 MHz Pentium-compatible CPU, 128 MB of RAM, and 2 GB of hard drive storage. Windows 98 is recommended for home computers over Windows 2000 because it supports legacy devices and software and manages games and similar multimedia applications better than Windows 2000. Because of the improvements in power management over Windows 98, Windows 2000 is the recommended operating system for notebook computers. Windows 2000 offers several ways to deploy the OS in a corporate setting, including unattended installations and disk duplication support. Windows 2000 makes use of ACPI-compliant system BIOS in order to fully enable power management features. If a system does not have ACPI BIOS, upgrade the BIOS before you do the installation, if the BIOS manufacturer offers the upgrade. Network Identification, Device Manager, Dial-Up Networking, and Scheduled Tasks are some utilities that are not located on the desktop in the same places in Windows 2000 as they are in Windows 98. Windows 2000 supports virtual private networks so that a worker can access a corporate network from across the Internet using a secure connection. Windows 2000 Active Directory is a new feature of Windows 2000 that provides a centralized point of administration for all shared resources on a network. Windows 2000 can have more than one domain controller, whereas Windows NT can have only a single primary domain controller. Windows 2000 allows for printing to a URL so that you can send a print job to anywhere on the Internet.

10

Reference

The Total Solution For A+ Certification Active Directory Active Directory is a Windows 2000 service that allows for a single point of administration for all shared resources on a network, including files, peripheral devices, databases, Web sites, users, and services. Internet Printing Protocol (IPP) Internet Printing Protocol is a protocol used to send print jobs across the Internet. A printer is addressed by its URL. Mixed Mode Mixed mode is a Windows 2000 mode for domain controllers used when there is at least one Windows NT domain controller on the network. Native Mode Native mode is a Windows 2000 mode used by domain controllers when there are no Windows NT domain controllers present on the network.

Reference

11

The Total Solution For A+ Certification

12

Reference

The Total Solution For A+ Certification

Chapter 2 Exploring Control SettingsClick an item for more informationUtilizing CMOS Managing IRQ And DMA Settings Understanding The Boot Process

Reference

1

The Total Solution For A+ Certification

2

Reference

The Total Solution For A+ Certification

Utilizing CMOSClick an item for more information1. Configuration Data And How It Is Stored 2. Passwords Stored On CMOS 3. Saving CMOS Setup Information 4. ROM BIOS 5. Configuring And Initializing The Computer 6. On-Board Port Failures 7. Hardware Configuration In The Boot Process 8. Configuring The CMOS Settings 9. CMOS Settings Table 10. CMOS Setup Utility 11. Setting CMOS And Installing Windows 9x 12. Plug-and-Play BIOS 13. Upgrade BIOS 14. Upgrade Flash ROM 15. Error Messages And Their Meanings 16. Topic Summary

Reference

1

The Total Solution For A+ Certification

Configuration Data And How It Is Stored During the boot process, the Startup BIOS and operating system must determine what hardware is present. This information is called configuration data, setup data, or simply setup, and the settings are stored in the computer in one of the following devices: DIP switches, CMOS setup chips, or jumpers.

See also: Setup Data Stored By DIP Switches Setup Data Stored On A CMOS Chip Setup Data Stored By Jumpers

2

Reference

The Total Solution For A+ Certification Setup Data Stored By DIP Switches A DIP switch is similar to a light switch and is on or off based on the direction the small switch is set. Most systemboards have at least one, often several, jumpers and perhaps a single bank of DIP switches, although the trend is to include most setup information in CMOS rather than to have a jumper or switch on the board that has to be mechanically set. A DIP switch (dual in-line package) is a switch that has an ON and an OFF position. ON represents binary 1 and OFF represents binary 0. If you add or remove equipment, you can communicate that to the computer by changing a DIP switch setting. When you change a DIP switch setting, use a sharp instrument, such as a ball-point pen, to push the switch, as shown in the figure below. DO NOT use a graphite pencil because graphite conducts electricity and broken pieces can drop into the switch and damage it.

Reference

3

The Total Solution For A+ Certification Setup Data Stored On A CMOS Chip Most configuration settings in newer computers are stored in a battery-powered CMOS chip. CMOS chips require very little electricity to retain data. Electricity from a battery enables the CMOS chip to hold the data even while the computer is off.

