Top Banner
Computer Systems C_ITCO011 & C_ITCO111
163

Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Aug 01, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Computer Systems C_ITCO011 & C_ITCO111

Page 2: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Compiled by Dr Neil Croft

Updated by Marwick Makwindi

Quality assured by Robert Matiwa

Edited by Carine Snyman

Version 1.0

NQF Level 5

Credit value: 12

October 2014 CTI Education Group

Page 3: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

TABLE OF CONTENTS

INTRODUCTION .............................................................................................. 1

Summary of learning outcomes and assessment criteria ............................................. 2

UNIT 1: INTRODUCTION TO COMPUTER SYSTEMS ........................................ 11

1.2.1 Principles of operation ............................................................................... 13 1.2.2 Configuration ........................................................................................... 14

1.3.1 System software ....................................................................................... 18 1.3.2 Application software .................................................................................. 19

1.4.1 Form factor .............................................................................................. 21 1.4.2 Bus architecture ....................................................................................... 21 1.4.3 Components ............................................................................................. 22

UNIT 2: SYSTEM COMPONENTS ..................................................................... 27

2.3.1 External ports .......................................................................................... 29 2.3.2 PS/2 ports ............................................................................................... 30 2.3.3 Serial ports .............................................................................................. 30 2.3.4 Parallel ports ............................................................................................ 31 2.3.5 VGA ports ................................................................................................ 31 2.3.6 USB ports ................................................................................................ 32 2.3.7 SCSI ....................................................................................................... 34 2.3.8 IEEE 1394 (Firewire) ................................................................................. 34 2.3.9 High definition multimedia interface (HDMI) and other display ports................ 35

2.4.1 Input devices ........................................................................................... 37 2.4.2 Output devices ......................................................................................... 39

Module aim ................................................................................................................. 1 Module abstract .......................................................................................................... 1 Learning outcomes and assessment criteria ............................................................... 2

Module content ........................................................................................................... 3 Lectures ..................................................................................................................... 5 Class exercises and activities ..................................................................................... 5 Information resources ................................................................................................ 5 Recommended information sources ............................................................................ 6 Using this Study Guide ............................................................................................... 6 Purpose ...................................................................................................................... 7 Structure .................................................................................................................... 7 Individual units .......................................................................................................... 7 Glossary ..................................................................................................................... 8 The use of icons .......................................................................................................... 8 Alignment between Study Guide, learning outcomes and assessment criteria ........... 9 Concluding remarks .................................................................................................. 10

Learning objectives .................................................................................................. 11 Introduction ............................................................................................................. 11 1.1 Computer system basics ................................................................................... 12 1.2 Classification of computer systems................................................................... 13

1.3 Software ........................................................................................................... 17

1.4 Motherboard ..................................................................................................... 20

Concluding remarks .................................................................................................. 26 Self-assessment ....................................................................................................... 26

Learning objectives .................................................................................................. 27 Introduction ............................................................................................................. 27 2.1 Signalling ......................................................................................................... 28 2.2 Data units ......................................................................................................... 28 2.3 Ports ................................................................................................................. 29

2.4 Peripheral devices ............................................................................................ 37

Concluding remarks .................................................................................................. 41 Self-assessment ....................................................................................................... 41

Page 4: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

UNIT 3: SYSTEM INSTALLATION ................................................................... 42

3.1.1 Health and safety laws .............................................................................. 43 3.1.2 Electricity ................................................................................................ 44 3.1.3 Cathode ray tube (CRT) safety ................................................................... 46 3.1.4 Electric fire .............................................................................................. 46 3.1.5 Cable management and lighting techniques ................................................. 47 3.1.6 Static electricity and electrostatic discharge (ESD) ........................................ 48

3.2.1 HDDs ...................................................................................................... 50 3.2.2 Solid state drives (SSDs) ........................................................................... 52 3.2.3 HBAs ....................................................................................................... 54 3.2.4 Installing disk drives ................................................................................. 56 3.2.5 RAID ....................................................................................................... 61

3.3.1 Optical disc storage ................................................................................... 63 3.3.2 Installing optical or tape drives ................................................................... 66

3.4.1 Memory types .......................................................................................... 68 3.4.2 Memory components ................................................................................. 73 3.4.3 Installing and upgrading memory ............................................................... 76

3.5.1 Overview of CPU ....................................................................................... 78 3.5.2 CPU architecture ....................................................................................... 80 3.5.3 Other CPU features ................................................................................... 84

3.6.1 Parts of a PC case ..................................................................................... 86 3.6.2 Removing a system case lid ....................................................................... 87

3.7.1 Overview of OS installation ........................................................................ 87 3.7.2 Installation boot methods .......................................................................... 88 3.7.3 Windows setup ......................................................................................... 93 3.7.4 Windows XP setup .................................................................................... 95 3.7.5 Windows Vista and Windows 7 setup ........................................................... 97

UNIT 4: SYSTEM CONFIGURATION .............................................................. 101

4.1.1 BIOS component information ................................................................... 102 4.1.2 BIOS security ......................................................................................... 104

4.2.1 Configuring computers for business use ..................................................... 104 4.2.2 Configuring computers for home use ......................................................... 106

UNIT 5: SYSTEM TESTING ........................................................................... 109

5.1.1 Indicator lights ....................................................................................... 110 5.1.2 Alerts .................................................................................................... 110 5.1.3 Overheating ........................................................................................... 110 5.1.4 Loud noises ............................................................................................ 110 5.1.5 Visible damage ....................................................................................... 111

Learning objectives .................................................................................................. 42 Introduction ............................................................................................................. 43 3.1 Safety procedures ............................................................................................. 43

3.2 Mass storage devices ........................................................................................ 50

3.3 Removable storage ........................................................................................... 63

3.4 System memory ................................................................................................ 68

3.5 CPU ................................................................................................................... 78

3.6 Disassembling a PC........................................................................................... 85

3.7 Installing Windows ........................................................................................... 87

Concluding remarks .................................................................................................. 99 Self-assessment ..................................................................................................... 100

Learning objectives ................................................................................................ 101 Introduction ........................................................................................................... 101 4.1 CMOS Setup .................................................................................................... 102

4.2 Custom configuration ..................................................................................... 104

Concluding remarks ................................................................................................ 107 Self-assessment ..................................................................................................... 108

Learning objectives ................................................................................................ 109 Introduction ........................................................................................................... 109 5.1 Troubleshooting hardware .............................................................................. 110

Page 5: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

5.2.1 No power ............................................................................................... 111 5.2.2 Using a multimeter ................................................................................. 112 5.2.3 Using a power supply tester ..................................................................... 114

5.3.1 POST not running ................................................................................... 115 5.3.2 POST errors ........................................................................................... 115 5.3.3 BIOS time and settings reset .................................................................... 116 5.3.4 OS searches ........................................................................................... 117

5.5.1 Unstable operation (system crash or hang) ................................................ 117 5.5.2 Heat ...................................................................................................... 118 5.5.3 CPU not working ..................................................................................... 119 5.5.4 Speed problems ...................................................................................... 119

5.6.1 Lockups ................................................................................................. 119 5.6.2 Windows Memory Diagnostics tool ............................................................ 120 5.6.3 New memory not recognised .................................................................... 121

UNIT 6: SYSTEM MAINTENANCE AND UPGRADE .......................................... 123

6.2.1 Check Disk ............................................................................................. 124 6.2.2 Disk Defragmenter .................................................................................. 126 6.2.3 Disk Cleanup .......................................................................................... 128 6.2.4 Task Scheduler ....................................................................................... 128 6.2.5 Patch management ................................................................................. 130 6.2.6 Update policy ......................................................................................... 131

6.3.1 Backup types ......................................................................................... 137 6.3.2 Restoring data and verifying backups ........................................................ 138 6.3.3 Shadow copies ....................................................................................... 139 6.3.4 Restoring user profiles ............................................................................. 140

6.4.1 Malware types ........................................................................................ 143 6.4.2 Malware symptoms ................................................................................. 146 6.4.3 Virus alert hoaxes ................................................................................... 147 6.4.4 Preventing malware infection ................................................................... 148

GLOSSARY................................................................................................... 156 BIBLIOGRAPHY ........................................................................................... 157

5.2 Troubleshooting power problems ................................................................... 111

5.3 Troubleshooting POST .................................................................................... 114

5.4 Troubleshooting the motherboard .................................................................. 117 5.5 Troubleshooting the CPU ................................................................................ 117

5.6 Troubleshooting memory ................................................................................ 119

5.7 Troubleshooting adapter cards and I/O ports ................................................ 121 Concluding remarks ................................................................................................ 122 Self-assessment ..................................................................................................... 122

Learning objectives ................................................................................................ 123 Introduction ........................................................................................................... 123 6.1 Maintaining and optimising disk drives ........................................................... 124 6.2 Utility software ............................................................................................... 124

6.3 Data backup ................................................................................................... 135

6.4 Computer malware ......................................................................................... 143

Concluding remarks ................................................................................................ 155 Self-assessment ..................................................................................................... 155

Page 6: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 1

© CTI Education Group

Introduction Welcome to Computer Systems! In this module, we will develop your

understanding of computer systems by means of a variety of learning methods, including lectures, discussions, case studies and presentations. We

will explore software, hardware, networking, memory management, storage, interfacing and various other related technologies, all of which will develop

your understanding of the subject field and support your knowledge and skills

base.

The main source of information for Computer Systems is this Study Guide.

In this introductory unit, we provide you with the following information on Computer Systems:

A brief description of the aim of the module

An abstract of the module The learning outcomes and assessment criteria involved in the module

An outline of the module content An outline of the module structure

An explanation of the purpose, design and proper use of the Study Guide

Module aim The aim of this module is to enable you to understand computer systems and

apply your theoretical knowledge to practical applications when building, configuring and maintaining computer systems.

Module abstract

Most information technology (IT) professionals will, at some stage, have to set up, use, customise and maintain computer systems. In order to do so

effectively, they will need to understand how computer systems work. You will develop an understanding of the theoretical aspects of computer systems and

how information is processed. This module will explore the hardware, software and peripheral components that make up such a system.

There are many different manufacturers of computer systems and each will

produce a wide range of models with different specifications. Deciding which

particular model is appropriate for a given situation depends on a variety of factors. Custom-built computer systems are an advantage when meeting

specialised requirements while maintaining performance and keeping costs low. These aspects will be explored in this module so that you can make

informed choices when designing a computer system for a given purpose.

Page 7: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 2

© CTI Education Group

You will also be able to apply your theoretical knowledge to practical application by building, configuring and testing a functional computer system,

which will need to meet a given specification.

Computer users, further, need the skills required to set up and perform routine maintenance on computer systems. Although this module does not extensively

cover fault finding and repair, it does include the basic maintenance skills that would, normally, be expected of most computer users.

Learning outcomes and assessment criteria

On successful completion of this module, you will:

1. Understand the functions of computer systems

2. Be able to design computer systems

3. Be able to build and configure computer systems

4. Be able to undertake routine maintenance on computer systems

The following table outlines the assessment criteria that are aligned to the

learning outcomes.

Summary of learning outcomes and assessment criteria Learning outcomes Assessment criteria to pass

On successful completion of

this module, you will: You can:

1. Understand the functions of

computer systems

1.1 Explain the role of computer systems in different

environments

1.2 Explain the hardware, software and peripheral

components of computer systems

1.3 Compare different types of computer system

2. Be able to design computer

systems

2.1 Produce a computer system design specification to

meet a client’s needs

2.2 Evaluate the suitability of a computer system

design specification

3. Be able to build and configure

computer systems

3.1 Build and configure a computer system to meet a

design specification

3.2 Test and document a computer system

4. Be able to undertake routine

maintenance on computer

systems

4.1 Perform routine maintenance tasks on a computer

system

4.2 Upgrade the hardware and software on a computer

system

These outcomes are covered in the module content and they are assessed in the form of written assignments and semester tests. If you comply with and achieve

all the pass criteria related to the outcomes, you will pass this module.

Page 8: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 3

© CTI Education Group

Learning and assessment may be performed across modules, at module level or at outcome level. Evidence may be required at outcome level, although

opportunities exist for covering more than one outcome in an assignment.

Module content

1. Understand the functions of computer systems

Computer systems: this entails micro-computers, e.g. personal computers (PCs); mobile computers; mini-computers, e.g. mid-range servers and

workstations; mainframes, e.g. large-scale networking systems; super-computers, e.g. high performance systems; models and multiprocessing.

Environments: this entails home, business, computer gaming, networking,

real-time and communication.

Functions: this entails main components (arithmetic logic unit (ALU), control unit, memory and input/output (I/O) devices); connection, e.g.

buses; central processing unit (CPU) (control unit, ALU, registers and I/O devices); memory (random access memory (RAM), read-only memory

(ROM), registers and programmable caches); auxiliary storage and computer architecture.

Hardware: this entails the CPU; motherboard; power supply unit (PSU); cooling units; controllers; ports; main memory; memory types; battery;

specialised cards, e.g. peripheral component interconnect (PCI) and accelerated graphics port (AGP); networks; graphics; modems; sound;

optical drives and performance factors.

Software: this entails system software, e.g. operating systems (OSs); utility programs; library programs; translator programs; application

software, e.g. special purpose and bespoke; and performance factors.

Peripherals: this entails printers, plotters, cameras, scanners, keyboards, mouses, monitors, display adaptors, multimedia devices, storage media,

networking, portable drives, plug-and-play components and performance factors.

2. Be able to design computer systems

Needs analysis: this entails client and system requirements; problems/limitations with current/new system; functionality; costs;

timescales; resources and investigation/analytical techniques, e.g. interviews and questionnaires.

Page 9: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 4

© CTI Education Group

Selection: this entails costs; client requirements; maintenance contracts; output required; compatibility; system integration, e.g. home

entertainment; storage capacity; accessibility; performance, e.g. speed, time, power, efficiency, effectiveness and usability; and alternative

solutions.

System specifications: this entails client and system requirements; system components; configuration; timescales; tools and resources; alternatives,

e.g. processor types; security measures and documentation.

3. Be able to build and configure computer systems

Health and safety: this entails practices and electrostatic precautions, e.g.

antistatic mats and wrist straps.

System installation: this entails hardware (assembling and disassembling a computer system), e.g. motherboard, CPU, heat sink and fan, memory,

PSU and connecting these to the internal components; hard disk and optical drives; specialised cards, e.g. graphics, network, modem and

audio; software, e.g. OS, application and utility; peripheral devices, e.g.

printers, scanners and cameras; and communication devices, e.g. modems and routers.

System configuration: this entails configuring the basic input-output

system (BIOS), e.g. date, time, power management and security; installing antivirus and security updates; updating user profiles;

configuring the desktop, icon and font size, colour, background and other menus; managing files and folders; setting files and folders sharing

permissions; and configuring peripheral and communication devices.

System testing: this entails fault detection; power-on self-test (POST); diagnostic faults; troubleshooting devices; technical support

documentation, e.g. reference manuals and online manufacturer support; testing hardware, e.g. I/O and peripheral devices; testing software and

documentation, e.g. test plans.

4. Be able to undertake routine maintenance on computer

systems

Software maintenance: this entails upgrading software, e.g. virus-definition files and patches/updates; scheduling maintenance tasks; utility

software, e.g. defragmentation, cleanup, backup and system profilers;

and third-party utility software, e.g. compression utilities and spyware/malware removal.

Page 10: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 5

© CTI Education Group

Hardware maintenance: this entails upgrading hardware; installing and configuring new peripherals, e.g. printers and scanners; installing and

configuring additional or replacement devices, e.g. hard drives, memory, graphics, sound, optical media and networks; and cleaning equipment.

File management: this entails managing files and folders as well as

backup procedures.

Lectures Each week has four compulsory lecture hours for all students. It is

recommended that the lecture hours be divided into two sessions of two hours each, but this may vary depending on the campus.

Each week has a lecture schedule, which indicates the approximate time that

should be allocated to each activity. The week’s work schedule has also been

divided into two lessons.

Class exercises and activities

You will be required to complete a number of exercises and activities in class. These activities and exercises may also contribute to obtaining a pass,

therefore, it is important that you are present in class so that you do not forfeit

the opportunity to be exposed to such exercises and activities.

Activity sheets that are submitted should be kept by the lecturer so that they can be used as proof of criteria that were met, if necessary.

Information resources You should have access to a resource centre or library with a wide range of

relevant resources. Resources can include textbooks, e-books, newspaper

articles, journal articles, organisational publications, databases, etc. You can access a range of academic journals in electronic format via EBSCOhost. You

will have to ask a campus librarian to assist you with accessing EBSCOhost.

Page 11: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 6

© CTI Education Group

Recommended information sources Anfinsin, D. 2010. IT essentials: PC hardware and software companion

guide. San Jose: Cisco Press.

Dick, D. 2009. The PC support handbook: the configuration and systems guide. Oxford: Dumbreck Publishing.

MacRae, K. 2002. The computer manual: the step-by-step guide to upgrading

and repairing a PC. Yeovil: Haynes Group.

MacRae, K. & Marshall, G. 2008. Computer troubleshooting: the complete step-by-step guide to diagnosing and fixing common PC problems. 2nd edition.

Yeovil: Haynes Group.

White, R. & Downs, T. 2003. How computers work. London: Que.

NOTE

Web pages provide access to a range of Internet information sources.

Students must use this resource with care, justifying the use of information gathered.

Using this Study Guide As we indicated earlier, the Study Guide is your main source of information for

this module.

The purpose of the Study Guide is to facilitate your learning and to help you to master the content of the material. It, further, helps you to structure your

learning and manage your time as well as provides outcomes and activities to help you master said outcomes.

The Study Guide has been carefully designed to optimise your study time and

maximise your learning, so that your learning experience is as meaningful and

successful as possible. To deepen your learning and enhance your chances of success, it is important that you read the Study Guide attentively and follow all

the instructions carefully. Pay special attention to the module outcomes at the beginning of the Study Guide and at the beginning of each unit.

It is essential that you complete the exercises and other learning activities in

the Study Guide as your module assessments (examinations, tests and assignments) will be based on the assumption that you have completed such.

Page 12: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 7

© CTI Education Group

Purpose The purpose of the Study Guide is to facilitate the learning process and to help

you to structure your learning and to master the content of the module.

It is important for you to work through the Study Guide attentively and to follow all the instructions set out in such. In this way, you should be able to

deepen your learning and enhance your chances of success.

Structure The Study Guide is structured as follows:

Introduction

Unit 1 Introduction to computer systems

Unit 2 System components

Unit 3 System installation

Unit 4 System configuration

Unit 5 System testing

Unit 6 System maintenance and upgrade

Glossary

Bibliography

Individual units The individual units in the Study Guide are structured in the same way and

each unit contains the following features, which should enhance your learning process:

Unit title

Each unit title is based on the title and content of a specific

outcome or assessment criterion (criteria) as discussed in

the unit.

Learning outcomes and

assessment criteria

The unit title is followed by an outline of the learning

outcomes and assessment criteria, which will guide your

learning process. It is important for you to become familiar

with the learning outcomes and assessment criteria, because

they represent the overall purpose of the module as well as

the end product of what you should have learnt in the unit.

Learning objectives

Learning objectives, which follow the learning outcomes and

assessment criteria, are statements that define the expected

goals of the unit in terms of the specific knowledge and skills

that you should acquire as a result of mastering the unit

content. Learning objectives clarify, organise and prioritise

learning and they help you to evaluate your own progress,

thereby taking responsibility for your learning.

Page 13: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 8

© CTI Education Group

Introduction The learning objectives section is followed by an introduction

that identifies the key concepts of the unit.

Content

The content of each unit contains the theoretical foundation

of the module and is based on the work of experts in the

field of the module. The theory is illustrated by means of

relevant examples.

Concluding remarks

The concluding remarks at the end of each unit provide a

brief summary of the unit as well as an indication of what

you can expect in the following unit.

Self-assessment

The unit ends off with a number of theoretical self-

assessment questions that test your knowledge of the

content of the unit.

Glossary

As you can see, we include a brief glossary at the end of the Study Guide. Please refer to it as often as necessary in order to familiarise yourself with the

most important abbreviations/acronyms of terms and concepts involved in computer systems.

The use of icons

Icons are used to highlight (emphasise) particular sections or points in the Study Guide, to draw your attention to important aspects of the work, or to

highlight activities. The following icons are used in the Study Guide:

Activity

This icon indicates learning activities/exercises that have to be completed, whether individually or in groups,

in order to assess (evaluate) your understanding of the content of a particular section.

Example

This icon points to a section in the text where relevant examples of a particular topic (theme) or concept are

provided.

Page 14: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 9

© CTI Education Group

Learning outcome alignment This icon is used to indicate how individual units in the

Study Guide are aligned to a specific outcome and its assessment criteria.

Test your knowledge

This icon appears at the end of each unit in the Study Guide, indicating that you are required to answer self-

assessment questions to test your knowledge of the content of the foregoing unit.

Alignment between Study Guide, learning outcomes and assessment criteria

The following table reflects the alignment between the learning outcomes, assessment criteria and units in the Study Guide:

Learning outcomes Assessment criteria Study

Guide unit

1. Understand the

functions of

computer systems

1.1 Explain the role of computer systems in

different environments 1

1.2 Explain the hardware, software and

peripheral components of computer systems 1, 2

1.3 Compare different types of computer system 1

2. Be able to design

computer systems

2.1 Produce a computer system design

specification to meet a client’s needs 2, 3

2.2 Evaluate the suitability of a computer system

design specification 2, 4

3. Be able to build and

configure computer

systems

3.1 Build and configure a computer system to

meet a design specification 3, 4, 5

3.2 Test and document a computer system 5

4. Be able to undertake

routine maintenance

on computer systems

4.1 Perform routine maintenance tasks on a

computer system 6

4.2 Upgrade the hardware and software on a

computer system

Page 15: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Introduction Page 10

© CTI Education Group

Concluding remarks At this point, you should be familiar with the module design and structure as

well as with the use of the Study Guide.

In Unit 1, we start with the actual module content by introducing computer systems.

Page 16: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 11

© CTI Education Group

Unit 1: Introduction to Computer Systems

Unit 1 is aligned with the following learning outcome and assessment criteria:

Learning outcome

LO1 Understand the functions of computer systems

Assessment criteria

AC1.1 Explain the role of computer systems in different environments

AC1.2 Explain the hardware, software and peripheral components of computer systems

AC1.3 Compare different types of computer system

Learning objectives

After studying this unit, you should be able to:

Identify how to access system components Identify motherboard components and describe their functions

Distinguish between advanced technology extended (ATX) and proprietary motherboard form factors

Introduction

In this unit, we will focus on the types of computer system, their operation principles and configuration. We will discuss the different types of software

used by computer systems as well as their respective purpose. We will conclude by discussing the motherboard form factor, bus architecture and the

common components found on such.