The battery that powers the CMOS chip may be on the systemboard or attached nearby. You can access the CMOS setup by pressing a specified key during the boot process. A message, similar to the following usually, appears on the screen. Press DEL to change Setup

or Press F8 for Setup The setup screen appears and usually has menus and help features to help you configure the system. When exiting the program, you are prompted to exit or to save your changes and exit.

4

Reference

The Total Solution For A+ Certification Setup Data Stored By Jumpers A jumper is a sleeve that connects a pair of vertical pins on a circuit board. The jumper serves as an electrical connection on the systemboard. If the pins are not connected with a cover, the setting is considered OFF. If the cover is present, the setting is ON. Jumpers are used to communicate a variety of information to the computer. For example, on a PC, jumpers are used to select I/O addresses and IRQs. On an IDE drive, a jumper selects between master and slave. A jumper can be used in place of a more costly DIP switch. You change the jumper setting by removing the computer case, finding the correct jumper, and then either placing a metal cover over the jumper or removing the cover already there.

Reference

5

The Total Solution For A+ Certification

Passwords Stored On CMOS Access to a computer can be controlled using startup passwords, sometimes called power-on passwords. During booting or startup, the computer asks for a password. If the correct password is not entered, the booting process is terminated. This startup password is stored on the CMOS chip and can be changed by accessing the setup screen. However, you must know the password to access the setup screen. Many computers also provide a jumper near the CMOS chip that, when set to ON, causes the computer to revert to factory or default CMOS settings. Placing a jumper on these pins can disable a password because the computer no longer remembers the changes that were made to the settings.

6

Reference

The Total Solution For A+ Certification

Saving CMOS Setup InformationThere are several utility software programs, including Norton Utilities, that you can use to back up setup information to a disk that can be used to recover lost setup information. Setup information on a PC can be lost if the battery dies or is replaced. Possible errors and events that might indicate that setup information is lost are: An early indication of a weak battery is that the PC loses the correct date and time when turned off.

A message at startup says, Hardware information is lost. A dead or poorly connected battery can cause this type of error. For both of these situations, the remedy is to replace the battery and restore the CMOS settings.

Reference

7

The Total Solution For A+ Certification

ROM BIOSROM BIOS is a group of programs permanently stored on a ROM chip or chips on the systemboard that manages the most fundamental communications between software and hardware. The two functions of ROM BIOS are to: Gather configuration information and initialize the computer when it is first turned on Provide software to communicate with various hardware components when the operating system is functioning

ROM BIOS chips can also be present on other hardware devices, such as the video card shown below. In general, ROM BIOS chips hold programs or software that tell the CPU how to perform many fundamental input/output tasks that manage the computer.

During fabrication, a ROM chip has software instructions permanently etched into it which can never be erased. However, there are now ROM chips on the market that actually can be reprogrammed. Called Flash ROM, the software stored on these chips can be overwritten by new software that will remain on the chip until it is overwritten also.

8

Reference

The Total Solution For A+ Certification

Configuring And Initializing The ComputerWhen you turn on the power to a PC, the CPU begins the process of initialization by turning to the ROM BIOS for instructions. The BIOS runs a series of complex programs called the power-on self test (POST), which performs several tasks, including: When the power is first turned on, the system clock begins to generate clock pulses. The CPU begins working and initializes itself (resetting its internal values). The CPU turns to memory address FFFF0h, which is the memory address always assigned to the first instruction in the ROM BIOS startup program. This instruction directs the CPU to run the POST tests. POST first checks the BIOS program operating it and then tests CMOS RAM. A test determines that there has not been a battery failure. Hardware interrupts are disabled. This means that pressing a key on the keyboard or using another input device at this point will not affect anything. Tests are run on the CPU, and it is further initialized. A check determines if this is a cold boot. If so, the first 16 KB of RAM is tested. Hardware devices installed on the computer are inventoried and compared to configuration information. Video, memory, keyboard, floppy disk drives, hard drives, ports, and other hardware devices are tested and configured, and IRQ, I/O addresses, and DMA assignments made. The OS will later complete this process. Some devices are set up to go into sleep mode to conserve electricity. The DMA controller is checked. Interrupt vectors are moved into the interrupt vector table. The interrupt controller is checked. CMOS setup (a BIOS program to change CMOS configuration data) is run if requested. BIOS begins its search for an OS.

Reference

9

The Total Solution For A+ Certification

On-Board Port Failures Many systems contain on-board ports such as a keyboard port and a mouse port. In addition, a parallel printer port and one or two serial ports might be located directly on the systemboard. Few older systems contain more ports than these. Some systems also have a video or network port, and newer systemboards contain one or two USB ports. If one port fails, replacing the entire systemboard is not necessary. Most systemboards contain jumpers or DIP switches that can instruct the CPU to disable a port and look to an expansion card for the port instead. These ports can also be disabled through CMOS setup. When buying a new computer or systemboard, look for the ability to disable ports, floppy drive connectors, or hard drive connectors coming directly from the systemboard by changing the hardware configuration. You can easily tell if ports on the outside of the case are directly connected to the systemboard without opening the case; the ports are lined up along the bottom of the computer case, as shown in the figure below.

10

Reference

The Total Solution For A+ Certification

Hardware Configuration In The Boot Process Hardware configuration information communicates to the CPU during the boot process what hardware components are present in the system and how they are set up to interface with the CPU. Hardware configuration includes information such as how much memory is available, what power management features are present, and whether disk drives, hard drives, modems, and serial ports are connected. During POST, BIOS looks to the system configuration information to determine what equipment it should expect to find and how that equipment interfaces with the CPU. The CPU uses this information later to process data and instructions. Configuration information is provided on the systemboard in three different ways: DIP switches, jumpers, and CMOS.

Before connecting or disconnecting any hardware, make sure the computer is turned off. If the computer is running while adding or removing hardware, the hardware and the computer can be severely damaged.

Reference

11

The Total Solution For A+ Certification

Configuring The CMOS Settings Computers today store most configuration information on one CMOS chip that retains the data even when the computer is turned off. (There are actually many CMOS chips on a systemboard used for various purposes). A battery near the CMOS chip provides enough electricity to enable the chip to maintain its data. If the battery is disconnected or fails, setup information is lost. Password information is also a part of the computers setup that is stored in CMOS. The program to change the setup information is now stored in ROM but once was on a disk that came with the computer. Systemboard manuals should contain a list of all CMOS settings, an explanation of their meanings, and their recommended values. When you purchase a systemboard or a computer, be sure the manual is included for this purpose. If you dont have the manual, you can sometimes go to the systemboard manufacturers Web site and download the information you need to understand the specific CMOS settings of your computer. Some CMOS settings are listed in the following table.

12

Reference

The Total Solution For A+ Certification

CMOS Settings TableCMOS Settings And Their PurposeCategory Standard CMOS Setup Setting Date and time Primary display Keyboard Description Use to set system date and time. Use to tell POST and DOS (but not Windows) the type of video being used. Use to tell the system if a keyboard is installed or not installed. This setting is useful if the computer is used as a print or file server and you dont want someone changing settings. Use to record the size and mapping of the drive. Choices are usually 3-inch and 5-inch. Use to disable POST check of this memory to speed up booting. The operating system will check this memory anyway. If you have a parity systemboard, use to enable parity checking to ensure that memory is correct. Enabled unless you have an old 386 or 486SX computer. Use to establish the drive the system turns to first to locate an operating system, normally Drive C, then A. Use to enable if you have L2 cache. A frequent error in setup is to have cache but not use it because its disabled here. Normally enabled; disable this setting only for old 386 computers. Use to establish a startup password. Use this only if you really have a problem with someone who cant be trusted using your PC. For DOS and Windows 9x, shadowing video ROM is recommended because ROM runs slower than RAM.