Page 17: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 12

© CTI Education Group

1.1 Computer system basics

At an elementary level, a computer does the following:

It takes input

It processes such according to stored instructions It produces results as output

Activity

Write down as many computer input and output as you can think of.

A computer is seen as a machine that can be programmed to manipulate symbols. Its principal characteristics are:

It responds to a specific set of instructions in a sequenced manner

It can execute a pre-recorded list of instructions (a program/application) It can quickly process, store and retrieve large amounts of data in a

structured format

A computer can, therefore, perform complex and repetitive procedures quickly, precisely and reliably. In most cases, repetition is the key element allowing the

automation of complex tasks to aid human communication.

Modern computers are electronic and digital in nature and have immense

processing power. The actual machinery or components of a computer (wires, transistors and circuits) are called ‘hardware’ whereas the instructions and

data processing are called ‘software’. All general-purpose computers require the following hardware components:

Central processing unit (CPU): the heart of a computer; this is the

component that actually executes instructions organised in programs (software), which tell the computer what to do

Memory (fast, expensive, short-term memory): this enables a computer to store data, programs and intermediate results

Mass storage (slow, cheap, long-term memory): this enables a computer to permanently retain large amounts of data and programs between jobs;

common mass storage devices include disk and tape drives

Input devices: these are, usually, a keyboard and mouse; an input device is a conduit through which data and instructions enter a computer

Output devices: these can be a display screen, printer or other device that allows you to visualise what the computer has accomplished

Page 18: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 13

© CTI Education Group

1.2 Classification of computer systems

1.2.1 Principles of operation Based on the principles of operation, computer systems are classified into three

types (Figure 1), namely:

1. Analogue computers 2. Digital computers

3. Hybrid computers

Figure 1 – Computer types

Source: Elango, Jothi, Malaiarasu, Ramachandran & Rhymend-Uthariaraj (2005:15)

1.2.1.1 Analogue computers

Analogue computers are computing devices that work on a continuous range of values. Analogue computers give approximate results as they deal with

quantities that vary continuously; they, generally, deal with physical variables, such as voltage, pressure, temperature, speed, etc.

1.2.1.2 Digital computers

Digital computers operate on digital data, such as numbers; they use a binary

number system, in which there are only two digits, namely, 0 and 1. Each 1 is called a ‘bit’.

1.2.1.3 Hybrid computers

An analogue digital hybrid computer is designed using digital circuits, in which there are two levels for an input or output signal; these two levels are known

as ‘logic 0’ and ‘logic 1’. Digital computers can give results with more accuracy and at a faster rate. Since many complex problems in engineering and

technology are solved by the application of numerical methods, electronic digital computers are well suited to solving such problems. Hybrid computers

are a combination of the desirable features of analogue and digital computers.

Computers

Analogue Digital Hybrid

Page 19: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 14

© CTI Education Group

Example In a hospital’s automated intensive care unit (ICU),

analogue devices might measure a patient’s temperature, blood pressure and other vital signs. These measurements,

which are analogue in nature, might be converted into numbers and supplied to digital components in the

hospital’s system. These components, in turn, can be used to monitor the patient’s vital signs and send signals if any

abnormal readings are detected.

1.2.2 Configuration Based on performance, size, cost and capacity, digital computers are classified

into four types (Figure 2), namely:

1. Super-computers 2. Mainframe computers

3. Mini-computers 4. Micro-computers

Figure 2 – Digital computer types

Source: Elango [et al.] (2005:15)

1.2.2.1 Super-computers

Super-computers are the mightiest computers of all but, at the same time, the most expensive. Super-computers process billions of instructions per second.

They are, normally, used to solve intensive numerical computations, for example, stock analyses, special effects for movies, weather forecasting and

even sophisticated artworks.

Digital computers

Super-computers

Mainframe computers

Mini-computers

Micro-computers

Page 20: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 15

© CTI Education Group

1.2.2.2 Mainframe computers

Mainframe computers are capable of processing data at very high speeds (hundreds of millions instructions per second). They are large in size,

expensive and used to process large amounts of data quickly. Some of their most obvious customers are banks, airline and railway reservation systems,

aerospace companies executing complex aircraft design, etc.

1.2.2.3 Mini-computers

Mini-computers were developed with the objective to launch low cost computers. They are not as good as mainframe computers in terms of speed or

storage capacity. Some hardware features available in mainframes are,

furthermore, not included in mini-computer hardware in order to reduce costs. The mini-computer market has diminished somewhat as buyers have moved

towards less expensive but increasingly powerful personal computers (PCs).

1.2.2.4 Micro-computers

The invention of the micro-processor (single chip CPU) gave birth to micro-computers. They are much cheaper than mini-computers and can be classified

into the following categories (Figure 3):

Workstations PCs

Laptop computers Palm PCs

Figure 3 – Micro-computer types

Source: Elango [et al.] (2005:18)

Although equipment may vary from the simplest computer to the most powerful, the major functional units of computer systems remain the same,

namely, input, processing, storage and output.

Micro-computers

Work-stations

Personal computers

Laptop computers

Palm PCs

Page 21: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 16

© CTI Education Group

Workstations

Workstations (Figure 4) are desktop machines that are mainly used for graphics-intensive applications. They have more processor speed than PCs.

Figure 4 – Workstation

Source: http://www.albacore.co.uk/news/xp-workstation-upgrade-deals

Workstations use sophisticated display screens featuring high resolution colour

graphics. They are used for numeric- and graphics-intensive applications, such as computer aided design (CAD), the simulation of complex systems and

visualising the results of such simulations.

PCs

Today, PCs are the most popular computer system. Desktop computers are also known as ‘home computers’; they are, usually, easier to use and more

affordable than workstations. They are self-contained and intended for an individual user. Desktop computers are most often used for word processing

and small database applications.

Page 22: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 17

© CTI Education Group

Laptop computers

Laptop computers (Figure 5) are portable computers that fit in a briefcase. Laptop computers, also called ‘notebook computers’, are portable, functional

and popular with travellers who need a computer that can go with them.

Figure 5 – Laptop computer

Source: www.wired.co.uk/reviews/laptops/2012-10/samsung-series-5-550p-review

Palm PCs

Palm PCs were manufactured with the intention to have a computer that could be hand-held. This device was, however, phased out in 2000.

1.3 Software ‘Software’ refers to a program that enables a computer to do something

meaningful. It is the planned, step-by-step instructions required to turn data

into information. Software can be classified into two categories (Figure 6), namely:

1. System software

2. Application software

Figure 6 – Software types

Source: Elango [et al.] (2005:12)

Computer software

System software

Application software

Page 23: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 18

© CTI Education Group

1.3.1 System software

System software consists of general programs written for computers. These programs provide the environment in which to run application programs.

System software comprises of programs, which interact with hardware at a very basic level. They are a basic necessity in computer systems as they

ensure the proper functioning of such. System software serves as the interface between hardware and the user (Figure 7). The operating system (OS),

compilers and utility programs are examples of system software.

Figure 7 – System software

Source: Elango [et al.] (2005:12)

The most important type of system software is the OS. An OS is an integrated set of specialised programs that is used to manage the overall operations of a

computer. It acts like an interface between the user, computer hardware and software.

Application software

System software

Hardware

Page 24: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 19

© CTI Education Group

Every computer must have an OS to run other programs. Disk Operating System (DOS), Unix, Linux and Windows are some of the most common OSs.

Compiler software translates a source program (user written program) into an object program (binary form) (Figure 8). Specific compilers are available for

computer programming languages, such as FORTRAN, COBOL, C and C++. Utility programs support a computer in terms of specific tasks, such as file

copying, sorting and linking.

Figure 8 – Compiler software

Source: Elango [et al.] (2005:13)

1.3.2 Application software

Application software consists of programs designed to solve user problems. They are used to accomplish specific tasks rather than just managing computer

systems. Application software is controlled by system software, which manages hardware devices. Some typical examples of application software are railway

reservation systems, game programs, word processing software and weather forecasting programs. Among application software we can find programs that

are designed for specific tasks, for example, word processors, spreadsheets and database management systems.

1.3.2.1 Word processing software

One of the most commonly used software packages is word processing software. Anyone who has used a computer as a word processor knows that it

is far more than a fancy typewriter. The advantage of word processing over a typewriter is that you can make changes without retyping an entire document.

The entire writing process is thus transformed by modern word processing software. This type of software, further, allows you to create, edit, format,

store and print text and graphics. Some commonly used word processors are Microsoft Word, WordStar and WordPerfect.

Source program

Compiler

Object program

Page 25: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 20

© CTI Education Group

1.3.2.2 Spreadsheet software

Spreadsheet software packages allow users to manipulate numbers. Repetitive numeric calculations, the use of related formulae and the creation of graphics

and charts are some of the basic spreadsheet tools. These tools afford business people the opportunity to try different combinations of numbers to obtain

results quickly. Lotus 1-2-3 and Microsoft Excel are two of the most famous spreadsheet applications.

1.3.2.3 Database management system software

A database management system is a collection of programs that enable users

to store, modify and extract information from a database. A database

organises information internally. Computerised banking systems, automated teller machines (ATMs), and airline and railway reservation systems are

examples of database applications.

1.4 Motherboard

A printed circuit board (called the ‘motherboard’, ‘system board’ or ‘main

board’) houses the processor, chipset, memory and expansion slots. The type of motherboard influences the system speed and upgrade options. There are a

great many motherboard manufacturers, including Abit, AOpen (Acer), ASUSTek, Intel and Gigabyte. A typical motherboard consists of the

components shown in Figure 9:

Figure 9 – Intel ATX motherboard

Source: Doctor, Dulaney & Skandier (2012:6)

Page 26: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 21

© CTI Education Group

1.4.1 Form factor

The form factor of a motherboard describes its shape, physical layout and the type of case and power supply unit (PSU) that can be used. Two motherboards

may have exactly the same functionality but different form factors; the difference is thus the layout of the components on the motherboard. Most

motherboards are based on the ATX or Micro-ATX design.

1.4.1.1 ATX and Micro-ATX

The ATX specification was developed by Intel in 1995 to provide a new design

for PC motherboards, updating the previous advanced technology (AT) form factor. Full size ATX boards are 12" wide and 9.6" deep (305 x 244 mm). The

Micro-ATX standard specifies a 9.6" square board with fewer expansion slots.

1.4.1.2 Front panel connectors

Components on the front panel of the chassis connect to headers on the motherboard. Typically, front panel connectors can include:

Power button/reset button (soft power): on modern computers, the power

button sends a signal to the PC that can be interpreted by the OS rather than actually switching the PC off. However, holding down the power button

for a few seconds will cut the power. Some older computers might also

feature a physical reset button in addition to the power button Power light: there may be a separate power light emitting diode (LED) but

this is, usually, part of the button Hard disk drive (HDD) activity lights: these show when an internal hard disk

is being accessed Universal serial bus (USB) ports: a computer will, normally, feature one or

two front USB ports to connect peripherals as well as more ports on the back Audio ports: these allow for headphones and a microphone to be connected

1.4.2 Bus architecture

PCs consist of many internal components, all of which communicate with each other via a bus. Physically, a bus is implemented on to the motherboard as tiny

wires (called ‘traces’) running between components. The bus carries information being processed by the computer (data) and information about

where the data is located in memory (address). The bus also carries power to a component as well as the timing signals that synchronise components.

Bus architecture, usually, refers to an ‘expansion bus’, used to connect

peripheral devices; however, a variety of buses exist within PCs. In addition, the way in which bus designs are implemented has changed considerably along

with the development and improvement of PC technology.

Page 27: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 22

© CTI Education Group

1.4.2.1 Internal and external buses

One way of categorising the types of bus is to divide them into internal and external buses:

An internal (or local) bus connects core components, such as the CPU,

memory and system controllers An external bus (or expansion bus) allows for additional components to be

connected to a computer; these components could be peripheral (located outside the case) or adapter cards (located inside the case)

External bus technologies do not necessarily extend outside the computer

case. For example, peripheral component interconnect (PCl), the most popular

expansion bus standard, provides connections to internal adapter cards only. A genuine external bus (such as small computer system interface (SCSI), USB or

Firewire) extends the bus wires outside the computer case using cabling.

The distinction between internal and external bus types has also become a lot less clear as one bus technology will be used to perform both types of role (for

example, PCl Express).

1.4.2.2 System clock and bus speed

The system clock synchronises the operation of all PC parts and provides the basic timing signal for the CPU. Clock speeds are measured in megahertz

(MHz) or gigahertz (GHz).

The clock consists of a clock generator that sets up a timing signal and clock

multipliers that take the timing signal produced by the generator and apply a multiplication factor to produce different timing signals for different types of

bus.

1.4.2.3 Parallel and serial bus types

Historically, most bus designs used parallel technology. The width of a parallel bus (32-bit, etc.) and the clock speed determine bandwidth (or transfer rates).

Recent bus designs, notably USB, Firewire and PCI Express, use serial communication; the data rate for serial communication is based on the clock

speed and encoding mechanism.

1.4.3 Components All motherboards have connectors for the same types of component: CPU,

memory, disk drives, peripherals and so on. However, the type and number of these connectors depend on the models supported.

Page 28: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 23

© CTI Education Group

1.4.3.1 CPU socket and chipset

New motherboards are, generally, released to support new CPU designs. Because technology changes rapidly, a given motherboard will only support a

limited number of CPU models. The CPU is, typically, inserted into a squarish socket, located close to memory sockets, and then covered by a heat sink and

fan.

The system chipset is soldered onto the motherboard and cannot be upgraded. The type of chipset on the motherboard can affect the type of processor,

processor speed, multiprocessing support, type and amount of system memory, and type(s) of system bus.

The chipset consists of a number of controllers that handle the transfer of data between the CPU and various devices, such as:

System memory controller

PS/2 keyboard and mouse controller Input/output (I/O) controller that handles serial ports, parallel ports, floppy

disks, disk drives and expansion buses Controllers for any integrated video, sound, network (cabled and wireless) or

SCSI interfaces

1.4.3.2 Chipset and memory architecture

CPU models are closely tied to the chipset and memory sub-system. This means that there is far less scope for upgrading the CPU than used to be the

case. You could not, for instance, take a motherboard designed for the Core 2

CPU and plug an advanced micro devices (AMD) Phenom into it. Both the physical interface (socket) and system architecture have diverged along

proprietary lines since the old socket interface used by the original Pentiums.

The link between the CPU and system memory is a key factor in determining system performance.

1.4.3.3 Northbridge/Southbridge

In Legacy PC motherboards, the chipset is split into two sections, namely:

1. Northbridge

2. Southbridge

The Northbridge can be one or more chips on the motherboard. Its main

function is system memory controller, connecting the processor to random access memory (RAM). The Northbridge also supports other faster

components, such as the accelerated graphics port (AGP) bus. It is connected to the processor through the front side bus (FSB).

Page 29: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 24

© CTI Education Group

The Southbridge is, usually, one chip. It is designed to control all of the I/O functions not handled by the Northbridge (often older, slower technologies),

such as USB, serial, parallel, industry standard architecture (ISA), PCI, system basic input-output system (BIOS), disk controllers and onboard audio or

network adapters. The Southbridge is connected to the CPU via the Northbridge (usually via the PCI bus) (Figure 10):

Figure 10 – A typical motherboard chipset

Source: Doctor [et al.] (2012:6)

As video and hard disk technologies improved, the shared PCI bus linking

Northbridge and Southbridge became a bottleneck to performance. Newer CPUs and chipsets use different designs, with Intel and AMD both introducing

different architectures.

1.4.3.4 Memory

PC memory can be categorised as either RAM or read-only memory (ROM), each of which with a different function. A motherboard will, generally, have

between two and four slots for installation of system RAM. It also houses a ROM BIOS chip.

RAM

RAM is the working memory of a PC. Program code is loaded into RAM so that it can be accessed and executed by the processor. RAM also holds data (for

example, the contents of a spreadsheet or document), while it is being modified. System RAM is volatile; it loses its contents as soon as power is

removed.

Page 30: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 25

© CTI Education Group

System RAM is, normally, dual inline memory modules (DIMMs) fitted to motherboard sockets. The type of sockets and chipset determine the types of

system memory that can be installed. The capabilities of the memory controller and number of physical sockets, in turn, determine how much memory can be

fitted.

Flash memory is a non-volatile type of RAM, increasingly used in place of, or alongside, hard disks for persistent storage of data.

BIOS

BIOS provides the industry standard program code that operates the

fundamental PC components and ensures that the design of each

manufacturer’s motherboard is PC compatible. BIOS code is manufacturer specific, therefore, BIOS chips cannot be swapped between different

motherboards. However, most use flash ROM, which can be upgraded. The BIOS is often known as ‘firmware’ as it consists of both the physical chip

(hardware) and the programs coded into such (software).

The ROM BIOS can be identified by a label on the chip showing the name of the manufacturer and a version number (in Windows) via the System

Information (msinfo32) utility.

The BIOS also provides the following features:

Power-on self-test (POST) diagnostic tests A real-time clock (RTC) that keeps track of the current date and time

Setup menus that allow for low-level hardware configuration (stored in

complementary metal-oxide semiconductor (CMOS) RAM) to be viewed and edited

CMOS RAM

CMOS RAM stores a PC’s basic configuration (for example, disk types, amount

of memory installed, current time and date, etc.). This prevents the need for reconfiguration when powering on a PC. CMOS describes the manufacturing

process used to make RAM chips. CMOS devices require very little power to operate and use a small battery to maintain their settings. A CMOS battery is a

coin lithium battery.

Expansion slots

Expansion slots allow for plug-in adapter cards to be installed in a PC to extend

the range of functions that it can perform. There are a number of different expansion bus types and many different types of adapter card.

Page 31: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 1 – Introduction to Computer Systems Page 26

© CTI Education Group

Concluding remarks

In this unit, we introduced the basic components of a computer system. All computer systems consist of hardware, software, memory and I/O devices,

each with a specific function. Not all computers are the same; some are built

for a specific purpose, however, understanding the core components and composition of such is useful when analysing any system.

In the next unit, we will continue to investigate computer system components.

Self-assessment

Test your knowledge

1. Define an OS, application software, micro-computer, mainframe and bus.

2. Briefly discuss the types of computer memory and their respective uses.

Page 32: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 27

© CTI Education Group

Unit 2: System Components

Unit 2 is aligned with the following learning outcomes and assessment criteria:

Learning outcomes

LO1 Understand the functions of computer systems

LO2 Be able to design computer systems

Assessment criteria AC1.2 Explain the hardware, software and peripheral

components of computer systems AC2.1 Produce a computer system design specification to

meet a client’s needs AC2.2 Evaluate the suitability of a computer system

design specification

Learning objectives

After studying this unit, you should be able to:

Describe the functions and capabilities of connection interfaces Describe the functions and capabilities of input devices

Install and configure peripheral devices

Introduction In the previous unit, you learnt about the types of computer system, the types

of software that they use, the motherboard components and bus architecture.

In this unit, we will discuss the key concept of data transmission. The unit will

focus on the various ports and connection interfaces used by computer systems as well as the various types of connection interface suitable for

particular components. We will conclude the unit by discussing basic I/O peripheral devices.

Page 33: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 28

© CTI Education Group

2.1 Signalling

A computer transmits data via electrical signals, which are stored in components, called ‘transistors’. The electrical pathways within a computer or

through cabling that carry signals are referred to as ‘buses’. Numerous

different bus technologies have been and are used to build computers as well as many different signalling methods.

Generally speaking, older computer bus types (such as serial and PS/2 ports or

video graphics array (VGA) display ports) use a method, called ‘single-ended signalling’. Newer buses (such as USB, Firewire and PCI Express) use

differential signalling. The advantage of differential signalling is that it allows for the use of lower voltages, thereby reducing power consumption and heat.

Another distinction between signalling methods is between parallel and serial

communication. Some bus types transfer data in parallel, which means that there are multiple physical wires to carry signals. A parallel bus that is 32 bits

wide would transfer 32 bits in each operation. Parallel communication was popular in the 1990s; modern bus technologies use serial communication. This

means transferring one bit at a time but working at a higher frequency.

Signalling can, further, either be digital or analogue. Computers use digital

signalling, where pulses in an electrical signal refer to discrete binary values (representing 1 or 0). Analogue is a continuous, variable signal. Computers

need to translate between digital and analogue signals (for example, for video or audio signalling on analogue equipment) by sampling the analogue signal.

2.2 Data units

Computers work with binary data. The fundamental unit of data storage is a bit (binary digit), which can represent 1 or 0. A bit can be measured in multiples

using kilobit (KB) and megabit (Mb). However, in terms of today’s computers, these values represent tiny amounts. Larger units are more typically used to

describe file size, memory capacity and disk storage capacity, for example:

1 024 KB equate to a megabyte (MB) (1 048 576 bytes) 1 024 MB equate to a gigabyte (GB) (1 073 741 824 bytes)

1 024 GB equate to a terabyte (TB) (1 000 000 000 000 bytes)

File size and memory capacity are always quoted as binary measurements. For example, when you see that Windows reports 2 GB memory, this means 2 048

MB, not 2 000 MB.

Storage capacity is, typically, quoted by vendors in decimal measurements. For

example, a hard disk advertised with a capacity of 300 GB has an ‘actual’ capacity of 286 GB.

Page 34: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 29

© CTI Education Group

Binary values are often converted to decimal. Hexadecimal notation is another convenient way of referring to long strings. Hexadecimal has 16 characters to

represent (0…9 plus A, B, C, D, E, F). Therefore, it only takes one hexadecimal character to represent four binary characters.

2.3 Ports

2.3.1 External ports

I/O ports allow for additional devices to be connected to a PC. Some ports are designed for a particular type of device, such as a graphics port. Other ports,

such as a USB, support different types of device.

External ports appear at the rear or front of a PC through slots cut into the case. They are part of an expansion card of the motherboard.

2.3.1.1 PC99 connectors

On modern PCs, connectors and ports should conform to the PC99 standard, which defines colour codes for external ports, namely:

PS/2 mouse (green)

PS/2 keyboard (purple) Parallel port (burgundy)

Serial port (turquoise) USB port (colours vary)

RJ-45 network port (colours vary) Audio port (audio in (light blue), audio out (lime) and microphone (pink))

2.3.1.2 Legacy port types

Ports are often described as male, meaning that they have pin connectors, or female, meaning that they have hole connectors. This ‘gender’ orientation

means that it is virtually impossible to connect ports incorrectly.

Page 35: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 30

© CTI Education Group

2.3.2 PS/2 ports

The PS/2 (or mini-DIN) port (Figure 11) is used to connect a keyboard and mouse. Both PS/2 keyboard and mouse ports are 6-pin female. To avoid

confusion, the system case, usually, has symbols and colour coding (green for mouse and purple for keyboard) to differentiate between them. PS/2 is a serial

bus. Note that the sockets are not interchangeable; a mouse plugged into the keyboard port will not function and vice versa.

Figure 11 – PS/2 ports

Source: Doctor [et al.] (2012:145)

2.3.3 Serial ports A serial port (or RS-232) is called such because data is transmitted over one

wire one bit at a time. Start, stop and parity bits are used to format and verify data transmission. A serial port supports data rates of up to 115 kilobits per

second (kbps).

Serial ports are, generally, associated with connecting external modems; this function had largely been superseded by USB.

The RS-232 standard for serial ports specified a 25-pin interface, however, in

practice, PC manufacturers use the cheaper 9-pin D-shell port (see Figure 12). A serial port is also referred to as a ‘communication (COM) port’.

Page 36: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 31

© CTI Education Group

2.3.4 Parallel ports

A parallel port, also known as the ‘printer’ or ‘Centronics port’, is called such because data is transferred simultaneously over eight wires (there are extra

‘handshake’ wires for controlling the signals) (see Figure 12). This restricts the maximum length of cabling as tiny differences in the properties of wires cause

delays in the signal (data skew), which get worse the farther the signal travels.

2.3.5 VGA ports The distinctive blue, 15-pin VGA port (HD15F/DE-151) (Figure 12) is the

standard analogue video interface for PC devices. Almost all graphics adapters and display screens continue to support it.

Figure 12 – Parallel, VGA and serial ports

Source: Doctor [et al.] (2012:138)

The connector is a D-shell type (HD15M) with screws to secure it to the port.

The interface is analogue, meaning that it carries a continuous, variable signal. The interface carries red, green and blue (RGB) component video signals.

Better quality cables (generally speaking, the thicker the better) use shielded

coaxial wiring and support longer lengths at better resolutions. Low quality cables may only be able to support 800 x 600. Such cables may be marketed

with the highest resolution that such can support (ultra extended graphics array (UXGA), 1 600 x 1 200, for instance).

Page 37: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 32

© CTI Education Group

2.3.6 USB ports

The USB (Figure 13) has become the standard means of connecting plug-and-play peripheral devices to PCs. Unlike serial and parallel ports, USB supports

compact connectors and high data rates.

Figure 13 – USB ports

Source: Doctor [et al.] (2012:140)

A USB consists of a host controller and up to 127 devices. A device can be a hub (providing ports for additional devices) or function. Functions are divided

into classes, such as human interfaces (keyboards and mouses), mass storage devices (disk drives), printers, audio devices and so on. Power is supplied by

the host at 5V and a single device may draw up to 500 mA or 2.5W. Devices, such as compact disc (CD) writers or printers, requiring more power, must be

connected to an external power supply.

Another feature of USB is that the bus supports hot swapping. A PS/2, serial or

parallel device may require the system to be restarted as devices are added or removed. A USB host can detect and configure a hot swappable device without

requiring a restart.

Table 1 provides a summary of USB speeds:

Table 1 – USB speeds

Source: Doctor [et al.] (2012:157)

Page 38: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 33

© CTI Education Group

There are two types of standard USB connector, namely:

1. Type A: for connecting to a host or hub port 2. Type B: for connecting to a device

The USB-mini form factor is now deprecated but there are still plenty of

devices that require such. There are mini Type A and Type B standards; the Type B plugs and receptacles predominate (Figure 14):

Figure 14 – USB-mini Type B connectors

Source: Doctor [et al.] (2012:231)

USB-mini has five pins rather than four; the extra pin is designed to support the USB on-the-go (OTG) specification that allows for a port to function as

either a host or device. For example, a port on a smartphone might operate as a device when connected to a PC and as a host when connected to a keyboard.

The extra pin communicates which mode the port is in.

The USB-micro was specified in 2007 and is now the preferred format. Micro connectors are about half the thickness of mini connectors. Like USB-mini,

there are five pins to support USB OTG. There are receptacles that can accept either micro Type A or Type B (Figure 15):

Figure 15 – USB-micro Type B connector

Source: Doctor [et al.] (2012:231)

Page 39: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 34

© CTI Education Group

There is also USB 3 whose receptacles often have a blue connector tab to distinguish them. USB plugs and receptacles have nine contacts rather than

four but the Type A plugs are physically compatible with older USB ports. For example, you can plug a USB 3 device into a USB 2 port and it will work at

high speed data rates or, conversely, you can plug a USB 2 device into a USB 3 port and it will work at high speed rates. USB 3 Type B cables and plugs are

not compatible with USB 1.1 or USB 2.0 devices.

The maximum cable length for low speed devices is three metres while for full speed and high speed the limit is five metres. Vendors may, however, provide

longer cables. Super speed capable cables do not have an official maximum length, however, up to about three metres is recommended.

2.3.7 SCSI

The SCSI uses a parallel data stream with hardware handshaking and control signals. One SCSI host bus adapter (HBA), also known as a ‘host adapter’, can

control multiple devices attached via internal ribbon cables or external SCSI cables. The SCSI standard also defines a command language that allows for

the host adapter to identify which devices are connected to a bus and how they are accessed.

There are many different SCSI standards and types, thus configuration is

relatively complex. SCSI devices are, typically, used on server class hardware

rather than on desktop PCs.

There are numerous SCSI connectors. The most common are:

IDCSO: a 50-pin internal connector used with early SCSI devices (SCSI-1) CN50: a 50-pin Centronics style connector used for external connections in

early SCSI devices D825: a 25-pin connector used primarily by Apple and Iomega (zip drives)

H068: a 68-pin connector used for internal and external ports; 68-pin adapters support wide SCSI

Single connector attachment (SCA): an 80-pin connector that incorporates a power connector and configuration wires, allowing for hot swappable drives

2.3.8 IEEE 1394 (Firewire)

The Firewire bus, based on the IEEE 1394 standard, is another modern serial bus. IEEE 1394 was developed from SCSI but uses serial rather than parallel

communication as well as much smaller connectors. Firewire is similar to USB but has not received such mainstream support from PC vendors. If a

motherboard does not provide Firewire ports, an expansion card can be fitted.

Page 40: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 35

© CTI Education Group

A single bus can connect up to 63 devices. As in the case of USB, the bus is powered and supports plug-and-play as well as hot swapping. The maximum

transfer rate is 400 mbps. Firewire supports an isochronous transfer mode where the data rate to a particular device is guaranteed, making it well

matched to the transfer of real-time data, such as video. The original Firewire 400 standard uses 6-pin ‘alpha’ connectors and cabling (Figure 16):

Figure 16 – Firewire 6-pin port

Source: Doctor [et al.] (2012:141)

The maximum cable length between two devices is 4.5 metres. There is also a

4-pin unpowered connector, often referred to as ‘i.LINK’.

The IEEE 1394b (Firewire 800) standard supports transfer rates of up to 800

mbps and increased power from the bus (up to 45W) to support larger devices without the need for a separate power source. Firewire 800 uses 9-pin ‘beta’

connectors and cabling. Older devices can be plugged into a port using a 6-pin to 9-pin converter (‘bilingual’) cable.

IEEE 1394b also supports different cabling media for networking use over

longer distances (up to 100 metres).

2.3.9 High definition multimedia interface (HDMI) and other

display ports

HDMI (Figure 17) supports both video and audio digital streams as well as remote control and digital content protection. HDMI only carries a digital

signal; it does not support analogue monitors. HDMI uses a proprietary 19-pin Type A connector.

Page 41: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 36

© CTI Education Group

Figure 17 – HDMI interface

Source: Doctor [et al.] (2012:170)

Composite video combines the colour information from the three video

channels (RGB) into a single signal (Figure 18). It is an analogue only interface. Composite video, typically, uses a single Radio Corporation of

America (RCA) jack (often colour-coded yellow).

Figure 18 – Composite video cable

Source: Doctor [et al.] (2012:171)

S-video (Figure 19) carries an analogue video signal. In Europe, the Scart connector is more common even though such is not supported on PC

equipment. S-video, typically, uses a 4-pin mini-DIN connector.

Figure 19 – S-video 7-pin port

Source: Doctor [et al.] (2012:172)

Component (RGB) video uses three RCA jacks. Component video has higher

bandwidth than S-video or composite video feeds and is widely found on better quality audio-visual equipment.

Page 42: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 37

© CTI Education Group

2.4 Peripheral devices

2.4.1 Input devices Basic input devices are peripherals that enable a user to enter data and select

commands.

2.4.1.1 Keyboards

A keyboard (Figure 20) is the longest serving type of input device. Historically, keyboards are connected via a 6-pin mini-DIN PS/2 port. This is coloured

purple to differentiate it from the identical mouse connector. Many keyboards are now USB or wireless (infrared or Bluetooth).

Figure 20 – A standard U.S. keyboard layout

Source: http://en.audiofanzine.com/pc-keyboard-and-mouse/dell/l100-standard-

keyboard/user_reviews/r.102614.html

Extended PC keyboards feature a number of special command keys (<Alt>

and <Ctrl>) as well as keys, such as <Print Screen>, <Num Lock>, <Scroll Lock>, <Start>, <Shortcut> and <Function>. A numeric keypad

can function as a calculator or as an additional set of arrow keys (the function is toggled by <Num Lock>). Multimedia keyboards may also feature

programmable keys and buttons that can be used for web browsing, playing music, etc.

2.4.1.2 Mouses

A mouse is the main type of input device for graphical software. Mouses use

the same interface as keyboards (the PS/2 port is colour-coded green).

There are three types of mouse:

1. Mechanical mouse: this contains rollers to detect the movement of the ball

housed in the mouse case. As the user moves the mouse on a mat or other firm surface, the ball is moved and the rollers and circuitry translate the

motion to move a cursor on the screen 2. Optical mouse: this uses LEDs to detect movement over a surface

3. Laser mouse: this uses an infrared laser, which gives greater precision than an optical mouse

Page 43: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 38

© CTI Education Group

Another distinguishing feature of different mouse models is the number of buttons (between two and four), which can be customised to different

functions as well as the presence of a scroll wheel, used for scrolling and as an extra clickable button.

Mouses are also distinguished by their size and shape. Smaller mouses are

useful with portable systems whereas others are marketed on the basis of their ergonomic shape.

2.4.1.3 Joysticks/game pads

PC games are mostly designed for use with a mouse and keyboard but some

games (for example, flight simulators) benefit from the use of a joystick or

game pad. Historically, joysticks used a DB-15 port, usually located on the sound card, but now devices use USB connectors. Joysticks can also be used

as input devices by people who have difficulty using a mouse or keyboard.

2.4.1.4 Biometric devices

Biometric devices are used to perform authentication (identifying someone as a valid user of a computer or network). Biometric devices associated with

computer equipment tend to be thumb- or fingerprint readers. These may be standalone devices connected via a USB port or incorporated onto a computer

chassis, keyboard or mouse.

2.4.1.5 Scanners

A scanner (Figure 21) is an input device that allows for information, such as

images or text, to be input into a computer. It can read images or text printed on a piece of paper and translates such into a form that the computer can use;

that is, it is used to convert images (photos) and text into a stream of data. Scanners are useful for publishing and multimedia applications.

Figure 21 – Scanner

Source: Doctor [et al.] (2012:179)

Page 44: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 39

© CTI Education Group

2.4.1.6 Bar code readers

Bar code readers are used in places, such as supermarkets, bookshops, etc. A bar code is a pattern printed in lines of different thickness. A bar code reader

scans the information on a bar code and transmits such to a computer for further processing (Figure 22). The system allows for fast and error-free entry

of information.

Figure 22 – Bar code reader

Source: Doctor [et al.] (2012:180)

2.4.1.7 Digital cameras

A digital camera is an input device used mainly to capture images. It takes still

photographs, stores and sends these as digital input. Digital cameras are a modern and popular input device.

2.4.1.8 Touch sensitive screens

A touch sensitive screen is a type of display screen that has a touch sensitive

panel. It is a pointing device that enables a user to interact with a computer by touching the screen. You can use your fingers to directly touch the objects on

the screen. A touch screen senses the touch on an object and communicates the object selection to the computer.

2.4.2 Output devices

Output is anything that comes out of a computer. An output device is capable of presenting information from a computer.

Page 45: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 40

© CTI Education Group

2.4.2.1 Monitors

A monitor (Figure 23) is a commonly used output device, sometimes called a ‘display screen’. It provides a visual display of data and is connected to a

computer. Monitors are similar in appearance to a television set.

Figure 23 – Monitor

Source: http://www.dellauction.com/wl/dell/refurbished-dell-monitors.html

Initially there were only monochrome monitors but, gradually, monitors could display colour. They display images and text; the smallest dot that can be

displayed is called a ‘pixel’ (picture element). The resolution of a monitor improves as the number of pixels increase. Most monitors have a 4:3 width to

height ratio, called ‘aspect ratio’.

The number of pixels that can be displayed vertically and horizontally gives the resolution of a monitor. The resolution of a monitor determines the quality of

the display. Some popular resolutions are 640 x 480 pixels, 800 x 600 pixels and 1 024 x 768 pixels. A resolution of 1 024 x 768 pixels will produce a

sharper image than 640 x 480 pixels.

Page 46: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 2 – System Components Page 41

© CTI Education Group

2.4.2.2 Printers

A printer is an output device that prints text or images on paper or other media, such as transparencies. By printing, you create what is known as a

‘hard copy’. There are different types of printer, which vary in speed and print quality. The two main types are (Figure 24):

1. Impact printers

2. Non-impact printers

Figure 24 – Printer types

Source: Elango [et al.] (2005:87)

Concluding remarks In this unit, we introduced signalling methods used to transmit data over

parallel and serial communication. The fundamental unit of data storage notation in binary and hexadecimal were discussed. Understanding additional

devices and the I/O ports to which they connect was highlighted as useful when designing a computer system for a given scenario.

In the next unit, we will investigate computer system installation.

Self-assessment

Test your knowledge

1. Explain signal transmission in parallel and serial communication.

2. Briefly discuss the types of mouse.

Page 47: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 42

© CTI Education Group

Unit 3: System Installation

Unit 3 is aligned with the following learning outcomes and assessment criteria:

Learning outcomes

LO2 Be able to design computer systems

LO3 Be able to build and configure computer systems

Assessment criteria AC2.1 Produce a computer system design specification to

meet a client’s needs AC3.1 Build and configure a computer system to meet a

design specification

Learning objectives

After studying this unit, you should be able to:

Understand the health and safety procedures associated with computer systems

Understand how a hard drive works and identify related performance factors Understand how a basic redundant array of independent disks (RAID) is

configured

Describe the capabilities and uses of the different types of removable storage

Describe the different types of memory Understand the characteristics of double-sided, dual channel, error checking

and correction (ECC) and registered memory types Understand technologies for improving performance, such as architecture,

multitasking, multiprocessing, multicore and cache Describe features, such as clock speed, overclocking and power

management Understand how to plan for installations and upgrades

Describe the different installation methods Prepare and complete hard disk partitions, file systems and attended

installations

Page 48: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 43

© CTI Education Group

Introduction

In this unit, you will be introduced to health and safety procedures associated with computer systems. Your background pertaining to the different system

components will assist you to further learn about each component and how

such can be installed or removed. The previous unit’s information will also assist you to develop better computer systems by using appropriate system

components. You will, further, learn how to install an OS and how to prepare Windows disk setup using different media options.

3.1 Safety procedures

3.1.1 Health and safety laws

While specific regulations may vary from country to country and state to state, in general, employers are responsible for providing a safe and healthy working

environment. Employees, in turn, are responsible for using equipment in the workplace in accordance with the guidelines given to them as well as to report

hazards. Employees should not interfere with safety systems, including signs, warnings or devices, such as firefighting equipment. Employees should also not

introduce or install any devices, equipment or materials without authorisation or without making a health and safety assessment of such.

A company’s health and safety procedures should be outlined in a handbook, possibly as part of employee induction. Health and safety procedures should:

Identify what to do in the event of fire or other emergency

Identify the responsible individual to contact in case of emergency (for example, for overall health and safety, nominated first aiders, fire marshals,

etc.) Identify hazardous areas in the workplace as well as their associated

precautions Describe best practice for the use and care of the workspace and its

associated equipment Establish an incident reporting procedure for detecting and eliminating

workplace hazards and accidents

Page 49: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 44

© CTI Education Group

The general emergency situation procedure is as follows:

Raise the alarm and contact emergency services, giving them a description of the emergency and your location

If possible, make the scene safe. For example, if faced with a fire, establish that you have an escape route or, if faced with electric shock, disconnect the

power (if it is safe for you to do so) If you have undergone training and it is safe to do so, do what you can to

assist. For example, give first aid or use firefighting equipment

Circumstances could, however, dictate that you do things differently than outlined above. It is thus vital that you keep calm and do not act rashly.

3.1.2 Electricity

Electrical equipment can give an electric shock if such is broken, faulty or incorrectly installed. An electric shock can cause severe burns or even kill.

Know that currents can pass through metal and most liquids, thus neither should be allowed to come into contact with any device installations.

Always disconnect electrical equipment, such as PCs and printers, from any

power sources (including removing laptop batteries) before cleaning or servicing such.

Damaged components or cables are also a risk and should be replaced or isolated immediately. It is important to test electrical devices regularly (the

frequency will depend on the environment in which such is used). Portable appliance testing (PAT) performed by a qualified electrician or technician will

ensure that devices are safe to use.

An electrical device must be fitted with a fuse appropriate to its power output. A fuse blows if there is a problem with the electricity supply, breaking the

circuit to the power source. Fuses come in different ratings, such as 3A, 5A and 13A. A device’s instructions will indicate what rating of fuse to use; most

computer equipment is rated at 3A or 5A. If the fitted fuse is rated too low, it will blow easily; if the rating is too high, it may not blow when it should (this

will allow too much current to pass through a device).

Page 50: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 45

© CTI Education Group

If multiple devices need to be attached to a single power point, an appropriate strip of sockets should be used (Figure 25). If too many devices are attached

to a single point, there is a risk that they will overheat and cause a fire. ‘Daisy-chaining’ one strip to another is not recommended. Strips may be fitted with a

surge suppressor, which provides some protection against surges in the supply.

Figure 25 – Overloaded (left) and proper use (right) of power strips

Source: GTS Learning (2013:5)

3.1.2.1 Equipment grounding

Electrical equipment must be grounded or ‘earthed’. If there is a fault that causes metal parts in the equipment to become live, grounding provides the

proverbial ‘path of least resistance’ for the current to flow away harmlessly. Most computer products (PCs, printers, etc.) are connected to building ground

via power plugs. Note that the large metal equipment racks often used to house servers and network equipment must also be grounded. Never

disconnect a ground wire; if it has to be removed, ensure that it is replaced by a competent electrician.

3.1.2.2 Personal safety

The human body is a conductor and resistor, thus current will pass through it

and make it heat up, manifesting as a burn if the current is strong enough. Current can interfere with the body’s nervous system, which also uses

electrical signals. This might manifest as a spasm or paralysis (from electric

shock) or, in severe cases, cause a heart attack.

High voltages (over 30V) are more dangerous because they have the power to push more current through you (the skin’s resistance drops dramatically at

higher voltages), but it is the current that causes the actual damage (this is why static electricity is not dangerous, despite high voltages). More current will

flow if a larger area of the body is exposed.

Page 51: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 46

© CTI Education Group

Always remember the following:

Do not work on electrical systems (especially an energised circuit) unless you have a good understanding of the risks and appropriate safety

procedures Disconnect the power to a circuit if you must handle such and always test

live parts with a multimeter to ensure that no voltage is present Before performing work within a PC, always remove the power cord. After

removing the cord, hold down the power button for a few seconds to ensure that the circuits are de-energised. Similarly, before opening the chassis of a

laptop, remove the alternative current (AC) adapter and battery Always use properly insulated tools and never grip a tool by its metal parts.

It is especially important not to touch the live parts of multimeter probes as

these may be connected to an energised circuit. Handle the probes by their insulated sheaths only

Take care not to touch any part of a circuit with both hands to reduce the risk of serious shock (the ‘hand in pocket’ rule reduces the chance that

current will pass through your chest) Ensure that your hands and the surrounding working area are dry (sweat

can make your hands more conductive). Do not leave any spill hazards in the vicinity

Do not wear jewellery, a wrist watch or other items, such as name badges, that may dangle and cause a shortcircuit or become trapped by moving

parts

3.1.3 Cathode ray tube (CRT) safety Power supplies, such as those inside system units, CRT monitors, liquid crystal

display (LCD) displays (inverters) and laser printers can carry extremely high levels of voltage. Charges held in capacitors can persist for hours after the

power supply is turned off. You should not open these units unless you have been specifically trained to do so. Adhere to all printed warnings and never

remove or break open any safety devices that carry a warning.

3.1.4 Electric fire Faulty electrical equipment can pose a fire risk. If the equipment allows more

current to flow through a cable than the cable is rated for, the cable will heat up. This could ignite flammable material in close proximity to the cable. If a

wire does start a fire, it is important to use the correct type of extinguisher to put such out. Many extinguishers use water or foam, which can be dangerous

if used near live electrical equipment. The best type to use in such an instance is a carbon dioxide (CO2) gas extinguisher (CO2 extinguishers have a black

label). Dry powder extinguishers can also be used, though these may damage equipment. You should also always ensure that the electricity supply is turned

off. This should happen automatically (the fuses for the circuit should trip) but ensure that you know the location of the power master switches for a building

nonetheless.

Page 52: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 47

© CTI Education Group

3.1.5 Cable management and lighting techniques

A trip hazard is caused by putting objects in people’s paths. When installing equipment, ensure that cabling is secured using cable ties or cable

management products (Figure 26). Ensure that cables running under a desk cannot be kicked out by the user’s feet. Do not run cabling across walkways

and when servicing equipment, do not leave devices in walkways or near the edge of a desk. Be careful when putting heavy or bulky equipment down and

ensure that such cannot topple over.

Figure 26 – Built-in cable management

Source: GTS Learning (2013:7)

Lifting heavy objects in the wrong way can damage your back, however, lifting

and manual handling risks are not limited to particularly heavy objects. An object that is large or awkward to carry could also cause you to trip over or

walk into something. An object that has sharp or rough edges or contains a hot or corrosive liquid could cause you to cut or hurt yourself. If necessary, you

should obtain protective clothing (gloves and possibly goggles).