Hard disk type Floppy disk type Advanced CMOS Setup Above 1 MB memory test Memory parity error check Numeric processor test System boot sequence External cache memory Internal cache memory Password checking option Video ROM shadow C000, 16K

Reference

13

The Total Solution For A+ CertificationCategory Advanced CMOS Setup (continued) Setting System ROM shadow F000, 64K IDE Multi-block mode Boot sector virus protection Advanced Chip Set Setup AT bus clock selection ISA bus speed Bus mode Description Enabling shadow system ROM is recommended. Enables a hard drive to read or write several sectors at a time. This setting is dependent on the kind of hard drive you have. Gives a warning when something is being written to the boot sector of the hard drive. This setting can be a nuisance if your software is designed to write to the boot sector regularly. Gives the number by which the CPU speed is divided to get the ISA or EISA bus speed. Gives the number by which the PCI bus speed is divided to get the ISA bus speed. Can be set to synchronous or asynchronous modes. In synchronous mode, the bus uses the CPU clock. In asynchronous mode its own AT bus clock is used. The number of wait states the CPU must endure while it interfaces with a device on the ISA or EISA bus. Increase this setting if an old and slow ISA card is not working well. Number of wait states the CPU must endure while reading from RAM. Number of wait states the CPU must endure while writing to RAM. Sometimes called cache read hit burst, it is the number of clock beats needed to load four 32-bit words into the CPUs internal cache. 4-1-1-1 is the usual choice. Refers to external cache. Enable it if you have two banks of cache, 64K or 256K. Refers to external cache. This is the number of wait states the CPU must use while accessing cache. Disable or enable all power management features. These features are designed to conserve electricity. Disable or enable the feature to shut down the hard drive after a period of inactivity. Wake on LAN allows your PC to be booted from another computer on the same network. It requires an ATX power supply that supports the feature. Allows you to power up your PC by pressing a certain key combination.

AT cycle wait state

Memory read wait state Memory write wait state Cache read option

Fast cache read/write Cache wait state Power Menu Power Management HDD Power Down Wake on LAN Wake on keyboard

14

Reference

The Total Solution For A+ Certification

CMOS Setup UtilityThe CMOS Setup Utility is used to make system adjustments before the boot process. An example of the Main Program screen of CMOS setup is shown below.

The Main Program Screen Of CMOS Setup

Reference

15

The Total Solution For A+ Certification

Setting CMOS And Installing Windows 9x The hard drive type can be configured by either entering the values that are printed on the top of the hard drive or by using the IDE HDD Auto Detection option, allowing the BIOS to make the determination. To configure the hard drive in the CMOS Setup, perform the following steps. 1. Turn on the PC and access Setup. 2. Select the Hard Drive mode, then choose to allow the BIOS to autodetect the drive. If the drive has more than 1,024 cylinders, the choice is Large mode. 3. From the main program menu, select BIOS Features Setup. 4. Change the Boot Sequence from C, A to A, C so that we can easily boot from a floppy disk to better control the PC while installing the OS and software. 5. Save the settings and exit Setup. 6. Reboot the PC with the bootable floppy disk that comes with Windows 9x. If your copy of Windows 9x is an upgrade, then you will need to boot from a DOS bootable disk and load the CD-ROM drivers. 7. Follow the directions on the Windows 9x installation floppy disk to partition and format the hard drive and install Windows 9x from the CD-ROM drive. Be sure to make a rescue disk when given the opportunity during the installation.