To lift a heavy object safely, plant your feet around the object with one foot slightly toward the direction in which you are going to move. Bend your knees

to reach the object while keeping your back as straight as possible and comfortable; keep your chin up. Find a firm grip on the object, then lift

smoothly by straightening your legs (do not jerk the object up). Carry the object while keeping your back straight.

To lower an object, reverse the lifting process; keep your chin up and bend at the knees. Take care not to trap your fingers or to lower the object on to your

feet.

If you cannot lift an object because it is too awkward or heavy, get help. If you need to carry an object for some distance, ensure that the route is

unobstructed and that the pathway (including stairs or doorways) is wide and tall enough.

Page 53: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 48

© CTI Education Group

3.1.6 Static electricity and electrostatic discharge (ESD)

Static electricity is a very high voltage stored in an insulated body. Although the voltage is high, the amount of ESD current that it can sustain is very low,

thus static electricity is not that harmful. It can, however, be slightly painful, for example, you may have felt a small shock when reaching for a metal door

handle.

The human body consists mostly of water and so does not generate or store

static electricity very well. Unfortunately, our clothes are often made of synthetic materials, such as nylon and polyester, which act as good generators

of static electricity and provide insulating layers that allow for charges to accumulate.

Humidity and climate also affect the likelihood of ESD. The risk increases

significantly during dry, cool conditions when humidity is low. In humid conditions, such as before or during a storm, the residual charge will bleed into

the environment before it can increase sufficiently to be harmful to electrical components.

A component, such as a memory or logic chip, is composed of fine, conductive

metal oxides deposited on a small piece of silicon. Its dimensions are measured in fractions of a micron (one millionth of a millimetre). Any static

electricity discharged into this structure will flash over (spark) between the

conductive tracks, damaging or even vaporising them. This may make the chip completely unusable. If not, it is likely to fail at some later time. Damage

occurring in this way can be hidden for many months and may only manifest itself in occasional failures.

To protect components and equipment from ESD damage, ensure that your

body and clothing are drained of static electricity before starting work; if possible, work in an uncarpeted area. The simplest (but least effective) means

of self-grounding is to touch an unpainted metal part of a PC (such as the PSU) before you handle a sensitive component. This is only a temporary solution as

static charge could build up again.

Do not leave a PC plugged in when opening the case for a service. Your safety is more important than the risk of damaging some PC components.

Page 54: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 49

© CTI Education Group

Where possible, handle vulnerable components by holding on to the edges of the plastic mounting card; avoid touching the surfaces of the chips themselves.

Using an anti-ESD wrist strap (Figure 27) can dissipate static charges more effectively. Such a wrist band should fit snugly around your wrist to maximise

contact with the skin. Do not wear it over clothing. The wrist strap grounding is achieved by either using a grounding plug that plugs into a wall socket or a

crocodile clip that attaches to a grounded point or an unpainted part of a computer’s metal chassis.

Figure 27 – Anti-ESD wrist strap and grounding cord

Source: GTS Learning (2013:9)

Ensure that the wrist strap has a working current limiting resistor for safety (straps should be tested daily). Do not use a grounding plug if there is any

suspicion of a socket fault, a fault in the building’s electrical wiring or if the wiring is not regularly inspected and tested. An anti-ESD service mat (Figure

28) is also useful. Sensitive components can be placed on the mat safely.

Figure 28 – Anti-ESD service kit with mat

Source: GTS Learning (2013:9)

Page 55: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 50

© CTI Education Group

3.2 Mass storage devices

System memory provides a fast storage medium for the OS and applications, however, it is volatile, meaning that data cannot be stored without a power

supply. Non-volatile storage devices or mass storage devices hold data when a

system is powered off. Removable mass storage devices allow for data to be archived from a PC as well as for such to be transferred between PCs.

Mass storage devices use either magnetic or optical technology to store data.

Storage capacity ranges from 1.44 MB for a standard 3.5" floppy disk to multiple GBs for tape storage.

Some storage devices are fitted as internal components. In the case of

removable storage devices, a drive is positioned at the front of the case so that media can be inserted and removed. HDDs do not need user access and so do

not need to be positioned near a face plate.

External storage devices are increasingly popular for backup and data transfer as they offer more capacity than traditional removable storage disks. A device,

such as an external HDD, would, typically, be connected to a PC via USB or a

Firewire port.

3.2.1 HDDs

Even with the advances in speed and capacity of other types of storage technology, the HDD still remains the primary method of persistent storage.

On a workstation, a HDD will store the OS files, application program files, system software files (such as drivers) and user data. On a server, the HDD

will store individual user files and shared sources of information, such as databases.

Original HDDs stored as little as 10 MB – the same amount of space as about seven floppy disks – but advances in technology have enabled disks of over

1 TB to be created – the same as about 600 000 floppy disks.

3.2.1.1 HDD construction

Data is stored on a number of metal or glass platters coated with a magnetic substance. The top and bottom of each platter is accessed by its own

read/write head, moved by an actuator mechanism. The heads do not actually touch the surface of the platters. The platters are mounted on a spindle and

spin at high speed; the heads ‘float’ above them at a distance of less than a millionth of an inch.

Page 56: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 51

© CTI Education Group

Figure 29 represents this with the following numbered items:

1. Platters 2. Spindle

3. Read/write heads 4. Actuator

Figure 29 – HDD with drive circuitry

Source: GTS Learning (2013:90)

A HDD unit is kept sealed to maintain a constant air pressure (this is important as it keeps the drive heads at the correct distance from the platters) and to

prevent the entry of dust.

Each side of each platter is divided into circular tracks and each track contains a number of sectors, each with a capacity of 512 bytes. The collection of tracks

in the same place on each platter is called a ‘cylinder’. This formatting is also

referred to as the ‘drive geometry’.

HDDs have two main formats, namely:

1. 3.5": the mainstream type used in PCs 2. 2.5": a form factor that is used for laptops and as portable external drives

3.2.1.2 HDD performance

HDD performance is a measure of how fast such can read and write data.

There are a number of factors that determine overall HDD performance.

The first factor is the speed at which the disks can spin (measured in revolutions per minute (RPM)); the higher the RPM, the faster the drive. High

performance drives are rated at 15 000 or 10 000 RPM; the average

performance is 7 200 or 5 400 RPM.

Page 57: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 52

© CTI Education Group

RPM is, further, a factor that determines access time (measured in milliseconds (ms)), which is the delay that occurs as the read/write head locates a

particular position on the drive. A high performance drive will have an access time of below 4 ms; a typical drive might have an access time of around 9 ms.

The internal transfer rate, or data/disk transfer rate, of a drive is a measure of

how fast read/write operations are performed on the disk platters. The external transfer rate, often simply described as the ‘transfer rate’, measures how fast

data can be transferred to the CPU across a bus. Cache memory can help to sustain better transfer rates. A high performance disk may feature a 4 MB or

better cache.

Generally, the burst transfer rate is also quoted; this is the maximum possible

transfer rate under ideal conditions and thus cannot be sustained over long periods of time.

Some HDDs are now being fitted with a substantial cache of flash memory to

improve performance; these are referred to as ‘hybrid drives’.

Another crucial factor that influences HDD performance is reliability. Reliability is rated by various statistics, including mean time between failures (MTBF),

which is the number of hours that a device should operate (under optimum conditions) before a critical incident can be expected, and life expectancy,

which is the duration for which a device can be expected to remain reliable.

All drives now feature self-monitoring analysis and reporting technology (SMART) to pass status information and alerts back to monitoring software.

This can provide advance warning that a drive is about to fail.

Some of the major HDD vendors include Seagate, Western Digital, Maxtor,

Hitachi, Fujitsu, Toshiba and Samsung.

3.2.2 Solid state drives (SSDs)

Solid state storage devices use a type of non-volatile electrically erasable programmable read-only memory (EEPROM), called ‘flash memory’. Flash

memory is non-volatile because it does not need a power source to retain information. Compared to other types of storage, flash memory is very small

and light. Mass manufacturing has seen prices fall to affordable levels as

storage capacity ranges from 512 MB to 256 GB.

Page 58: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 53

© CTI Education Group

Flash memory is also being incorporated into a new generation of SSDs designed to replicate or supplement the function of HDDs (Figure 30):

Figure 30 – HP SSD with SATA interface

Source: GTS Learning (2013:92)

The advantages of flash memory-based SSDs are that the lack of moving parts makes them quieter, more power efficient and less prone to catastrophic

failure. Read times are enhanced because seek time and, consequently, the effect of file fragmentation, is eliminated. They are also less susceptible to data

loss in the event of power failure.

The main disadvantage is the high cost; a 64 GB SSD costs slightly more than a 2 TB HDD (a 1 TB SSD can cost the same as a top-end server). SSDs can

also perform worse than HDDs when writing data and serving large files. Flash

chips are, further, susceptible to their own type of degradation over the course of many write operations, thus the OS must use wear levelling routines to

optimise the usable life of the device.

SSDs are available as either standalone units or hybrid drives. In a hybrid drive, the SSD portion functions as a large cache, containing data that is

accessed frequently. The magnetic disk is only spun up when non-cached data is accessed. This reduces power consumption but can degrade performance.

Page 59: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 54

© CTI Education Group

3.2.3 HBAs

HBAs provide a connection point for internal mass storage devices, such as hard drives, CD/digital versatile disc or digital video disc (DVD) drives and tape

drives. The interface between these drives, the host adapter and the rest of the system is a type of bus. There are three main bus standards for attaching

internal storage devices to a PC, namely:

1. Parallel advanced technology attachment (PATA)

2. Serial advanced technology attachment (SATA) 3. SCSI

HBAs are commonly described as ‘drive controllers’. Technically, a controller is

the circuitry in a disk that allows for such to put data on a bus, which the HBA shuttles to the CPU or RAM.

3.2.3.1 PATA

The PATA interface was the principal mass storage interface for desktop PCs

for many years. PCs supporting PATA may come with one or two host adapters or channels, called ‘primary integrated drive electronics’ (PRl IDE) or

‘secondary IDE’ (SEC IDE).

A single PATA channel is now more typical if the motherboard also supports

SATA. Each PATA channel supports two devices (0 and 1); they are, usually, labelled as ‘master’ and ‘slave’.

Page 60: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 55

© CTI Education Group

A PATA drive features a 40-pin port but, typically, uses 80 wire-shielded cables (required for UDMA4 or better transfer modes). A PATA cable is supposed to be

up to 18" long. Each PATA cable, typically, has three connectors, one for the motherboard and one for each device. Most new cables are ‘cable select’,

which allows for the master and slave devices to be identified by the position of the connector on the cable (Figure 31). Pin 1 on the cable must thus be

oriented with pin 1 on the connector. On the cable, pin 1 is identified with a red stripe. The connectors are also keyed to prevent them from being inserted

the wrong way around.

Figure 31 – Cable select PATA

Source: GTS Learning (2013:94)

3.2.3.2 SATA

SATA (Figure 32) was developed to address the limitations of PATA. It is now

the most popular means of attaching internal storage drives, though most motherboards retain at least one PATA host adapter.

Figure 32 – SATA cable

Source: GTS Learning (2013:95)

Page 61: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 56

© CTI Education Group

As the name suggests, SATA transfers data in serial format. This allows for thinner, longer, more flexible cables (up to 39") with smaller 7-pin connectors.

Each SATA host adapter supports a single device.

The first commercially available SATA standard supported speeds of up to 1.5 gigabytes per second (gbps). This standard was quickly augmented by SATA

Revision 2 (3 gbps) and then SATA Revision 3 (6 gbps).

Another key advantage of SATA over PATA is that SATA is a hot swappable interface. This means that a compatible drive can be connected or

disconnected while the system is running.

3.2.3.3 External hard disks

External hard disks have become very popular for backup, additional storage

and as a means of transferring files. Some external disks are designed for capacity (from 200 to 500 GB) while others are designed for portability.

External disks are, typically, packaged in a drive enclosure. The drive

enclosure provides USB or Firewire ports; some models support Ethernet network connections (referred to as ‘network attached storage’ (NAS)). The

drive enclosure also provides for an external power supply, if the drive is too large to be powered over USB, and the casing protects the drive from damage.

3.2.4 Installing disk drives

Storage devices are located in 3.5" (hard and floppy drives) and 5.25" bays (CD/DVD and tape drives) (Figure 33):

Figure 33 – HP Compaq showing Bezel (1) and 5.25" (2) drive bays

Source: GTS Learning (2013:96)

Page 62: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 57

© CTI Education Group

When adding or removing storage devices (or performing any type of work inside the PC case), ensure that you make a backup of any data stored on local

drives.

Before you remove storage devices, you should remove the power supply and signal cables. Signal (or data) cables are flat, grey ribbon cables that connect

the device to the adapter card or motherboard (Figure 34). Try to pull the plug rather than the cable; hard drive (Molex) power connectors have special

‘shoulders’ for this purpose (Figure 35):

Figure 34 – Removing data cables

Source: GTS Learning (2013:97)

Figure 35 – Removing Molex connectors

Source: GTS Learning (2013:97)

Once the cables have been removed from the storage device, undo the screws

that hold such to the case (Figure 36):

Figure 36 – Unscrewing a drive unit

Source: GTS Learning (2013:97)

Page 63: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 58

© CTI Education Group

If the device does not slide out backwards, try sliding it out forwards (Figure 37). You may have to remove the front panel of the PC in such a case.

Figure 37 – Removing storage devices

Source: GTS Learning (2013:97)

Some drives are stored in caddies that screw into the case. To remove the

drive you may first need to unscrew the caddy. In most cases, you will need to remove the second side panel.

3.2.4.1 Installing PATA disk drives

PATA supports two devices per channel (port). One device on each channel

must be configured as the ‘master’ and the other as the ‘slave’. The general norm is to configure the main hard disk (boot disk) as the primary master and

the additional device (such as an optical drive) as the secondary master. Third

and fourth devices should be configured as slaves on each channel. If there are insufficient PATA ports, a HBA card can be used.

To install a PATA disk drive, follow the following procedure:

Locate a spare 3.5" drive bay or remove an existing unit by unplugging the

cables from the back and then unscrewing the drive from the chassis. Some drives screw directly onto the chassis while others are screwed onto rails so

that the drive can be slid in and out (this also, usually, means that you do not have to remove the secondary panel) or screwed into a removable cage.

Hard drives can be oriented horizontally or vertically

Page 64: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 59

© CTI Education Group

Set the jumpers on the drive to indicate whether it is master, slave or cable select. A jumper is set by sliding the clip over two of the available pins (you

can use your fingers or needle nose pliers to position the clip) (Figure 38). The jumper diagram is, usually, printed on the drive, otherwise consult the

drive vendor’s documentation

Figure 38 – Hard drive with Molex power connector (1), configuration jumper (2)

and PATA port (3)

Source: GTS Learning (2013:98)

Screw the drive into the bay. Do not over tighten the screws Connect the PATA cable to the drive, taking care that pin 1 on the cable and

port are oriented correctly (most ports have a notch to help orient the

cable). If using cable select, ensure that you attach the correct connector; PATA cables are often quite short and bulky making connecting two drives a

troublesome task, especially if they are not in adjacent bays Connect the other end of the PATA cable to the appropriate IDE channel port

on the motherboard (Figure 39):

Figure 39 – IDE ports on the motherboard

Source: GTS Learning (2013:99)

Connect a spare Molex connector from the power supply to the 4-pin port on the drive. The connectors are keyed so that you cannot insert them the

wrong way around Check that the cables are all secure and then refit the parts of the case.

Ensure that cables do not restrict air flow around the case or obstruct the operation of fans, especially around the CPU, memory and graphics adapter.

Use cable ties to keep cabling neat and tidy

Page 65: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 60

© CTI Education Group

Once the drive has been physically installed, there are two further checks that need to be performed before such can be used:

1. Check that the device has been recognised by the computer’s BIOS. If the

drive is not listed in the startup configuration pages, enter CMOS Setup and check that the drive’s host adapter is enabled

2. When the drive is recognised in BIOS, you can access such using Windows Setup or the OS to format and partition it. Partitioning the drive defines

one or more discrete storage areas on the same physical disk. This is useful for installing multiple OSs or for defining system and user data storage

areas. You may see references to ‘low-level formatting’; this is the division of the disk surface into sectors. This is done at the factory by the

manufacturer. Each partition can be formatted using a different file system

(in Windows this means either file allocation table (FAT) or new technology file system (NTFS)). The choice of file system is driven by software

compatibility

3.2.4.2 Installing SATA disk drives

SATA configuration is much simpler than PATA. Each drive is connected to a SATA port on the motherboard or to a SATA host adapter (Figure 40). The

connectors are keyed to prevent incorrect insertion. There are no device settings to configure, thus, generally speaking, you should install the boot

drive into the lowest numbered port (SATA0).

Figure 40 – SATA ports

Source: GTS Learning (2013:100)

Some drives only feature newer SATA power connectors. If your PSU does not have any SATA power connectors, you will need an adapter to connect a Molex

power connector to such. If the drive has a Legacy Molex power connector, you should only use one of the connectors (do not plug a power cable into both).

Page 66: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 61

© CTI Education Group

3.2.4.3 Installing SCSI disk drives

Depending on the age of the equipment, SCSI configuration can be quite complex so you should refer to the vendor’s setup instructions carefully. Try to

ensure that equipment configuration and service records are kept up-to-date so that you have accurate documentation about the SCSl configuration.

To install a SCSI disk drive, follow the following procedure:

Check that the drive is a SCSI type that is compatible with the host adapter

If necessary, set the device identity (ID) to a unique number on the chain. On an internal device, the ID is, usually, configured via jumpers using the

settings diagram provided by the vendor; external devices, usually, have

click wheels. A wide SCSI bus allows for IDs from 0 to 15; the boot hard drive is, usually, set to ID 0. You should not use ID 7 as this is, normally,

reserved for the host adapter. The host adapter may configure device IDs automatically

Enable or disable lamination on the device (the first and last devices in a chain must be terminated).This may be configured via a jumper setting or

by physically installing a terminator onto the device Screw the drive into the bay and connect it to the host adapter using a

suitable SCSI cable Connect to the power supply using a Molex connector

3.2.4.4 Installing SSDs

A SSD uses flash memory instead of glass platters and read/write heads. A

hybrid drive is a normal HDD with a large flash memory cache. SSDs use the

SATA interface and are thus installed in the same way as a HDD.

3.2.5 RAID

With RAID, hard disks can act as backups for each other to increase reliability and input tolerance or they can act together as one very large drive.

RAID can also mean ‘redundant array of inexpensive disks/devices’.

The RAID Advisory Board defines RAID levels. The most common levels are

numbered from 0 to 6, where each level corresponds to a specific type of fault

tolerance. Only levels 0, 1 and 5 are of relevance at desktop level.

It is possible to implement RAID using either hardware or software.

Page 67: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 62

© CTI Education Group

3.2.5.1 Hardware solutions

A hardware solution refers to creating volumes from an array of physical disks; it is an operation supported by a plug-in controller card or by the motherboard,

independent of the installed OS (Figure 41). Hardware solutions are principally differentiated by their support for RAID levels. Entry-level controllers might

support only RAID 0 or 1 while mid-level controllers might add support for RAID 5 and 10.

Figure 41 – Configuring a volume using RAID controller firmware

Source: http://www.adrc.com/raid-10.html

In addition, hardware RAID is able to hot swap a damaged disk (replace the

failed unit without shutting down Windows), thereby keeping the system operational at all times. When a new disk is installed, the RAID controller

transparently synchronises such with the remaining disks in the set.

On the downside, hardware RAID is more expensive than a software solution and may lock you into a single vendor solution.

Older hardware RAID solutions used SCSI disks. Modern low cost solutions

may use SATA while serial attached SCSI (SAS) is a popular technology for server machines.

3.2.5.2 Software solutions

Windows provides the option to set up software-based RAID using standard disks and controllers, however, most desktop versions of Windows are

restricted to striping, which provides no fault tolerance. In a software solution, IDE/advanced technology attachment (ATA) and SCSI disks can be combined

in an array (USB or Firewire connected drives are not supported). A software solution is cheaper as RAID controller cards can be expensive.

Page 68: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 63

© CTI Education Group

3.2.5.3 Hot swappable drives

A system configured for RAID might support hot swappable drives. While this is, usually, a server feature it might be implemented on high-end workstations.

Rather than using cabled connectors, hot swappable drives plug (or ‘mate’) into a combined data and power port on the enclosure. This means that drives

can be easily added and removed from the front of the case without having to open the chassis. The drives are secured and released from the enclosure

using a latch (Figure 42):

Figure 42 – HP MediaSmart server with hot swappable drive enclosure

Source: GTS Learning (2013:105)

3.3 Removable storage

3.3.1 Optical disc storage CDs and DVDs, depending on who you believe, are mainstream storage

formats for consumer multimedia, such as music and videos. Both formats have been adapted for data storage to use with PC systems. CD and DVD

drives used with PCs can also play consumer versions of discs.

The data version of a CD (CD-read-only memory (CD-ROM)) became ubiquitous on PC systems as such has sufficient capacity (700 MB) to deliver

most software applications. DVD is an improvement on CD technology and delivers substantially more capacity (up to 17 GB). DVDs are used for software

installations (Windows Vista and Windows 7) as well as for games and multimedia.

3.3.1.1 CD construction

A CD is a layer of aluminium foil encased in protective plastic, which can also incorporate a label or screen printed image on the non-playing side. The foil

layer contains a series of pits and spaces (called ‘lands’), arranged in a spiral. The changes between pits and lands are used to encode each bit. A standard

CD is 120 millimetre (mm) in diameter and 1.2 mm thick.

Page 69: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 64

© CTI Education Group

3.3.1.2 Recordable CDs (CD-R)

A recordable version of a CD (CD-R) was developed in 1999. Rather than a premastered layer of foil with pits and lands, CD-Rs feature a layer of

photosensitive dye. A special laser is used to transform the dye, mimicking the pits and lands of a normal CD, in a process, called ‘burning’. Most ordinary CD

players and drives can read CD-Rs but they may not play back properly on older equipment.

CD-R is a type of write once read many (WORM) media. Data areas, once

written, cannot be overwritten. However, a rewritable (or multisession) disc format (CD-RW) has also been developed. This uses a heat sensitive

compound with properties that can be changed between crystalline and

amorphous by a special laser. There is some concern over the longevity of recordable CDs and DVD media as cheaply manufactured discs have shown a

tendency to degrade and become unusable (sometimes over the space of just a few years).

3.3.1.3 CD drives

A CD drive consists of a spindle motor (to spin the disc), laser, lens (to read

the disc) and tracking system (to move the laser and lens assembly). The mechanism for inserting a CD is either tray- or slot-based. A drive may feature

audio play and volume control as well as a headphone jack. Drives are considerably larger than herd discs (5.25").