16

Reference

The Total Solution For A+ Certification

Plug-and-Play BIOS Plug-and-Play (PnP) is a term that applies to both the Windows 9x operating system and to some ROM BIOS. It means that rather than having you reset DIP switches and jumpers, the operating system and/or the BIOS automatically configures hardware devices to reduce or eliminate conflicting requests for such system resources as I/O addresses, IRQs, DMA channels, or upper memory addresses. Windows 9x Plug-and-Play assigns these resources to a device only if the device allows it. For example, if a legacy sound card requires a certain group of upper memory addresses that are hard coded into its on-board BIOS, theres nothing that Windows 9x Plug-and-Play can do about that. (Hard coded is jargon for something being coded so that it cannot be changed.) Plug-and-Play simply tries to work around the problem as best it can. If two non-Plug-and-Play hardware devices require the same resource and their BIOS does not provide for accepting a substitute, these two devices cannot coexist on the same PC. Newer devices that are Plug-and-Play-compliant are more cooperative. At startup, they simply request to work and then wait for the operating system to assign the resources they need. Windows 9x and Windows 2000 try to do that whether or not the system BIOS is Plug-and-Play BIOS. At startup, its the Startup BIOS that examines the hardware devices present, takes inventory, and then loads the operating system. Part of the job of Plug-and-Play BIOS is to collect information about the devices and the resources they require and later work with Windows 9x or Windows 2000 to assign the resources. ESCD (extended system configuration data) Plug-and-Play BIOS goes even further, creating a list of all the things you have done manually to the configuration that Plugand-Play does not do on its own. This ESCD list is written to the BIOS chip so that the next time you boot, the Startup BIOS can faithfully relate that information to Windows. The BIOS chip for ESCD BIOS is a special RAM chip called Permanent RAM or PRAM that can hold data written to it without the benefit of a battery that the CMOS setup chip requires. Most ROM BIOS made after the end of 1994 is Plug-and-Play. Windows 9x and Windows 2000 can use most but not all of its Plug-and-Play abilities without Plug-and-Play BIOS.

See also: When BIOS Is Incompatible With Hardware Or Software

Reference

17

The Total Solution For A+ Certification When BIOS Is Incompatible With Hardware Or Software BIOS is a hybrid of two worlds. Its technically both hardware and software and it must communicate with both well (see the figure below). When hardware and software change, BIOS might need to change too. In the past, most users upgraded BIOS because new hardware was incompatible with it. Sometimes, however, you need to upgrade BIOS to accommodate new software, such as Plug-and-Play. In the past, when a new device became available, such as the 3 -inch floppy disk drive, your PC sometimes could not use the new device until you upgraded the BIOS. You did that by replacing the old BIOS chip with a new chip that supported the new device. Now, however, its much easier. First, remember that most of todays new devices are not supported by the System BIOS at all, but by device drivers that are software programs installed on the hard drive as an add-on part of the operating system. If some new feature does require an upgrade to BIOS, you can do that with Flash ROM. Installing a larger hard drive is an example of a hardware upgrade that might require a BIOS upgrade because it is incompatible with the existing BIOS. Older BIOS supports only those hard drives with a 504 MB capacity. If you have this problem (large drive, old BIOS) you can solve it in one of two ways. Either upgrade BIOS or use special software designed to get around the problem. Often the device manufacturer supplies the software.

18

Reference

The Total Solution For A+ Certification

Upgrade BIOS Be careful that you upgrade the BIOS with the correct upgrade. Upgrading with the wrong file could make your system BIOS totally useless. If youre not sure that youre using the correct upgrade, dont guess. Check with the technical support for your BIOS before moving forward. Before you call technical support, have the information that is written on the BIOS chip label available.

Reference

19

The Total Solution For A+ Certification

Upgrade Flash ROM Technically speaking, Flash ROM is called EEPROM (Electronically Erasable Programmable Read-Only Memory), which means you can change the programming on the chip through software on your PC. The updated programming will be retainedeven when you turn off your PC for long periods of timeuntil you change it again. Flash ROM allows you to upgrade system BIOS without having to replace the ROM chip. As more devices become Plug-and-Play compliant, Plug-and-Play BIOS will become more sophisticated. Additionally, makers of BIOS code are likely to change BIOS frequently because it is so easy for them to provide the upgrade on the Internet. You can get upgraded BIOS code from manufacturers Web sites or disks or from third-party BIOS resellers Web sites or disks. To upgrade Flash ROM, follow the directions that came with your systemboard and the upgrade software itself. Generally, you perform these tasks: 1. Set a jumper on the systemboard telling the BIOS to expect an upgrade. 2. Copy the upgrade BIOS software to a bootable disk. 3. Boot from the disk and follow the menu options to upgrade the BIOS. 4. Set the jumper back to its original setting, reboot the system, and verify that everything is working.

20

Reference

The Total Solution For A+ Certification

Error Messages And Their MeaningsError MessageBad sector writing or reading to drive Bad command or file not found

Meaning of the Error Message and What to DoSector markings on the disk may be fading. Try ScanDisk or reformat the disk. The DOS command just executed cannot be interpreted, or DOS cannot find the program file specified in the command line. Check the spelling of the filename and check that the path to the program file has not been given to DOS. Before the video is checked, during POST, the ROM BIOS communicates error messages with a series of beeps. Each BIOS manufacturer has its own beep codes but the following are typical of may BIOS codes. Systemboard problems, possibly with SMA, CMOS setup chip, timer, or system bus. The POST numeric code is displayed on the monitor.

Beeps during POST

Our single beep followed by 3,4, or 5 beeps Two beeps Two beeps followed by 3,4, or 5 beeps Three beeps followed by 3,4, or 5 beeps Four beeps followed by 2, 3, or 4 beeps Continuous beeps Configuration/SMOS error Insufficient memory

First 64K of RAM has errors. Keyboard controller failed or vi deo controller failed. Serial or parallel ports, system time, or time of day Power Supply

Setup information does not agree with the actual hard- ware the computer found during boot. Check setup for errors. This error happens under Windows when too many applications are open. Close some applications. A reboot may help. The operating system cannot locate the hard drive, or the controller card is not responding. Computer cannot find the hard drive that setup told it to expect. Check cables, connections, and power supply. You are attempting to use a DOS command such as FORMAT. When DOS looks at the FORMAT.COM program file, it finds that the file belongs to a different version of DOS than the one that is now running. Use the DOS software from the same version that you are running. The computer is unable to find a hard drive or a floppy drive that setup tells it to expect. The hard drive may have a corrupted partition table. This may be caused by a nonbooting disk in drive A. Remove the disk and boot from drive C. COMMAND.COM on drive C may have been erased.

Fixed disk error Hard drive not found Incorrect DOS version

Invalid drive specification

Invalid or missing COMMAND.COM

Reference

21

The Total Solution For A+ CertificationNo boot device available The hard drive is not formatted, or the format is corrupted, and there is no disk in drive A. Boot from a floppy and examine your hard drive for corruption. COMMAND.COM or one of two DOS hidden files is missing from the disk in drive A or the hard drive. Remove the disk in drive A and boot from the hard drive. The disk in drive A is missing, is not formatted, or is corrupted. Try another disk. Sometimes numeric codes are used to communicate errors at POST. Some examples include: Systemboard errors RAM errors Keyboard errors Video controller errors Floppy drive errors Coprocessor errors Parallel port errors Systemboard errors Game controller or joystick errors Hard drive errors SCSI device or network card errors Floppy drive errors This usually occurs when you attempt to format a floppy disk using the wrong format type. Check the disk type and compare to the format command type specified. Let the computer write to the disk by setting the switch on a 3.5-inch disk or removing the tape on a 5.25-inch disk. The MBR is unable to locate or read the OS boot sector on the active partition, or there is a translation problem on large drives. Boot from a floppy and examine the hard drive file system for corruption See the Web site of the system BIOS manufacturer: Error in CONFIG.SYS line xx AMI BIOS: www.ami.com Award BIOS and Phoenix BIOS: www.phoenix.com Compaq: www.compaq.com Dell: www.dell.com IBM: www.ibm.com

Non-system disk or disk error

Not ready reading drive A: Abort, Retry, Fail? Numeric codes during POST Code in the 100 range Code in the 200 range Code in the 300 range Code in the 500 range Code in the 600 range Code in the 700 range Code in the 900 range Code in the 1100-1200 range Code in the 1300 range Code in the 1700 range Code in the 6000 range Code in the 7300 range Track 0 bad, disk not usable

Write-protect error writing drive A: Missing operating system, error loading operating system

Unknown error at POST

There is a problem loading a device driver or with the syntax of a command line. Check the command line for errors. Verify the driver files are in the right directory. Reinstall the driver files HIMEM.SYS is corrupted, not in the right directory, or not the right version for the currently loaded OS. Verify HIMEM.SYS.

HIMEM.SYS not loaded, missing or corrupt HIMEM.SYS

22

Reference

The Total Solution For A+ Certification

Topic Summary A ROM BIOS microchip is a hybrid of hardware and software containing programming embedded into the chip. These chips are called firmware. ROM chips contain