Drives also feature a small hole that accesses a disc eject mechanism (insert a

paperclip to activate the mechanism). This is useful if the standard eject

button will not work or if the drive does not have power.

CD drives are rated according to their data transfer speed. The original drives had a data transfer rate of 150 kbps. Subsequently, drives are available that

offer multiples of the original rate; this would be around 52 for new models, offering transfer rates in excess of 7 mbps.

Many CD drives also function as recordable/rewritable CD burners or writers.

Such drives feature three speeds, always expressed as the record/rewrite/read speed (for example, 24X/16X/52X). A feature to look out for on such drives is

burn-proof technology, which prevents discs from being ruined by buffer under run errors (where the software cannot supply the drive with the data to write

quickly enough).

Page 70: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 65

© CTI Education Group

3.3.1.4 DVDs

A DVD is similar to a CD but with a different encoding method, higher density discs and a shorter wavelength laser. DVD discs are also thinner and can be

dual layer and/or double-sided (a DVD is two 0.6 mm discs sandwiched together). The different permutations result in the storage capacities in Table

2:

Table 2 – DVD storage capacities

Standard Capacity Description

DVD-5 4.7 GB Single layer and single-sided

DVD-9 8.5 GB Dual layer and single-sided

DVD-10 9.4 GB Single layer and double-sided

DVD-18 17.1 GB Dual layer and double-sided

DVD-video Up to 17.1 GB

Commercially produced DVDs using mpeg encoding and

chapters for navigation (can be single or dual layer and

single- or double-sided)

DVD-audio 8.5 GB Format for high quality audio (superior sampling rates

and 5.1 surround sound)

Source: GTS Learning (2013:109)

DVDs also feature a higher transfer rate, with multiples of 1.32 mbps

(equivalent to 9X CD speed). The fastest models feature a 16X read speed.

Similar to CDs, some DVDs are recordable and rewritable; some even support

dual layer recording.

There are two slightly different standards for recordable (DVD-R) and rewritable (DVD-RW) DVDs, namely, DVD+R and DVD+RW. Most drives can

read all formats but write in either + or - format. Many consumer DVD players can play DVD±R discs.

Consumer DVDs, further, feature copy protection mechanisms (digital rights

management) and region coding. Region coding, if enforced, means that a disc can only be used on a player from the same region.

Some DVD players are ‘multiregion’ but some discs feature protection

mechanisms that disable playback in such machines. PC software is, usually, not region coded, with the exception of some PC game discs.

Page 71: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 66

© CTI Education Group

3.3.1.5 Blu-ray discs

Blu-ray discs (BDs) have emerged as the next generation format for distributing consumer multimedia and are also likely to be used to distribute

high bandwidth applications, such as video games.

Blu-ray is principally required to cope with the demands of high definition (HD) video recording and playback. HD requires more bandwidth and storage space

because it uses a much higher resolution picture (1 920 x 1 080 compared to 720 x 480 or 720 x 576) and better quality audio (digital surround sound).

A BD works on fundamentally the same principle as DVD but with a shorter

wavelength laser (a 405 nanometre (nm) blue laser compared to a DVD’s 650

nm red laser). This means that the discs can be higher density though the cost of components to make such is considerably greater.

A standard BD has a capacity of 25 GB per layer whereas mini-discs can store

7.8 GB per layer. Dual, triple and quad layer discs are available but there are currently no double-sided formats.

The base speed for Blu-ray is 4.5 mbps and the maximum theoretical rate is

12X (54 mbps). Currently, most drives are 4X or 8X; 2X is the minimum required for movie playback.

Generally speaking, BD players are also capable of CD and DVD playback.

Recordable (BD-R) and re-recordable (BD-RE) drives and discs are also available. BD-R is often available at the same speed as playback while BD-RE

is, usually, half of playback speed.

Similar to DVDs, consumer BDs are likely to be digital rights management

protected and may be region coded.

3.3.2 Installing optical or tape drives

Installing an optical (CD, DVD or Blu-ray) drive or tape drive is fundamentally the same as installing a HDD, except that you will fit it to a 5.25" drive bay.

You may also need to remove a plate from the front Bezel. Most optical and tape drives need to be oriented horizontally.

Drives can be PATA, SCSI or SATA. PATA and SCSI configuration on these devices is the same as for HDDs.

Page 72: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 67

© CTI Education Group

3.3.2.1 Flash memory devices

There are many ways of packaging flash memory. One of the most popular is a USB or ‘thumb’ drive. This type of drive simply plugs into any spare USB port.

Another popular type of packaging is a memory card, used extensively in

consumer digital imaging products, such as digital still and video cameras. There are several proprietary types of memory card. Some popular examples

include compact flash (CF), secure digital (SD), Sony Memory Stick and xD. The largest cards have up to 128 GB storage capacity.

Many PCs are fitted with memory card readers with slots that will

accommodate most of the sticks on the market.

Another use for flash memory is as the main storage for electronic devices,

such as smartphones, mp3 players and so on.

Data transfer rates vary quite widely between different devices, which are rated on the same system as CDs, using multiples of 150 kbps, with the fastest

devices working at up to 200X read speed (or 38 mbps, where the write speed is, typically, about two-thirds of the read speed).

3.3.2.2 Tape drives

Magnetic tape drives provide a low cost per byte method of creating system

backups. They may be internal or external units, supplied with SCSI, USB or Firewire interfaces. Some of the most popular formats are:

Quarter-inch cartridge (QlC): this is the oldest tape drive format still in use. Tapes can store up to 4 GB. The Travan backup format is a development of

the QIC system; tapes can store up to 10 GB of uncompressed data Digital audio tape (DAT): this uses a digital format. DAT backup systems

conform to a standard, called ‘digital data storage’ (DDS), and support up to 36 GB of uncompressed capacity

8 mm tape systems: these offer up to 200 GB capacity storage in a cartridge that appears identical to 8 mm video tapes, although it uses a much higher

quality magnetic media. The 8 mm standard was mainly developed by the Advanced Intelligent Tape (AIT) Forum, sponsored notably by Sony

Page 73: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 68

© CTI Education Group

3.4 System memory

3.4.1 Memory types System memory is the main storage area for programs and data when a

computer is running. System memory is necessary because it is much faster than accessing data in a mass storage system, such as a HDD.

System memory is a type of volatile memory, namely, RAM. ‘Volatile’ means

that data is only retained in the memory chips while there is a power source.

Non-volatile memory does not require a constant power source to store data. Examples include ROM and flash memory.

A large quantity of system memory is essential for the running of a PC. It

determines the PC’s ability to work with multiple applications at the same time

as well as with larger files. Each new generation of software tends to take up more memory space. If there is not enough system RAM, the memory space

can be extended by using disk space (virtual memory), however, as noted above, accessing the HDD is very slow compared to accessing RAM.

Some notable RAM vendors include Kingston, Crucial (Micron), Corsair, PNY

and Integral.

A number of different RAM technologies have been used for system memory in PCs over the years.

3.4.1.1 Dynamic RAM (DRAM)

DRAM stores each data bit as an electrical charge within a single bit cell. A bit

cell consists of a capacitor to hold the charge that the cell represents (1 if

there is a charge and 0 if there is not) and a transistor to read the contents of the capacitor.

Each bit cell is very small thus the electrical charge gradually dissipates,

causing the memory cell to lose its information. In order to preserve information, DRAM has to be refreshed periodically by accessing each bit cell at

regular intervals. These refresh cycles slow down the DRAM operation but it supports high densities (more MB per memory module) at relatively low cost.

3.4.1.2 Synchronous DRAM (SDRAM)

Many different types of DRAM have been developed and become obsolete. In

the mid-1990s, variants of SDRAM were used for system memory. SDRAM is called such because it is synchronised to the system clock. It has a 64-bit data

bus and runs at the speed of the FSB.

Page 74: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 69

© CTI Education Group

Table 3 summarises SDRAM:

Table 3 – SDRAM

Model Clock speed Bandwidth

PC66 66 MHz 533 mbps

PC100 100 MHz 800 mbps

PC133 133 MHz 1 066 mbps

Source: GTS Learning (2013:117)

SDRAM works with Pentium, Pentium MMX, Pentium II and Pentium III Intel CPUs (as well as with their AMD K5/6/7 and Athlon equivalents).

SDRAM for desktop PCs is packaged in 168-pin DIMMs (Figure 43). The

notches (keys) on the module prevent it from being inserted into a slot the wrong way around. Memory slots look similar to expansion slots but have

catches on each end to secure the memory modules.

Figure 43 – SDRAM packaged in a 168-pin DIMM

Source: GTS Learning (2013:117)

3.4.1.3 Double data rate SDRAM (DDR SDRAM)

DDR SDRAM is an updated type of SDRAM, where data is transferred twice in one cycle (‘double-pumped’). DDR is very popular and used on many

motherboard designs for both Intel and AMD CPUs. There are four DDR standards, matching different system clock speeds (Table 4):

Table 4 – DDR SDRAM

Type Bus speed Maximum data rate

DDR-200/PC-1600 100 MHz 1.6 gbps

DDR-266/PC-2100 133 MHz 2.1 gbps

DDR-333/PC-2700 167 MHz 2.7 gbps

DDR-400/PC-3200 200 MHz 3.2 gbps

Source: GTS Learning (2013:119)

Page 75: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 70

© CTI Education Group

SDRAM is referred to by clock speed (PC66, PC100 and PC133). DDR and Rambus chips are labelled using the maximum theoretical bandwidth

(PC-1600, PC-2100, etc.), largely for marketing reasons. For example, DDR-200 refers to the bus speed (100 MHz double-pumped) and PC-1600

refers to the peak bandwidth (200 MHz x 8 bytes).

DDR is being replaced by DDR2 and DDR3 SDRAM (Table 5); these increase bandwidth by doubling or quadrupling the bus speed (as opposed to the speed

at which the actual memory chips work). This produces scalable speed improvements without making the chips too unreliable or hot. The drawback is

increased latency as data takes longer to access on each chip. Latency is offset by improving the memory circuitry.

Table 5 – DDR2 and DDR3 SDRAM

Type Memory speed Bus speed Maximum data rate

DDR2-400/PC2-3200 100 MHz 200 MHz 3.2 gbps

DDR2-533/PC2-4300 133 MHz 266 MHz 4.3 gbps

DDR2-667/PC2-5300 166 MHz 333 MHz 5.2 gbps

DDR2-800/PC2-6400 200 MHz 400 MHz 6.4 gbps

DDR2-1066/PC2-8500 266 MHz 533 MHz 8.5 gbps

DDR3-1333/PC3-8500 133 MHz 533 MHz 8.5 gbps

DDR3-1600/PC3-10600 166 MHz 667 MHz 10.66 gbps

DDR3-1600/PC3-12800 200 MHz 800 MHz 12.8 gbps

DDR3-1866/PC3-14900 233 MHz 933 MHz 14.933 gbps

DDR3-2133/PC3-17000 266 MHz 1 066 MHz 17.066 gbps

Source: GTS Learning (2013:119)

There is also a graphics double data rate (GDDR) type of memory, which is a

type of graphics card memory similar to DDR2 and DDR3.

The data rates quoted for RAM are maximum peak rates; actual throughput will thus vary.

Page 76: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 71

© CTI Education Group

DDR for desktop system memory is packaged in 184-pin DIMMs whereas DDR2 and DDR3 are both packaged in 240-pin DIMMs but are not compatible (the

modules and slots are keyed differently) (Figure 44). Faster modules, typically, feature heat sinks because of the higher clock speeds.

Figure 44 – Corsair ValueSelect DDR2 SDRAM packaged in a 240-pin DIMM

Source: GTS Learning (2013:120)

3.4.1.4 Rambus DRAM (RDRAM)

RDRAM is proprietary memory technology developed by the Rambus Corporation. It was used with some Pentium 4 motherboards (all socket 423

and some socket 478) but was quickly superseded by DDR SDRAM.

RDRAM has a 16-bit (single channel) or 32-bit (dual channel) bus width but runs at a much higher speed than SDRAM (266 MHz and more) as well as

being double-pumped. 16-bit RDRAM is packaged in 184-pin Rambus inline memory modules (RIMMs) (Figure 45) while 32-bit modules are packaged in

232-pin RIMMs, both of which feature heat sinks because of the high clock

speeds.

Figure 45 – Samsung RDRAM packaged in a 184-pin RIMM

Source: Doctor [et al.] (2012:51)

Page 77: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 72

© CTI Education Group

Table 6 summarises RDRAM:

Table 6 – RDRAM

Model Type Clock speed Bandwidth

PC600 Single channel (16-bit) 266 MHz 1 066 mbps

PC700 Single channel (16-bit) 355 MHz 1 420 mbps

PC800 Single channel (16-bit) 400 MHz 1 600 mbps

PC1066 Single channel (16-bit) 533 MHz 2 133 mbps

RIMM 3200 Dual channel (32-bit) 400 MHz 3 200 mbps

RIMM 4200 Dual channel (32-bit) 533 MHz 4 200 mbps

Source: GTS Learning (2013:118)

Most motherboards supporting RDRAM are dual channel. Single channel RIMMs

have to be installed in matching pairs in a dual channel motherboard, but dual channel modules can be installed singly. Regardless of single or dual channel

modules, unused slots need to be filled with a terminator, called ‘continuity RIMM’ (CRIMM).

3.4.1.5 Laptop memory

Laptop RAM is packaged in a smaller module, called ‘small outline DIMM’ (SODIMM) (Figure 46). Both DDR and DDR2 use 200-pin packages, but the

key position for DDR2 is slightly different to prevent insertion in a slot designed for DDR. DDR3 uses a 204-pin package.

Figure 46 – Corsair ValueSelect SODIMM

Source: Doctor [et al.] (2012:51)

Legacy SDRAM uses a mat pin package. The memory is, typically, fitted into slots that pop-up at a 45° angle to allow for chips to be inserted or removed.

Page 78: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 73

© CTI Education Group

3.4.2 Memory components

3.4.2.1 Memory chips

The capacity of a memory module is determined by the number of chips and the size of each chip. Most SDRAM and DDR RAM modules are configured with

8 or 16 chips. Each chip, typically, has a size (or density) of either 64 MB or 32 MB. Total capacities for modules can range from 128 MB to 8 GB.

The way a chip stores data is expressed as the depth of the chip by its width. For example, 64 x 8 means that the storage locations in the chip are organised

into 64 rows and 8 columns, with a total capacity of 512 MB, if there were 8 such chips on a module. The module would be 64 x 64 and have a capacity of

512 MB. X4 chips are cheaper than X8 or X16 but can cause problems with some motherboards, especially in high capacity modules (1 GB).

The number and layout of chips on a memory board does not, generally, affect

system performance, except when a dual channel motherboard is used. That being said, for optimum stability, use the same density (and brand) of memory

in all sockets, if available.

3.4.2.2 Memory banks

When memory is installed it must fill a bank, which is the amount of data the

memory controller expects to fetch. All current PC motherboards support a 64-bit data bus, matching the 64-bit data bus of DIMMs.

3.4.2.3 Single- and double-sided memory

Single-sided, or more precisely ‘single rank’, memory is a module that fills a

single bank (that is, the memory controller can access all of the memory chips on the module at the same time).

Double-sided, or ‘dual bank’ or ‘dual rank’, memory divides the memory chips

on a single module into two ‘ranks’ (the memory controller can access one rank or the other, not both simultaneously). This makes the memory lower in

cost and higher in density, however, it degrades performance slightly. There are also quad rank modules, though these are, usually, designed for server

hardware.

The memory controller on a motherboard will only be able to support a given

number of ranks. Consequently, DlMM slots may not always support dual rank modules or may only support one dual rank module (typically this must be

installed in the first slot), thus remember to read motherboard documentation carefully. In some instances, support for dual or quad rank memory may be

enabled through a BIOS update.

Page 79: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 74

© CTI Education Group

3.4.2.4 Dual channel memory

The increasing speed and architectural improvements of CPU technologies have led to memory becoming a bottleneck to system performance. To address this,

Intel and AMD developed a dual channel memory architecture for DDR and DDR2 RAM. Dual channel memory was originally used primarily on server

hardware but it is now also being commonly employed on desktop systems and laptops.

With a dual channel memory controller on the motherboard, there can be,

effectively, two pathways through the FSB, meaning that 128 bits of data can be transferred per ‘transaction’ rather than 64 bits (though, in most

configurations, they continue to operate as two independent 64-bit pathways).

Ordinary RAM modules are used, that is, there are no dual channel DDR memory modules.

Example

A dual channel motherboard might have four DIMM slots arranged in colour-coded pairs. Each pair represents one

channel and each slot represents one of the two sockets in each channel. The memory modules installed should be

identical in terms of speed, capacity, chip number, density and location. If only two slots are used, to enable dual

channel memory, the modules must be installed in socket 1 of each channel. You will need to consult the system

documentation carefully to identify the appropriate slots to use. For motherboards supporting Intel CPUs and some

AMD CPUs, the first sockets in both channels are slots 1

and 3. For most AMD CPU-based motherboards it would mean filling slots 1 and 2.

Adding an odd number of modules or adding mismatched DIMMs will cause a

system to operate in single channel mode. Dual Channel Mode may also need to be enabled via CMOS Setup.

Some of Intel’s CPUs and supporting chipsets have triple or quadruple channel

memory controllers; AMD is starting to release quadruple channel controllers. In these architectures, if the full complement of modules is not installed, the

system will revert to dual or single channel operation.

Page 80: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 75

© CTI Education Group

3.4.2.5 ECC memory

Motherboards used to use a simple error detection method, called ‘parity checking’. Each byte of data in memory is accompanied by a ninth bit. This bit

is set to 1 or 0 to make the total number of bits set to 1 in the byte (an odd or even number, depending on the type of parity checking being performed).

When the byte is read, its parity is checked to ensure that the parity value is

still odd or even, whatever the case may be. If this is not the same, a bit must have become corrupted.

System memory for most desktops is non-parity; that is, it does not perform

error checking. For systems that require a high level of reliability, such as

workstations and servers, ECC memory is available.

ECC memory is enhanced parity circuitry that can detect internal data errors and make corrections. ECC will detect and correct single bit errors and allow

for the system to continue functioning normally. It will also detect errors of 2, 3 or 4 bits but will not correct them; instead, it will generate an error message

and halt the system.

ECC memory has an extra chip and a 72-bit data bus, rather than 64-bit. The motherboard must support the use of ECC memory modules and the option to

use them must, typically, be enabled in CMOS Setup. ECC memory cannot be mixed with non-ECC modules.

An ECC DIMM will have an odd number of memory chips while on-parity DIMMs

will have an even number of memory chips.

3.4.2.6 Registered memory

Most SDRAM and DDR SDRAM is unbuffered. Registered memory has an extra

component that stores address information, taking some load off of the memory controller.

Registered memory is slightly slower but increases system stability when a

large amount of memory (2 GB or more) is installed. Most, but not all, ECC RAM is registered. Non-ECC registered chips are also available at higher cost

than unbuffered chips.

Registered RAM must be supported by the motherboard. Registered and unbuffered modules cannot be mixed.

Page 81: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 76

© CTI Education Group

3.4.3 Installing and upgrading memory

Adding or upgrading system memory is often the cheapest and simplest way of increasing system performance.

If the motherboard supports such but the system is not configured to use it,

enabling a dual channel configuration is the best way of extracting more performance from existing components. Increasing the bus speed would

require purchasing a new motherboard and memory modules (and possibly a

new CPU).

When purchasing a computer, it is a good idea to get the fastest memory bus that you can afford as this is the component that is most difficult to upgrade

later.

3.4.3.1 Memory compatibility issues

In terms of compatibility, always consult the motherboard user guide and consider the following general guidelines:

The DlMM format must match the motherboard (for example, you cannot

install DDR modules in DDR2 slots) Different capacity modules can be installed, with the exception of Rambus or

multichannel configurations. Most vendors recommend installing the largest

module in the lowest numbered slot Modules from different vendors can be mixed, though this may cause

problems with multichannel configurations For best performance, the modules should be the same speed as the

motherboard. Different speeds can be mixed but the system will only work at the speed of the lowest clocked module; this is, generally, not a good idea

For best performance and reliability, configure multichannel systems with identical memory modules for each channel

ECC memory cannot be mixed with non-parity memory and must be supported by the motherboard. Similarly, registered memory cannot be

mixed with unbuffered modules and must be supported by the motherboard Memory modules are quite easy to insert and remove (unless being within

the case makes them inaccessible). The key point here is to ensure that the memory is suitable for the system and in the correct configuration

3.4.3.2 Removing memory modules

In order to remove DIMMs, you must release the plastic or metal catches at either end. Once you have released the catches, you can remove the memory

module by hand (it should pop up out of the slot). Handle the module by the edges; avoid touching the chips.

Page 82: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 77

© CTI Education Group

CPU, memory and the chips on the motherboard are particularly sensitive to ESD. Ensure that you take antistatic precautions when handling and storing

components.

3.4.3.3 Installing memory modules

To install memory modules, follow the following procedure:

Locate a spare memory socket. Most memory sockets are numbered on the motherboard. This numbering may start at 0 or 1. Some motherboards allow

for these slots to be filled in any order, however, most require that you fill the slots from the lowest numbered slot upwards. Unused RIMM slots must

be filled with RIMM terminators. Refer to the motherboard documentation for

specific requirements Line up the memory card. There are notches on the bottom edge of a

memory card to ensure that such is inserted correctly. Check that the notches in the memory card are aligned correctly with the memory socket

before you attempt insertion Insert the memory card. DIMMs are pushed straight down into the socket.

The retaining clips at either end should move towards the centre until they lock into the notches at the side of the DIMM when the module is fully

inserted (Figure 47):

Figure 47 – Orientate the memory module so that the notches on the card and slot

match up, then push down so that the retaining clips click into place

Source: GTS Learning (2013:126)

Reboot the PC and watch the RAM count during startup to verify that the

memory has been recognised. From Windows, you can check the installed RAM by looking at System Properties or the System Information program

Page 83: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 78

© CTI Education Group

3.5 CPU

The CPU, or simply the ‘processor’, executes program instruction code, performs mathematical and logical calculations, and controls I/O functions. It

is commonly described as the ‘brains’ of a computer, in fact, it is better

thought of as a very efficient sorting office. The CPU itself cannot think but it can process simple instructions very, very quickly and efficiently. A computer

is, ultimately, only as ‘clever’ as its software.

PC processors are produced by Intel and other manufacturers who use the Intel instruction set and whose processors are, therefore, IBM PC (or X86)

compatible (currently only AMD falls into this category).

3.5.1 Overview of CPU

There have been numerous CPU architectures and within each a number of

different models. For each set of model there is a brand to position such within a particular market segment. The following sections will give you a brief

overview of the main ranges produced by Intel and AMD.

3.5.1.1 Intel CPU range

The Intel CPU range includes:

Core: this is Intel’s flagship desktop and mobile CPU series. The earliest models (Core Solo and Core Duo) were laptop-only chips. The Core 2

introduced desktop versions as well as 64-bit and multicore support. The current range is divided into Core i3, i5 and i7 brands, with the i7

representing the best performing models. The Core i-range has been based on three micro-architectures, code-named Nehalem, Sandy Bridge and Ivy

Bridge

Pentium: this used to be Intel’s premium 32-bit CPU brand and you may still find Pentium 4 computers in use. The Pentium brand has been reintroduced

to represent mid-range CPU models based on the Nehalem and Sandy Bridge micro-architectures

Celeron: this has long been Intel’s budget brand Atom: this is a relatively new (2008) brand designed for low power portable

devices (smartphones and tablets) Xeon: this brand is aimed at the server i-workstation market. Current Xeons

are often differentiated from their Core counterparts by supporting n-way multiprocessing, ECC memory as well as coming with larger caches

Page 84: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 79

© CTI Education Group

3.5.1.2 AMD CPU range

The AMD CPU range includes:

Athlon: this was AMD’s long-standing premium consumer brand. Modern Athlons start with the Athlon 64 and its FX (top-end) and X2 (dual core)

variants. With the reintroduction of the plain Athlon series and, subsequent, Athlon ll models, the brand has been repositioned for the mid-range market

Phenom: this replaced the Athlon as AMD’s premium CPU brand. The latest range is branded as Phenom ll

Sempron: this is AMD’s budget brand, positioned to compete with Intel’s Celeron

Turion: this brand is used for laptop processors

The brands mentioned above are likely to be phased out over the next few

years, with the following replacing them:

AMD Fusion (A series): this represents what AMD refers to as ‘accelerated’ Accelerated processing units (APUs): these combine a CPU and graphics

processing unit (GPU). At the time of writing this Study Guide, the lineup was divided into A4 (mid-range), A6 and AB (high performance)

AMD FX: this brand represents AMD’s pitch for the high-end ‘enthusiast’ segment

Opteron: this is AMD’s long-standing version of the Xeon brand, aimed at the server/workstation segment

3.5.1.3 ARM machines

ARM is another microprocessor vendor. While ARM does not have a presence in the desktop/laptop segment, its processors are widely used in the smartphone

and tablet segments.

Page 85: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 80

© CTI Education Group

3.5.2 CPU architecture

A CPU is designed to run software programs. When a software program runs (whether it be an OS, BIOS firmware, antivirus utility or word processing

application) it is assembled into instructions utilising the fundamental instruction set of the CPU and loaded into system memory. The CPU then

performs the following operations on said instructions (note that this overview is grossly simplified):

The control unit fetches the next instruction in sequence from system memory to the pipeline

The control unit decodes each instruction and either executes it itself or passes it to the arithmetic logic unit (ALU) or floating point unit (FPU) for

execution The result of the executed instruction is written back to a register or to

system memory. A register is a temporary storage area available to the different units within the CPU

Over the years, many different internal architectures have been developed to

optimise the process of fetch, decode, execute and write back, while retaining compatibility with the basic X86 instruction set, which defines a CPU as IBM PC

compatible.

3.5.2.1 Hyper threading

One way of making instruction execution more efficient is to improve the way

in which the pipeline works. The basic approach is to do the most amount of work possible in a single clock cycle (multitasking). There are various ways to

achieve this goal.

CPUs process multiple instructions at the same time (for example, while one instruction is fetched, another is being decoded, another is being executed and

another is being written back to memory). This is referred to as a ‘superscalar architecture’ as multiple execution units are required. Superscalar

architectures feature longer pipelines, with multiple stages but shorter actions (micro-ops) at each stage, referred to as ‘super-pipelining’.

The original Pentium had a five-stage pipeline; by contrast, the Pentium 4 has

up to 31 stages (NetBurst architecture). NetBurst actually proved relatively

inefficient in terms of power and thermal performance, so Intel reverted to a modified form of the P6 architecture that it used in Pentium IIs and IIIs for its

Core brand CPUs (with around 14 stages).

Page 86: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 81

© CTI Education Group

Another approach (introduced on some Pentium 4 models) is simultaneous multithreading (SMT), called ‘hyper threading’ by Intel.

A thread is a stream of instructions generated by a software application. Most

applications run a single process in a single thread; software that runs multiple parallel threads within a process is said to be multithreaded. SMT allows for

the threads to run through the CPU at the same time. It duplicates many of the registers of the CPU and this, in turn, reduces the amount of ‘idle time’ the

CPU spends waiting for new instructions to process. To the OS, it seems as though there are two CPUs installed.

The main drawback of SMT is that it works best with multithreaded software.

As this type of software is more difficult to design, it tends to be restricted to

programs designed to run on servers. Desktop application software thus cannot often take full advantage.

Hyper threading was implemented on Premium models in the Pentium 4 range

but was not used on the Core 2 chips. It has been reintroduced as a feature of Core i7 and Atom processors from Intel.

3.5.2.2 Microcode improvements

Another approach to improving CPU efficiency is to extend the basic

instructions set. Many applications, such as games, video decompression and speech recognition, make repetitive use of the same instructions with different

data. Intel and AMD both introduced instructions set extensions to support this kind of single instruction, multiple data (SIMD) programming.

3.5.2.3 Multiprocessing and multicore

Yet another approach to making a computer system faster is to use two or more physical CPUs, referred to as ‘symmetric multiprocessing’ (SMP). SMP

can make efficient use of available processing resources to run application processes on whichever CPU is ‘available’. This approach is not dependent on

software applications being multithreaded to deliver performance benefits. Traditionally, SMP was provided by physically installing two or more CPUs in a

multisocket motherboard. Obviously, this adds significantly to the cost, thus it is only implemented on servers and high-end workstations.

Improvements in CPU manufacturing techniques have led to another solution:

dual core CPUs or chip-level multiprocessing (CMP). A dual core CPU is essentially two processors combined on the same die. The market has quickly

moved beyond dual core CPUs to multicore packages with three, four or eight

processors. For desktop computing, however, the performance benefits of multicore are unlikely to increase dramatically unless backed up by improved

software design.

Page 87: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 82

© CTI Education Group

Dual core is not quite the same as SMP and software has to be specially written or updated to take advantage of the architecture. Windows XP service

pack (SP) 2, Windows Vista and Windows 7 provide full support.

Table 7 provides some examples of multicore CPUs:

Table 7 – Multicore CPU examples

Core Intel AMD

2 Core Duo, Core 2 Duo, Core i3, Core

i5, Xeon, Celeron and Pentium D

X2 models of Athlon 64, Sempron, Turion

64, Phenom, Phenom II and Opteron

3 -- X3 models of Athlon II, Phenom and

Phenom II

4 Core 2 Quad, Core i5, Core i7 and

Xeon

X4 models of Athlon II, Phenom, Phenom

II and Opteron

6 -- Phenom II and Opteron

8+ Xeon Opteron

Source: GTS Learning (2013:132)

3.5.2.4 Instruction set architecture (32-bit vs 64-bit)

The instruction set used by IBM PC compatible CPUs is X8642 or IA-32 (Intel architecture). As described, this has been extended with SIMD instructions and

the way in which such are processed internally has been modified and

optimised by various different CPU architectures; otherwise, the same platform has been used for the last 30 years.

Up until a few years ago, CPUs were designed to run 32-bit code. This means

that each instruction can be up to 32 bits in length. A 32-bit CPU’s general purpose (GP) registers are also 32 bits wide. However, since 2004, most

desktop CPUs (and from 2006, most laptop CPUs) released to the market have been capable of running 64-bit code.

Intel first developed a 64-bit instruction set for its Itanium server CPU platform

in 2001. This platform, however, has never gained acceptance in the PC market. AMD’s 64-bit instruction set (AMD64) has proven more popular and

was adopted by Intel for its 64-bit desktop and mobile line. Intel refers to it as ‘EM64T’ or ‘Intel 64’. The same instruction set is also called ‘X86-64’ or ‘X64’.

The utilisation of 64-bit CPU features by installing 64-bit OSs took some time to grow, principally because of the lack of 64-bit drivers for peripheral devices.

At this point, it is estimated that about half of the Windows install base is 64-bit.

Page 88: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 83

© CTI Education Group

3.5.2.5 Cache

A computer stores data for programs and files currently open in system memory. The CPU has registers to store instructions and data that it is

processing. Instructions are moved in and out of these registers to system memory.

Cache is a small block of high speed memory that enhances performance by

preloading (caching) code and data from relatively slow system memory and passing it to the CPU on demand. Essentially, cache stores instructions and

data that the CPU uses regularly.

Complex superscalar architecture depends heavily on routines that predict

which instructions will be used most as well as in which sequence. If these instructions are readily available to the control unit, overall throughput is

greatly enhanced.

Cache is designed in multiple levels. Level 1 cache is ‘closest’ to the CPU and supports the fastest access. Level 2 cache is larger and a bit slower while Level

3 cache, if used, is larger and possibly a bit slower still. Level 1 cache is a small block (typically around 64 KB) and Level 2 cache is larger (between 512

KB and 2 MB).

Cache design becomes even more important with multicore CPUs as multiple components are contending for the use of a single resource (system memory).

At each level, cache can either be discrete (available to one core only) or shared (available to all cores), depending on the processor model.

3.5.2.6 Addressing

The system bus between the CPU and memory consists of data and address buses. The width of the data bus (64-bit on all current CPUs) determines how

much data can be transferred per clock cycle; the width of the address bus determines how many memory locations the PC can access.

The address bus for most 32-bit CPUs is either 32 or 36 bits wide. A 32-bit

address bus can access a 4 GB address space; a 36-bit expands that to 64 GB. In theory, a 64-bit CPU could implement a 64-bit address space. In practice,

the current generation of X64 CPUs are ‘restricted’ to 40-bit address spaces (1 TB) to reduce the complexity in remaining compatible with 32-bit software.

Page 89: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 84

© CTI Education Group

3.5.3 Other CPU features

Apart from the architectural features discussed, the speed at which a CPU runs is, generally, seen as a key performance indicator. This is certainly the time to

compare CPUs with the same architecture, however, it is not necessarily the case otherwise. For example, Intel Core 2 CPUs run slower than Pentium 4s

but deliver better performance.

3.5.3.1 Clock speed and overclocking

The core clock speed is the speed at which a CPU runs internal processes and

accesses Level 1 and Level 2 cache. The FSB speed is the interface between the CPU and system memory.

Overclocking increases the clock speed, which, in turn, improves performance.

When manufacturers release a new chip, they set an optimum clock speed based on system testing. This clock speed will be set at a level where damage

to the chip is not likely to occur during normal operation.

Increasing this speed (overclocking) is done via CMOS Setup by adjusting the CPU speed or advanced chipset features properties. Increasing the clock speed

requires more power and generates more heat. Therefore, an overclocked system must have a suitable power supply and sufficient cooling. The

operating environment (the warmth of the room and dust) must also be

carefully controlled.

Overclocking is, generally, performed by hobbyists and game enthusiasts but it is also a means of building a PC more cheaply by specifying lower cost

components and then boosting their performance.

Without cooling, overclocking increases the risk of thermal damage to components and may increase the frequency of system lockups. It also voids

the warranty. Vendors, generally, try to prevent overclocking by disabling custom settings in a computer’s CMOS Setup program.

A CPU may also run at a lower actual speed than it is capable of if it is put in

Power Saving Mode.

3.5.3.2 Power management (throttling)

Rising energy costs and environmental legislation are placing power efficiency

at the top of the agenda for buyers. In terms of CPU performance, more speed means greater power consumption and heat production. To deal with such,

CPUs can implement power management to enter lower power states, referred to as ‘throttling’.

Page 90: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 85

© CTI Education Group

Inlet chips implement throttling using speed step technology. The original version simply allowed for high and low frequency modes. Enhanced speed

step allows a CPU to step up or down through a range of voltages.

Another aspect of power management is CPU protection. If a processor runs too hot, the system can become unstable or damage can occur. Some Intel

CPUs provide a Thermal Monitor (TM) Mode, triggered by a temperature gauge (the activation point depends on the processor but tends to be around 50°C to

65°C). Intel CPUs work in one of two modes, depending on the age of the model:

1. TM1 (speed step): the CPU inserts idle cycles between instructions

(implemented on early Pentium 4 models)

2. TM2 (enhanced speed step): the CPU lowers the actual clock speed (used on later P45 and current mobile and desktop CPUs)

Power management on AMD CPUs is referred to as ‘PowerNow’ (mobile CPUs)

or ‘cool ’n’ quiet’ (desktop CPUs).

3.5.3.3 Malware protection

Computer viruses and other malware can use various techniques to infect a computer. One is a so-called buffer overflow attack, where the virus ‘tricks’

another program into executing it as the program thinks that it is just processing some data.

CPUs and OSs supporting AMD’s no execute (NX) technology are more resilient

against attack; they prevent areas in memory (marked for data storage) from

executing code (running a new program). Intel calls this feature ‘execute disable’ (XD); Windows refers to it as ‘data execution prevention’ (DEP).

3.6 Disassembling a PC PC components that are easily user replaceable or upgradeable are referred to

as ‘field replaceable units’ (FRU). Owing to economic factors, most PC units are

not worth repairing, instead they are simply replaced with a new unit (‘swapped out’).

Page 91: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 86

© CTI Education Group

Before you start to disassemble a PC you should consider doing the following:

Make a backup of the HDDs to protect important data Create a clean work environment with plenty of working space where you

can set the PC at a comfortable height Gather all the necessary tools and equipment. A notepad and pen may be

useful for drawing diagrams and making notes. A digital camera could also be useful for recording the layout of components

Ensure that all devices are powered off and disconnected from mains before removing them

Take ESD precautions to minimise the chance of damaging static sensitive components. Always place static sensitive equipment, such as processors

and memory, in antistatic bags

3.6.1 Parts of a PC case A PC case has a cover, which is removed by either undoing the screws at the

back or by pressing clips together to release such. Cases based on a slim-line design have a hinged cover that releases to allow access to the motherboard.

Some cases feature tool-free access (that is, they are secured only by clips)

while others use proprietary screw fittings (to prevent unauthorised access to internal components).

The front panel provides access to the removable media drives, a power on/off switch, reset switch and LEDs (to indicate drive operation). The front cover can

be removed but may require the side panel to be removed first in order to access the screws/clips that secure it.

The rear panel has slots through which adapter card ports appear. These slots

should either be covered by an adapter card or metal strip, known as a ‘blanking plate’. Uncovered slots can disrupt proper air flow around PC

components, which could cause overheating as well as an increase in the amount of dust in the system.

There are also slots through which the motherboard ports appear, such as

parallel and serial ports. The rear panel, further, provides access to the PSU sockets. The PSU has a fan exhaust; care should be taken that such is not

obstructed as this will adversely affect cooling.

Page 92: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 87

© CTI Education Group

3.6.2 Removing a system case lid

To remove a system case lid, follow the following procedure:

With the power cable removed, press and hold the power button for a few seconds. This should ensure that the circuits within the computer are

completely de-energised Find the screws that secure the lid to the system case and unscrew them.

Some system case lids have clips instead of, or as well as, screws.

Remember to keep the screws in a secure place The main panel is, usually, opposite the I/O ports. Once the system case lid

is removed, you can access the internal devices and begin to remove them. Other parts of the case, such as the front panel or second side panel, are,

usually, removed using clips (accessible once the main side panel has been removed)

3.7 Installing Windows

3.7.1 Overview of OS installation

There are two main approaches to installing Windows, namely:

1. Clean installation: this refers to an installation on a new computer or completely replacing the software on an old computer

2. Upgrade: this refers to an installation on top of an existing version of Windows; this route retains applications, user settings and data files

A clean installation is, generally, seen as more reliable than an upgrade. In a corporate network environment, installations are performed using images (a

template containing the OS and other related software) so that machines contain a consistent set of software and configuration options. PC vendors also

use images to install new equipment.

Upgrades are, generally, designed for home users. Upgrade software can be purchased at a discount.

A clean installation should be carefully planned; it will consist of the following

phases:

Verify hardware compatibility (are the core components of the computer sufficient to run the OS and do the peripheral devices have drivers suitable

for use with the OS)

Select an installation method Back up any existing user data and/or settings

Prepare the HDD and copy the setup files to the target Configure the installation options

Verify the installation (check logs and complete tests to confirm that the installation was successful)

Page 93: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 88

© CTI Education Group

3.7.1.1 Hardware compatibility

The first step in checking hardware compatibility is to verify that the system exceeds the recommended requirements. The minimum requirements will,

usually, not deliver adequate performance.

Ensure that you know the system requirements and limitations for the various versions and editions of Windows. Also verify that the peripheral devices and

expansion cards will work under the OS. Effectively this means: has the manufacturer released a stable driver for the OS?

Unsupported hardware can cause problems during the setup process; these

should be physically uninstalled from the PC.

3.7.1.2 Data and settings backup

This is clearly not necessary if installing a new computer, however, it is a vital

step if you are updating (rather than upgrading) an existing installation.

While it takes more time, performance and reliability can be improved by performing a clean installation. The general process to follow is:

Back up all data from the existing target system. You can use the backup

program supplied by Windows, a third-party backup program, the Flies and Settings Transfer Wizard, Windows Easy Transfer or the User State Migration

tool Install the new OS, overwriting the existing target (optionally reconfigure

the disk partition and file system structure)

Reinstall software applications and utilities Restore data from the previous system

3.7.2 Installation boot methods The installation boot method refers to the way in which an installation program

and settings are loaded onto a PC. There are a number of ways to install Windows; you can perform a cross-network installation, installation via local

CD/DVD or a deployment.

3.7.2.1 CD/DVD

Most manual installations are run by booting from a CD or DVD. You can also

run a clean installation or an upgrade from an existing Windows installation.

Page 94: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 89

© CTI Education Group

3.7.2.2 USB

A problem with disc-based installations is that the setup disc quickly becomes out-of-date and post-installation tasks for installing drivers, updates and SPs

can take longer than the original installation. One way around this is to build slipstreamed media, with all the various patches and drivers already applied.

The media could be CD, DVD or USB (if the computer supports booting from USB).

3.7.2.3 Pre-boot execution environment (PXE)

A remote network installation means connecting to a shared folder containing

the installation files (which could be slipstreamed). The target PC must have a

usable partition on the HDD in which to store temporary files.

3.7.2.4 Image deployment

Any installation involving more than a few PCs makes using imaging technology worthwhile. An image of an existing installation stored in one file is

created. Such can contain the base OS, configuration settings, SPs, updates, application software and whatever else is required. An image can be stored on

DVD or USB or it can be accessed over a network.

An attended installation is quite time consuming as you need to monitor the setup program and input information at various points. To simplify this

process, Windows supports the use of answer files, allowing for full or partial unattended installations. Creating and configuring answer files is done using

Setup Manager.

3.7.2.5 Factory recovery partition

A recovery disc or factory recovery partition (also called a ‘rescue disc’) is a

tool used by original equipment manufacturers (OEMs) to restore the OS environment to the same state that it was in while being shipped. The

disc/recovery partition is used to boot the system, then a simple wizard-driven process replaces the damaged installation with an image stored on a separate

partition on the HDD. In the case of a recovery partition, this is, usually, configured to be hidden from the user. The recovery process can be started by

pressing a key during startup (<F11> or <Ctrl>+<F11> are often used; a message is, usually, shown onscreen).

OEM media will not, usually, recover user data, settings or applications;

everything gets set back to the state in which the PC was shipped from the

factory. User data should be recovered from backup, which obviously has to be made before the computer becomes unbootable.

Page 95: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 90

© CTI Education Group

The advantages of using a recovery partition are that less time is required to rebuild the machine and, from a technical support point of view, recovery is

much easier for end users than reinstalling Windows. The main disadvantage with OEM recovery media is that the tool only works if the original HDD is still

installed in the machine; the recovery media will not include patches or SPs applied between the shipping and recovery dates.

3.7.2.6 Repair installation

An ‘in-place upgrade’ repair installation is a ‘last gasp’ method of restoring a

Windows installation that will not boot. The installation process is run over the top of the existing installation. In theory, this route can preserve some

settings, application software installations and data files while restoring system

files. Repair installations are unlikely to work and there are, usually, better tools available to troubleshoot a system that will not boot (Figure 48):

Figure 48 – Performing a repair installation in Windows XP

Source: GTS Learning (2013:155)

3.7.2.7 Multiboot

If a user needs multiple OSs, such can be set up on the same computer in a

multiboot environment. Most OSs can be run in this way, with the following caveats:

Each OS should be installed on a separate partition

The system partition must be accessible to each OS (that is, typically, it must be formatted using FAT)

The system partition is where the boot files are and the boot partition is where the OS is installed.

Page 96: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 91

© CTI Education Group

New OSs should not overwrite the boot loader. The general principle is to install the older OS first; older OSs are less likely to recognise a multiboot

environment. Alternatively, the boot loader may need to be reconfigured manually following the installation of an OS.

3.7.2.8 Preparing a HDD

Windows must be installed on a partition of a suitable size, formatted with an

appropriate file system. The boot and system partitions cannot be changed (except by using third-party tools) so it is important to plan this step in

accordance with the way in which the computer will be used, namely:

Will the computer have multiple OSs installed (mum-boot)? If so, it is best

practice to create a partition for each OS Will partitioning achieve better performance? A disk of 80 GB+ may benefit

from being partitioned but, in other cases, the performance benefits may be minimal

Does the boot partition have spare capacity for growth? Running out of space will cause serious problems, thus you need to leave sufficient

overhead. Windows Vista and Windows 7 must be installed on a boot partition formatted with NTFS

Is some sort of hardware RAID being used? If so, the RAID utility must be used to configure the RAID level and to create volumes before the OS can be

installed. A RAID configuration utility is invoked by pressing a key combination, such as <Ctrl>+<F>, during startup (when the RAID

firmware BIOS is being processed)

There are various tools available to partition disks (including fdisk supplied

with Windows). The Windows Setup program includes a Text Mode disk management program that should be suitable for most users.

Page 97: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 92

© CTI Education Group

3.7.2.9 Loading a HDD

In order to manage the HDD, the setup program must have an appropriate driver for it; most of the time the setup media will include a suitable driver.

In Windows XP, you have a few seconds to press <F6> when the setup

program first loads (Figure 49):

Figure 49 – Loading alternate third-party drivers in Windows XP

Source: GTS Learning (2013:157)

In Windows Vista and Windows 7, you can click the Load Driver button on the

Disk Configuration dialog box (Figure 50):

Figure 50 – Windows 7 setup options

Source: GTS Learning (2013:157)

Page 98: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 93

© CTI Education Group

3.7.3 Windows setup

Windows Vista and Windows 7 have a graphics user interface (GUI) to create and modify partitions. By default, Windows 7 creates separate system and

boot partitions when installed on an unpartitioned disk. The small (100 MB) system partition (system reserved) is used to store the Boot Manager and Boot

Configuration Database; it can also be used for BitLocker drive encryption. The partition is not allocated a drive letter.

The Windows XP tool is part of Text Mode setup but is still simple to use: once you have selected (or created) your partition, you can create more partitions

using the Disk Management tool (assuming that you have free unpartitioned space available on the disk) (Figure 51):

Figure 51 – Creating a partition using the Windows XP Setup program

Source: GTS Learning (2013:158)

Page 99: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 94

© CTI Education Group

3.7.3.1 Choosing a file system

Another choice is whether to use NTFS or FAT/FAT32 for the boot and system partitions (Figure 52). Choose NTFS unless there are good reasons for using

FAT (compatibility in a multiboot environment).

Figure 52 – Formatting a partition using the Windows XP Setup program

Source: GTS Learning (2013:158)

In Windows XP, any of these file systems will support the boot and system

partitions. Note, however, that there are some significant differences. Windows Vista and Windows 7 only support the installation of a NTFS boot partition,

though they can read and write to FAT/FAT32 drives.

You also have the choice of either performing a quick or full format. A full

format checks the disk for bad sectors; selecting the quick option skips this check.

3.7.3.2 Completing an attended installation

When performing an attended installation, you need to manually configure

setup at various points in the process. Windows XP Setup requires that you return to check the program at regular intervals; Windows Vista and Windows

7 Setup are streamlined with all the configuration options at the beginning and end of the process.

Page 100: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 95

© CTI Education Group

3.7.4 Windows XP setup

In Windows XP, the first phase of set up (\mnnt.exe) is Text Mode, where you follow prompts to accept the End User Licence Agreement and to configure the

disk (as discussed). The system then reboots into a GUI setup mode where you make various additional choices, including configuring regional settings

(Figure 53), registering the product, entering the product licence key and choosing a computer name as well as a password for the default administrator

account (Figure 54):

Figure 53 – Configuring regional and language settings in Windows XP Setup

Source: GTS Learning (2013:159)

Figure 54 – Choosing a computer name and setting a password for the default

administrator account in Windows XP Setup

Source: GTS Learning (2013:160)

Page 101: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 96

© CTI Education Group

3.7.4.1 Joining a network

During installation, the machine should be given a 15 character name that is unique within the workgroup or domain. The machine name should not contain

spaces or punctuation (other than hyphens). To join a network, you must install appropriate protocol and client software as well as configure such to

obtain a valid network address.

To join a workgroup, simply enter the workgroup name when prompted. However, to join a domain, you will need the following:

A computer account that is already configured in that domain or account

credentials that will enable you to add your machine to the domain during

installation A Windows server domain controller that is online and accessible during

installation A Domain Name System (DNS) server that is online and accessible during

installation to enable you to locate a domain controller

3.7.4.2 Completing Windows XP setup

Following network configuration, Windows XP Setup will proceed to install Windows and detect and configure plug-and-play devices.

Windows will now load and you will be prompted to log on. Any hardware

devices not installed during setup will be detected and you will be prompted to select a driver.

When you reach this point, it is a good sign that the installation has succeeded. You might want to verify the log files, check the Device Manager to confirm all

hardware has been recognised and test each hardware device to verify functionality. You can use Add or Remove Program (in Control Panel) to install

any optional Windows components.

3.7.4.3 Running Windows XP for the first time

When you run Windows XP for the first time, a Welcome to Windows screen will display. This wizard-driven component will guide you through the final

phases of system configuration.

Page 102: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 97

© CTI Education Group

During this process, you might be asked to:

Configure your Internet connection: details will include proxy settings, etc. Your Internet connection is needed for product activation but you can

configure this later. (An unpatched installation of Windows is very vulnerable to malware, specifically the Blaster and Sasser worms. If possible, obtain

and install SPs on CD before connecting to the Internet. If using SP2 media, additional steps will prompt you to configure automatic updates and enable

the firewall before proceeding) Activate Windows: product activation guards against software piracy (Figure

55). If the OS is not activated, it will cease to operate after 30 days. This activation can be completed via the web or over the telephone

Figure 55 – Product activation

Source: GTS Learning (2013:163)

Define computer users: you must define at least one user. Each user added here is configured with local administrator privileges

3.7.5 Windows Vista and Windows 7 setup The installation of Windows Vista and Windows 7 covers broadly the same

steps but in a slightly more efficient order; this reduces the amount of time that you will have to monitor the process during an attended installation. Also,

the whole installation process takes place within a GUI. The process setup.exe

replaces the winnt.exe process used by Windows XP.

Page 103: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 98

© CTI Education Group

The first step in a Windows Vista/Windows 7 installation is to choose the regional format settings and keyboard type (Figure 56):

Figure 56 – Choosing regional options in Windows 7 Setup

Source: GTS Learning (2013:163)

Having done so, you can proceed by accepting the End User Licence Agreement, choosing an installation type (upgrade or custom (clean

installation)) and partitioning and formatting the disk. Setup then proceeds

without requiring intervention.

Note that Windows Vista and Windows 7 do not support joining a domain during an attended installation. A computer can be joined by reconfiguring

system properties or it can be joined during an unattended installation by using an answer file.

Page 104: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 99

© CTI Education Group

When the system reboots, you can complete the setup configuration by doing the following:

Choose a username and password: this account will be the local

administrator account, so choose a strong password Enter the product key: if you do not enter the product key, choose the

edition of Windows that you are installing. You must enter a key and activate Windows within 30 days

Configure automatic updates (Figure 57):

Figure 57 – Choosing update settings in Windows 7 Setup

Source: GTS Learning (2013:164)

Check that the date and time settings are correct and configure the time zone

Set the computer’s network location: this configures default firewall settings

Concluding remarks In this unit, we introduced health and safety regulations that should be

complied with when it comes to computer systems. We also explored the installation and disassembly of main computer components. Windows XP, Vista

and 7 installation setups were illustrated.

In the next unit, we will investigate computer system configuration.

Page 105: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 3 – System Installation Page 100

© CTI Education Group

Self-assessment

Test your knowledge

1. In a computer environment, how do you protect against electric shock?

2. In a computer environment, how do you protect against electrostatic electricity?

3. In a computer environment, how do you protect against overloading power

points?

4. In a computer environment, how do you protect against fire hazards?

5. Briefly discuss RAM vs ROM.

6. Explain the use of RAID.

Page 106: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 101

© CTI Education Group

Unit 4: System Configuration

Unit 4 is aligned with the following learning outcomes and assessment criteria:

Learning outcomes

LO2 Be able to design computer systems

LO3 Be able to build and configure computer systems

Assessment criteria AC2.2 Evaluate the suitability of a computer system

design specification AC3.1 Build and configure a computer system to meet a

design specification

Learning objectives

After studying this unit, you should be able to:

Use CMOS Setup to configure BIOS settings Know how to use OS independent diagnostic programs

Introduction

In the previous unit, you learnt how to install system components and OSs.

In this unit, you will learn how to use CMOS Setup to check system components installed as well as their working status. We will also focus on how

to configure computer systems to match user specifications for a given type of computer system.

Page 107: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 102

© CTI Education Group

4.1 CMOS Setup

You can, normally, access CMOS Setup with a keystroke during the boot process. The key combination used will vary from system to system; typical

examples are <Esc>, <Del>, <F1>, <F2> or <F10>. A PC’s documentation

will explain how to access CMOS Setup; often a message with the required key is displayed when booting a PC. You can navigate using the keyboard keys and

pressing <Esc> to, generally, return to a previous screen.

4.1.1 BIOS component information

CMOS Setup will contain information about core components, such as the CPU, chipset, RAM, HDDs, optical drives and battery (laptop).

4.1.1.1 Overclocking

On some systems, you may be able to configure settings for CPU voltage and memory clock frequency. You can use these settings to overclock the CPU,

system memory or GPU to make such run faster than the manufacturer intended. Overclocking increases the amount of heat generated by the CPU

and can thus damage such. Incorrect settings can also make a system unstable. Generally, it is best to let the system configure these settings

automatically.

Most OEMs disable overclocking through their versions of CMOS Setup. This feature is, generally, only available with retail motherboards and components.

4.1.1.2 CPU features

Some CPU features can be configured, such as the number of cores, cache and

power performance (speed step).

4.1.1.3 Power management

If the BIOS supports advanced configuration and power management interface

(ACPI) there may also be an option to enable/disable power management. Power management enables features, such as soft power on/off (enabling the

Windows shut down routine to power off the computer), power saving modes, hibernation, etc. This option should, normally, be enabled. An interesting

feature is Auto-on Mode, which activates the computer automatically at a set time each day. On a laptop there may be options to check battery performance

and configure default LCD brightness.

Page 108: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 103

© CTI Education Group

4.1.1.4 Health check features

The BIOS may have an option for enabling/disabling PC health check features, such as temperature monitoring, checking fan speeds or displaying problem

alerts.

4.1.1.5 Date, time and daylight savings

Often referred to as the ‘real time’, this is simply the calendar date and time. A PC’s clock can be automatically adjusted back or forward one hour, as

appropriate, within the time zone under Windows. If the clock starts to lose the correct date or time, the CMOS battery could be failing.

4.1.1.6 Configuring the boot sequence

One of the most important parameters in CMOS Setup is the boot sequence or boot device priority; this defines the sequence in which the BIOS searches

devices for a boot loader. You will, usually, be able to set three or four options in priority order. The typical choices are HDDs, optical drives, USB and

network.

4.1.1.7 Configuring onboard devices

There will be options for enabling, disabling and/or configuring controllers and adapters on the motherboard. This will certainly include storage adapters

(floppy and PATA/SATA) and possibly features, such as serial and parallel ports, USB, Firewire, network adapters, modems, and graphics and sound

cards.

Page 109: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 104

© CTI Education Group

4.1.2 BIOS security

Different BIOS software will provide different support for BIOS passwords. There are, usually, at least two passwords (some systems may allow for

more):

Supervisor/administrator password: this protects access to CMOS Setup User password: this locks access to the whole computer. This is a very

secure way of protecting an entire PC as nothing can be done until the POST

has taken place. The only real way of getting around this would be to open the PC and reset the CMOS memory, which is not easy to do

Drive locks: there are, generally, three options for securing access to a disk specifically (rather than to the PC in general), namely:

1. Configure and store the password in PC firmware: this means that the disk is unusable except with the designated computer

2. Store the password in disk firmware: this is configured in conjunction with a compatible PC BIOS and means that the disk is transferable

between computers with a compatible BIOS 3. Use full disk encryption to encode the contents of the drive as well as

password protect such: the selected password is used as the basis of the encryption key. Again, this requires a HDD and BIOS compatible with the

same full disk encryption product

4.2 Custom configuration

4.2.1 Configuring computers for business use

4.2.1.1 Standard clients

A standard client (often described as ‘thick’ to distinguish it from a ‘thin’ client) is an ordinary office PC. It will be used to run locally installed desktop

applications, such as Microsoft Office (word processor, spreadsheets and presentations) as well as line of business software, e-mail, calendaring, contact

management and a web browser.

When configuring a standard client, it is important to pay attention to the recommended Windows system and software applications requirements.

Specifying the minimum Windows requirements is likely to lead to poor performance.

Page 110: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 105

© CTI Education Group

4.2.1.2 Thin clients

A thin client is a PC designed to act as an interface with applications that run on a network server. The client may be interfacing with particular software

applications or with a whole Windows desktop (virtual desktop infrastructure (VDl)). In this scenario, the only really important performance criterion is the

network link. The client PC does no application processing; it just transfers mouse and keyboard input to the server and processes video and audio output

coming back. The client will have to meet the minimum requirements for installing Windows.

4.2.1.3 Workstations

The term ‘workstation’ is sometimes used to describe a computer that runs more demanding applications than standard office suites.

Programming, development and virtualisation

A workstation used to develop software or games will run one or more rapid

application development (RAD) environments. It may also run a local database server application for testing. Consequently, these workstations require less

CPU and mass storage but adequate system memory.

Development work is also likely to require virtualisation, so that the developer has access to multiple OS environments for testing. Virtualisation requires a

large amount of system memory (a Windows Guest 05 would, typically, need 1 to 2 GB for average performance) and a fast and large disk sub-system. It

would also benefit from multiple CPU cores and multichannel memory.

Graphics, computer aided design (CAD) and computer aided

manufacturing (CAM)

A workstation used for different types of design will have to support applications with high CPU, GPU and memory requirements. Typical design

applications include:

Image editing and illustration tools Desktop publishing (DTP) and web design

CAD CAM

Page 111: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 106

© CTI Education Group

Multimedia development

A workstation used to edit audio/visual files, create animations or produce music will have high performance requirements. Again, it is important not to

overlook the disk sub-system, which can become a performance bottleneck as media files will often have to be streamed from the disk. Workstations will,

generally, need 10K or 15K disks to perform well. Multimedia files are also extremely large thus the disk sub-system will have to be high capacity. These

workstations require specialist adapters to capture audio and video from a variety of sources.

Dual monitors

With all types of workstation, screen ‘real estate’ is often at a premium; this means that they are often provisioned with two or more monitors.

RAID

As workstations are used to process critical data, where losing even an hour’s

work might represent a huge loss to the business, most of them will be configured with RAID to provide protection against disk failure.

4.2.2 Configuring computers for home use

When not used solely for homework and web browsing, home computers are often specified as ‘media centres’, ‘home theatres’ or ‘gaming rigs’.

4.2.2.1 Home theatre PCs (HTPCs)

A HTPC can be used instead of consumer appliances, such as a personal video

recorder (PVR) to watch and record television broadcasts and play movies and music. Such a PC will need to be equipped with an appropriate television tuner

card to process the incoming television signal (broadcast, cable or satellite) and, usually, comes with a remote control and peripherals, such as a wireless

mouse and keyboard.

4.2.2.2 Home server PCs and NAS

A home server PC is either a HTPC, with a slightly expanded role, or a

repurposed desktop or low-end PC server, used primarily for file storage and printer sharing. Such PCs do not need to be particularly powerful in terms of

CPU and memory but they will need a good network link. Most would also be configured with RAID to reduce the risk of losing valuable movie and audio files

(there must still be a backup system in place to protect against theft or fire).

Page 112: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 107

© CTI Education Group

There are also purpose-built devices to fill a home server role. A NAS appliance is a hard drive or RAID array with a cutdown server board, usually running

some form of Linux, that provides network access, various file sharing protocols and a web management interface. Such an appliance is accessed

over a network using either a wired Ethernet port or Wi-Fi.

In addition to sharing the disk resource, a NAS box will, usually, be able to share a printer. It will also be able to make files available over the Internet

using Hypertext Transfer Protocol (HTTP) or File Transfer Protocol (FTP). Care needs to be taken to secure the device and the router/firewall if this is to be

the case. Some NAS devices and home server PCs running Windows Home Server Edition can stream media files to wireless speakers or to a television (or

various other types of media player). A streaming media server will have

higher CPU demand, memory and bandwidth than an ordinary server.

4.2.2.3 Gaming PCs

A PC built for gaming is almost always based around the latest graphics adapter technology. Of course, the latest games tend to make the latest

graphics technology obsolete within a few months of release so upgrade potential is a key characteristic of these systems.

Gaming PCs will share some of the traits of a HTPC, such as surround sound

audio and a high quality display. There are also gaming oriented peripherals, such as keyboards and mouses. Many games also benefit from headsets so

that players can bark instructions at one another as they eliminate enemies over the Internet.

The addictive nature of PC games means that processors are very highly utilised (or ‘thrashed’) for considerable periods of time. Some gamers are also

fond of overclocking components to obtain better performance. All of this means that a gaming PC will generate more heat than most other types of

computer. It is not unusual for them to use more powerful fans or liquid cooling.

Concluding remarks

When configuring a PC it is important to pay attention to the recommended Windows system and software applications requirements for both business and

home environments. Different types of computer design will have to support applications with high CPU and memory capabilities.

Page 113: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 4 – System Configuration Page 108

© CTI Education Group

Self-assessment

Test your knowledge

1. Define a thin client, standard client, overclocking and BIOS.

2. Briefly discuss the differences between home and business computer configuration.

Page 114: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 109

© CTI Education Group

Unit 5: System Testing

Unit 5 is aligned with the following learning outcome and assessment criteria:

Learning outcome

LO3 Be able to build and configure computer systems

Assessment criteria

AC3.1 Build and configure a computer system to meet a design specification

AC3.2 Test and document a computer system

Learning objectives

After studying this unit, you should be able to:

Diagnose possible hardware errors from basic symptoms Troubleshoot power and POST problems

Diagnose system component errors

Introduction In the previous unit, you learnt about how to configure computer systems after

installing system components to meet user specification requirements.

In this unit, you will learn about common computer system hardware problems and their symptoms. We will also discuss how to troubleshoot using POST as

well as how to troubleshoot components.

Page 115: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 110

© CTI Education Group

5.1 Troubleshooting hardware

There are several externally observable symptoms that may help you to diagnose hardware problems without having to open the computer chassis.

5.1.1 Indicator lights

Most devices have a status LED to indicate that such is receiving power/switched on. Some devices may have additional status indicators or

show other functions.

Example A HDD LED shows activity; normally this should only flicker

periodically. If the HDD LED is solid for extended periods it

may indicate a problem, especially if the PC is not doing any obvious processing.

Similarly, network adapters often have LEDs to indicate the connection speed

and activity on a network.

5.1.2 Alerts Most PC systems now have good internal monitoring systems, such as internal

thermometers. When these systems detect problems, they can display an administrative alert either on the local system or to some sort of network

management system. The OS may also be able to detect some kinds of hardware failure and display an appropriate alert.

5.1.3 Overheating

Excessive heat damages the sensitive circuitry of a computer very easily. If a system feels hot to the touch you should check that the fans are operating and

not clogged by dirt or dust. Unusual odours, such as a burning smell or smoke, will almost always indicate that something is overheating.

5.1.4 Loud noises Loud or unusual noises can often indicate that a device, such as a fan or HDD,

is failing. You need to distinguish between ‘healthy’ and ‘unhealthy’ noises.

Page 116: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 111

© CTI Education Group

Example A HDD may make a certain ‘whirring whine’ when first

spinning up and a ‘chattering’ noise when data is being written; clicking, squealing, loud noises or continual noises

may, however, indicate a problem.

5.1.5 Visible damage If a system has had liquid spilled on it or if fans or the keyboard are clogged by

dust or dirt, there may be visible signs of such.

5.2 Troubleshooting power problems PC components need a constant, stable supply of power to run. If a computer

will not start, it is likely be to a power problem. If a PC suddenly turns off or restarts, a power problem is also likely.

During the normal course of operation, the CPU converts the alternative

current (AC) mains supply to direct current (DC) voltage. DC voltage is used to power the internal drives and motherboard components. When the PSU is sure

that it is providing a stable supply, it sends a power good signal to the CPU.

The CPU then begins to run POST.

5.2.1 No power

If none of the LEDs on the front panel of the system case are lit up and you cannot hear fans or HDDs spinning, the computer is not getting power. This is

likely to be a fault in the PSU, incoming mains electricity supply, power cables/connectors or fuses. To isolate the cause, try the following:

Check that other equipment in the area is working; there may be a blackout

Check that the PSU cabling is connected to the PC and wall socket and that

all switches are in the ‘on’ position Try another power cable; there may be a problem with the plug or fuse.

Check that all of the wires are connected to the correct terminals in the plug. Check the fuse resistance with a multimeter

Try plugging another piece of equipment, such as a lamp, into the wall socket. If such does not work, the wall socket is faulty. Use another wall

socket and get an electrician to investigate the fault Try disconnecting extra devices, such as optical drives. If this solves the

problem, the PSU is underpowered and you need to fit one with a higher power rating

Page 117: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 112

© CTI Education Group

5.2.2 Using a multimeter

A multimeter can be used to measure voltage, current and resistance. Voltage readings can be used to determine whether, for example, a power supply is

functioning correctly. Resistance readings can be used to determine whether a fuse or network cable is functioning correctly. Most modern multimeters are

digital and have an LED or LCD readout.

Use a multimeter as follows:

Check the multimeter’s leads before use; do not use leads with damaged or

broken probes or damaged insulation Where possible, connect the multimeter before powering up the circuit and

power down before removing the multimeter Connect the black test lead to the terminal merited COM or REF

Connect the red lead to the terminal corresponding to the measurement to be taken and/or adjust the switch so that it corresponds to the

measurement to be taken. There may be more than one terminal for the red lead; examine the markings around the terminals

Before taking a measurement, check that the leads are connected to the correct terminals and that all meter switches are in the correct position

Turn on the multimeter. Do not adjust switch settings while the multimeter is connected to an energised circuit; this can damage the multimeter

5.2.2.1 Testing fuses

To test a fuse, set the multimeter to measure resistance and touch the probes to each end of the fuse. A good fuse should have virtually zero resistance; a

blown fuse will have virtually infinite resistance.

5.2.2.2 Testing PC power supplies

Power supply problems can be indicated by otherwise inexplicable system lockups or unprompted reboots.

Page 118: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 113

© CTI Education Group

PC Switch Mode power supplies are not user serviceable. Never remove the cover of a Switch Mode power supply. Do not attempt any maintenance beyond

the simple tests described below:

Turn off the PSU at the wall Set the multimeter up as described previously

Insert the black probe into a ground pin Insert the red probe into the pin to be tested

Turn on the PSU, ensuring that you are not touching any part of the PC. Listen for the PSU’s fan spinning up. If the fan does not spin up, the PSU is

either not working or it is not receiving power from the wall outlet Take a reading from the multimeter (Figure 58):

Figure 58 – Testing a Molex connector with a multimeter

Source: GTS Learning (2013:267)

Repeat the process for each pin that you wish to test.

5.2.2.3 Testing AC adaptors

You can also use a multimeter to check the output of most types of adapter.

The expected outputs will be shown on the AC adapter label. Do the following:

Set the multimeter up to test for the appropriate voltage range Insert the red probe into the middle of the DC jack

Turn on the multimeter Touch the black probe to the metal part of the outside of the DC jack

Page 119: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 114

© CTI Education Group

5.2.3 Using a power supply tester

A power supply tester is a device designed with the sole purpose of testing PSUs. It is much simpler to use than a multimeter as you do not have to test

each pin in turn.

5.3 Troubleshooting POST Once the CPU has been given the power good signal, the BIOS performs the

POST. The POST is a built-in diagnostic program that checks the hardware to ensure that the components required to boot the PC are present and

functioning correctly.

The POST starts by locating the video card BIOS at the address 0000 in memory. If found, the video card is initialised from its own BIOS; information

about the card manufacturer may also be displayed at this point.

A startup screen is displayed next. More tests on the system, including

counting through system RAM, are performed. If any errors are found, a text error message is displayed. Explanations of such are, usually, found. Once

numeric codes, these messages now tend to be descriptive, such as ‘key stuck’.

You should be able to access CMOS Setup from this point. This allows you to

reconfigure the settings stored in CMOS RAM. The key used to invoke CMOS Setup varies according to the BIOS but it is, usually, <Del>, <Esc>, <F1>,

<F2> or <F10>.

Some PCs indicate that system checks have been successfully completed at this point with a single short beep; the trend for modern computers is to boot

silently.

A search is conducted for further interfaces that may have ROM BIOS chips on

them. This could include SCSI host adapters and network cards. Further information about such may be displayed at this point and their memory

addresses reserved.

The BIOS may display a summary screen about the system configuration. This may scroll by quite quickly; use the <Pause> key if you want to analyse it.

The OS load sequence will now begin.

Page 120: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 115

© CTI Education Group

5.3.1 POST not running

If power is present (for example, if you can hear the fans spinning but the computer does not start or the screen is blank) it is likely that the POST

procedure is not executing. The most likely causes are faulty cabling or a damaged CPU or other motherboard component.

To troubleshoot, try the following tests and solutions:

Ask what has changed: if the BIOS has been flashed and the PC has not booted since, the BIOS update may have failed. Use the reset procedure in

such a case Check cabling and connections, especially if maintenance work has just been

performed on the PC: an incorrectly oriented PATA cable or a badly seated adapter card can stop the POST from running. Correct any errors, reset the

adapter cards and then reboot the PC Check for faulty interfaces and devices: it is possible that a faulty adapter

card or device is halting the POST. Try removing one device at a time to see if this solves the problem or remove all non-essential devices and then add

them back one-by-one Check for logic errors: POST test adapter cards can interpret the debug

codes given by the BIOS. The cards display the codes, thus you can check where the POST has stopped executing

Check for a faulty CPU or BIOS: if possible, replace the CPU and BIOS chips

with known good ones Some motherboards have jumpers to configure modes, such as BIOS

recovery, or CPU settings: if the jumpers are set incorrectly it could cause the computer to not boot. If the computer will not work after being serviced,

check that the jumpers have not been changed

5.3.2 POST errors

If the POST detects a problem, it generates an error message. As the error may prevent the computer from displaying anything on the screen, the error is

often indicated by a series of beeps.

Page 121: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 116

© CTI Education Group

For a beep code, you must decode the pattern of beeps and take the appropriate action (Table 8). Use resources, such as manufacturer websites, to

determine the meaning of beep codes.

Table 8 – POST errors

Source: GTS Learning (2013:272)

5.3.3 BIOS time and settings reset

If the CMOS battery is losing power, settings stored in CMOS, such as the date

and time or boot device order, will be lost or corrupted. If the computer is losing the correct time, it can be a sign that the battery is failing. If this

happens, the computer is likely to display the message ‘CMOS Checksum Error’ during the boot process. CMOS errors can also be caused by viruses or a faulty

motherboard or PSU.

Do the following:

Obtain a coin cell battery that is compatible with your motherboard Write down your CMOS settings so that you can restore them later

Unclip the existing battery and take it out. Plug in the new battery and switch the computer back on. Enter CMOS Setup and restore the PC’s

custom settings

Code Meaning

1 short beep Normal POST - system is OK.

2 short beeps POST Error - error code shown on screen.

No beep Power supply or motherboard problem (use a multimeter to check the onboard speaker is functioning).

Continuous beep Power supply, motherboard, or keyboard problem.

Repeating short beeps

Power supply or motherboard problem.

1 long, 1 short beep

Motherboard problem.

1 long, 2 short beeps

Legacy display adapter error (MDA, CGA).

1 long, 3 short beeps

Display adapter error (EGA, VGA).

3 long beeps 3270 keyboard card.

Page 122: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 117

© CTI Education Group

5.3.4 OS searches

Once the POST tests are complete, the BIOS searches the devices as specified in the CMOS boot sequence. If the first drive in the sequence is not found, it

moves on to the next: for example, if drive A contains no disk, the boot sequence goes on to drive C. If no boot devices are found, the system displays

an error message and halts the boot process.

If there is an error at this point, check that the removable drives do not

contain media that are interfering with the boot process and that the boot device order is correctly configured.

The code from the boot sector on a selected device is loaded into memory and

takes over from the BIOS. The boot sector code loads the rest of the OS files into RAM. Error messages received after this can, usually, be attributed to

software or driver, rather than hardware, problems.

5.4 Troubleshooting the motherboard Few problems are actually caused by the motherboard itself. The motherboard

does, however, contain a number of soldered chips and components, which could be damaged by ESD, electricity spikes or overheating. The pins on

integrated connectors can also be damaged by the careless insertion of plugs. These problems are fixable if you are handy with a soldering iron and can

source the replacement parts.

In some cases, errors may be caused by dirt (clean the contacts on the connectors) or chip creep (check that the chips and boards are properly

seated).

5.5 Troubleshooting the CPU CPU failures are rare; most system faults are more likely to be caused by

incorrect configurations, overheating or problems with other failed components. Before assuming that the processor has failed, you should always

rule out other potential problems first.

5.5.1 Unstable operation (system crash or hang) Symptoms, such as system lockup, a blue screen error display or reboot

without warning, are difficult to diagnose with a specific cause, especially if you are not able to witness the events directly. The most likely causes are software

problems, disk problems or malware.

If you can discount these, try to establish whether there is a pattern to the error; if it occurs when the PC has been running for some time, it could

indicate a thermal problem.

Page 123: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 118

© CTI Education Group

Next, check that the power supply is providing good, stable voltage to the system. If you can discount such, you should start to suspect a problem with

memory, the CPU or motherboard.

Inspect the motherboard for any sign of damage. If a component has ‘blown’ it can leave scorch marks. However, you will almost certainly need diagnostic

software to run tests to confirm whether there is a problem. Testing by substituting known good components would be too time consuming and

expensive.

The most likely causes of damage are heat, ESD or a power surge/spike. It is worth investigating any environmental problems or maintenance procedures

that could be the root cause of the error.

5.5.2 Heat Insufficient cooling is the main cause of processor problems. Thermal faults

are, normally, cyclic: a system works for some time, crashes and then works again later because powering down allows the processor to cool. You should

check the following:

Ensure that the CPU fan is working: proper cooling is vital to the lifespan and performance of a processor. If the processor is running too hot it can

decrease performance. A processor that is overheating can cause crashes or

reboot the machine Ensure that the heat sink is property fitted: it should be snug against the

processor. Heat sinks are, usually, ‘stuck’ to the processor using a special heat conductive paste. Some manufacturers, however, use lower quality

paste. In these cases it is possible to clean away the old paste and replace such with better paste, which will help the processor to run at a lower

temperature Always use blanking plates to cover up holes in the back or front of the PC:

holes can disrupt the flow of air and decrease the effectiveness of cooling systems

Speed: is the processor running at the correct speed? Running a processor at a higher clock speed can cause overheating. Double check the voltage and

timing settings in CMOS Setup

Page 124: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 119

© CTI Education Group

5.5.3 CPU not working

If a new processor or an upgrade has just been installed, you should perform the following simple diagnostic attack checks:

Compatibility: check that the processor is supported by the motherboard

Orientation: ensure that the CPU has been inserted correctly into its socket Voltage: check the voltage settings (through CMOS Setup). If the voltage

has been set incorrectly, try to correct such to see if the CPU still works

Configuration: check the CMOS settings and motherboard jumpers to ensure that they are correct

Swap/test by substitution: if the old CPU works, the new one may be faulty

5.5.4 Speed problems

If a system is slow or reports the wrong CPU speed at boot time, you should perform the following diagnostic checks:

Setup: verify the CMOS configuration (on a very old PC) or motherboard

jumper settings

Throttling: most CPU models will have protection circuitry to slow down when they get too hot. You should investigate why the CPU is overheating

(for example, has the fan stopped working or is the heat sink clogged with dust)

If a user complains that a system is slow, try to verify that it is not a software

or network problem. You can use Task Manager to display the CPU and network utilisation: if the CPU utilisation consistently runs at 90% to 100%, it

is likely that a faulty application process is to blame.

5.6 Troubleshooting memory If you suspect that memory is faulty, first check that such is seated properly in

the connector and that the modules are compatible with the motherboard and slots in which they are installed. Next, use a diagnostic utility to verify the

chips.

5.6.1 Lockups Faulty memory chips can cause lockups and blue screens. There are various

troubleshooting utilities designed to test memory chips. Windows Vista and Windows 7 ship with a memory tester; it is available through booting from the

product disc and selecting the repair option. Testing can take a long time to complete as it should, normally, run several times to fully rule out a hardware

failure.

Page 125: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 120

© CTI Education Group

5.6.2 Windows Memory Diagnostics tool

Windows Vista and Windows 7 include the Windows Memory Diagnostics tool to test memory chips for errors (Figure 59). You can either run such from

administrative tools or boot to Windows pre-installation environment (PE) and select Windows Memory Diagnostics. Select Restart and check for

problems; the computer will restart and run the test.

Figure 59 – Windows Memory Diagnostics tool

Source: GTS Learning (2013:276)

If errors are found, first check that all the memory modules are correctly

seated. Remove all memory modules but one and retest. You should be able to identify the faulty board via a process of elimination. If a known good board is

reported faulty, the problem is likely to be in the motherboard.

Page 126: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 121

© CTI Education Group

5.6.3 New memory not recognised

After performing a memory upgrade, rebooting and then checking the memory count, the memory may not be recognised. You should first check that the

modules have been installed correctly into their sockets. If this does not solve the problem, check the following:

Memory type:

o Does the motherboard support the memory card capacity that you have

installed (for example, a board may be restricted to 1 GB in total or may not support individual modules larger than 512 MB)?

o Does the motherboard chipset support the memory technology that you have installed (for example, registered or ECC)?

Configuration: o Are the memory banks complete?

o Have the memory banks been filled in the correct sequence? o Is the motherboard operating in dual channel mode?

In all cases, refer to the motherboard documentation for guidance.

5.7 Troubleshooting adapter cards and I/O ports

If an adapter card is not recognised after installation, the first thing to check is that it is compatible, the next that it is inserted correctly and then that there is

no dirt affecting the connection between the contacts on the card edge and slot. If an adapter card stops working, try reinstalling the driver and then

check for seating or dirt issues.

It is possible to perform ‘loopback’ tests on all types of I/O and communication ports. Loopback tests are performed by using a special device, in the form of a

connector plug, that routes a port’s output lines directly back to its input lines.

These are used in conjunction with third-party diagnostic programs (for example, PassMark, PC-check and MicroScope) that send test data to the port;

the diagnostic software then checks that the data is sent back correctly by the loopback plug.

USB ports are designed to be very simple. If a device requires driver software,

you should install such first (before connecting the device). You then simply attach the device and it should be detected and installed. If a device is not

recognised, it will appear as an unknown device in Device Manager. In such a case, try installing a new driver, using a different port, or replace the cable.

Many devices are USB 2 instead of the original USB standard. If you plug a high speed device into a low speed device/port, a warning message is

displayed and the device will operate at a low speed.

Page 127: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 5 – System Testing Page 122

© CTI Education Group

Concluding remarks

In this unit, we introduced the basic computer problems that might be experienced as well as how to troubleshoot components. Some problems that

we recognised were experienced after performing an upgrade or reboot.

In the next unit, we will investigate computer system maintenance and

upgrade.

Self-assessment

Test your knowledge

1. Explain the Windows Memory Diagnostics tool.

2. Briefly discuss what could decrease the performance of a computer system.

Page 128: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 123

© CTI Education Group

Unit 6: System Maintenance and Upgrade

Unit 6 is aligned with the following learning outcome and assessment criteria:

Learning outcome

LO4 Be able to undertake routine maintenance on

computer systems

Assessment criteria AC4.1 Perform routine maintenance tasks on a computer

system AC4.2 Upgrade the hardware and software on a computer

system

Learning objectives

After studying this unit, you should be able to:

Use utilities to optimise performance Identify OS, driver and firmware updates

Use procedures and tools to back up and migrate user data Describe the different malware threats

Identify the symptoms of different types of malware infection

Use secure computer practices to reduce the risk of malware Operate antivirus software to protect computers against infection

Introduction In the previous unit, you learnt how to troubleshoot problems associated with

computer systems.

In this unit, we will identify and discuss the functions of utility software. We

will also focus on the different methods of performing backups and restoring data. We conclude by discussing the types of malware that are harmful to

computer systems. You will learn how to identify malware using their common symptoms, how to remove such and how to prevent such in computer

systems.

Page 129: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 124

© CTI Education Group

6.1 Maintaining and optimising disk drives

Of all computer sub-systems, hard drives and file systems probably require the most attention to keep in optimum working condition. They are, generally,

subject to three main problems:

1. Fragmentation: ideally, each file would be saved in contiguous clusters on a

disk. In practice, over time, as files grow, they become fragmented (written to non-contiguous clusters), reducing read performance

2. Capacity: typically, much more file creation occurs on a computer than file deletion. This means that capacity can reduce over time, often quite

quickly. If a system’s disk has less than 20% free space, performance can become impaired. When free space drops to below 200 MB, a low disk

space warning is generated 3. Damage: hard disk operations are physically intensive and the platters of

such are easy to damage, especially in the case of a power cut. If a disk does not recognise that a sector is damaged, files can become corrupt

The above can be addressed by the systematic use of disk performance tools.

These tools should be run regularly (at least every month) and before installing

software applications.

6.2 Utility software

6.2.1 Check Disk The Check Disk (chkdsk) utility checks the integrity of disks and can repair

detected problems (Figure 60):

Figure 60 – Check Disk utility

Source: GTS Learning (2013:131)

Page 130: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 125

© CTI Education Group

There are three ways to run Check Disk, namely:

1. No option selected: this runs in Read-only Mode 2. Automatically fix file system errors: file system errors are caused by

crashes, power loss and the like. At a command line, use chkdsk volume:

/f, where volume refers to the drive letter

3. Scan for and attempt to recover bad sectors: bad sectors are damaged in the actual drive. If a drive has many bad sectors, it is probably nearing the

end of its useful life. You will be prompted to save any recoverable data, which is copied to the root directory as filennnn.chk files. At a command

line, use chkdsk volume: /r, where volume refers to the drive letter

Check Disk cannot fix open files, so you may be prompted to schedule the scan

for the next system restart. A version of Check Disk (autochk) will also run automatically if the system detects file system errors.

Other main parameters and switches for the command line version are

summarised in Table 9:

Table 9 – Check Disk command line switches

Switch Use

path Specifies a path (and, optionally, a file name) to check

/x Forces the volume to dismount; this will cause file errors for users with

open files on the volume

/I /c On NTFS volumes only; it skips parts of the checking process

Source: GTS Learning (2013:131)

Check Disk can take a long time to scan and fix errors on a large disk. You

cannot cancel this utility once started, so it may be wise to run a read-only

scan first.

Page 131: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 126

© CTI Education Group

6.2.2 Disk Defragmenter

Disk Defragmenter (‘defrag’) reorganises a drive to store information relating to each file in contiguous sectors of the disk. This improves performance by

reducing the time required to load a file. Disk Defragmenter can also move data to the start of a disk, leaving a single free area for use by new files

(Figure 61):

Figure 61 – Disk Defragmenter in Windows XP

Source: GTS Learning (2013:132)

You can defragment local and external hard disks and flash drives but you cannot defragment optical discs or network drives.

Although it is possible to run this utility in the background while you work, it

will slow down your machine and prevent defragmentation of open files. It is better to run Disk Defragmenter when your computer is not being used. It may

also be necessary to disable applications that run in the background, such as antivirus software, Task Scheduler or a screen saver.

The defragmenter requires above 15% of free disk space to work effectively. If insufficient free disk space is available, some files may not be defragmented.

To make the defragmenter run more efficiently, restart the computer before running such to clear out the page file.

Page 132: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 127

© CTI Education Group

Windows Vista and Windows 7 automatically schedule the defragmenter to run using Task Scheduler (Figure 62):

Figure 62 – Disk Defragmenter in Windows 7

Source: GTS Learning (2013:133)

In Windows Vista you need to install SP1 before you can select which drive to defragment via the GUI. Also, the GUI tool does not display progress.

At a command line, the basic syntax is defrag volume, where volume refers to

the drive letter or volume name. The main switches for Windows Vista and

Windows 7 are as follows (Table 10):

Table 10 – Disk Defragmenter command line switches

Switch Use

/a Analyses the volume and displays a report

/f Forces a volume to be defragmented

/v Displays a complete analysis and defragmentation reports

/c Defragments all volumes

/e Defragments all volumes except those specified

/h Runs the tool at normal (rather than at low) priority

/m Performs defragmentation of multiple volumes in parallel

/x Consolidates free space (tries to make all empty sectors contiguous); this

option is useful if you wish to shrink a volume

Source: GTS Learning (2013:133)

Page 133: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 128

© CTI Education Group

6.2.3 Disk Cleanup

Applications and installation programs create temporary and cached files as part of their normal operations; these files consume disk space. The Disk

Cleanup utility (cleanmgr) (accessed via the System Tools folder in the Accessories group on the Programs menu) provides a means of deleting

unwanted temporary files created by installation programs, applications and cached Internet files (Figure 63). There is also an option to compress unused

files but not in Windows Vista or Windows 7.

Figure 63 – Disk Cleanup in Windows 7

Source: GTS Learning (2013:134)

6.2.4 Task Scheduler

Task Scheduler, as its name suggests, set tasks to run at a particular time. Tasks can be run once at a future date/time or according to a recurring

schedule. A task can be a simple application process or, more commonly, a batch file or script.

Page 134: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 129

© CTI Education Group

Task Scheduler is accessed via Control Panel in Windows XP (Figure 64) and via Administrative Tools in Windows Vista and Windows 7. Apart from defining

the path to a file or script that you want to execute and setting the schedule, you should enter the credentials that the task will run under (if the selected

user account does not have permission, the task will not run).

Figure 64 – Scheduled task properties in Windows XP

Source: GTS Learning (2013:135)

Windows Vista and Windows 7 Task Scheduler (Figure 65) come with numerous enhancements. Many of the processes come with predefined task

schedules (Disk Defragmenter, for instance, is now configured to run

automatically by default). Other enhancements include:

You can define triggers other than simple schedules (for example, running a task when the machine wakes from sleep or hibernation)

You can add multiple actions under a single task You can view a log of events connected to a task

You can organise tasks in folders and there are tools for managing such

Page 135: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 130

© CTI Education Group

Figure 65 – Task Scheduler in Windows 7

Source: GTS Learning (2013:135)

6.2.5 Patch management Patch management is a key PC maintenance task that ensures that PCs

operate reliably and securely. A patch or update is a file containing replacement system or application files. The replacement files fix some sort of

coding problem in the original file. The fix could be made to improve reliability, security or performance.

A SP is a collection of previous updates but may also contain new features and

functionality. While SPs are not paid for, they do require you to follow the upgrade process to ensure that software and, to a lesser extent, hardware will

be compatible. You should always make a backup before applying SPs. SPs can be downloaded from Microsoft’s website or shipped on disc. The later

manufacturing releases of setup media tend to include the latest SP.

Microsoft products are subject to their Support Life Cycle Policy. Windows

versions are given five years of mainstream support and five years of extended support (during which only security updates are shipped). Support is

contingent on the latest SP being applied (non-updated versions of Windows are supported for 24 months following the release of a SP).

Page 136: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 131

© CTI Education Group

6.2.6 Update policy

Later copies of setup media have built-in SPs but you should always try to keep Windows up to date. Failing to do so can cause anything from corrupt

onscreen graphics, when using new video drivers, to complete system crashes and vulnerability to malware.

There are two approaches to applying updates, namely:

1. Apply all the latest patches to ensure that the system is as secure as possible against attacks and software flaws

2. Only apply a patch if it solves a particular problem being experienced

You also need to keep up to date with security bulletins. Updates (particularly SPs) can cause problems, especially software application compatibility. Best

practice is to test updates on a non-production system before rolling such out.

Some applications may require the OS to be patched to a certain level. To check the current build of Windows, run winver.

6.2.6.1 Windows and automatic updates

In Windows XP, Windows Update is a website (update.microsoft.com) that

hosts maintenance updates for different versions of Windows and Internet

Explorer (Figure 66). An active control installed on a computer enables such to browse the site and select updates for download and installation, using the

Background Intelligent Transfer Services (BITS) Protocol.

Figure 66 – Selecting updates for Windows XP via Windows Update

Source: GTS Learning (2013:137)

Page 137: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 132

© CTI Education Group

Windows Update, further, hosts critical updates and security patches (code to fix security vulnerabilities in Windows and its associated software) as well as

optional software and hardware updates to add or change features or drivers.

The WindowsUpdate.txt log (stored in the System Root folder) records update activity. If an update fails to install, you should check the log to find the cause;

the update will fail with an error code that you can look up on the Microsoft Knowledge Base. If an update causes problems, you can use the Add or

Remove Programs applet to uninstall such.

During setup, Windows can be configured to check for system updates (via the Internet) and download such as needed. In Windows XP, the Automatic

Updates applet (opened from Control Panel or on a tab in the System

Properties dialog box) allows you to configure when updates are scheduled and what level of user interaction is required (Figure 67):

Figure 67 – Automatic Updates in Windows XP

Source: GTS Learning (2013:138)

In Windows Vista and Windows 7, update settings are configured via the Windows Update applet in Control Panel.

6.2.6.2 Application updates

Software applications, especially those with browser plug-ins, may also need updating with the latest patches. Applications can contain security

vulnerabilities in the same way as an OS; in fact, applications are targeted more aggressively than Windows itself as attackers recognise that they are

less likely to be patched than the OS.

Page 138: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 133

© CTI Education Group

6.2.6.3 Antivirus software updates

It is particularly important that antivirus software, or any other type of malware-blocking software, be updated regularly. Two types of update are

generally necessary:

1. Virus definitions/patterns: this is information about new viruses; these may be available daily or even hourly

2. Scan engine/components: this fixes problems or makes improvements to the scan software itself

There is, usually, an option within the software program to download and

install updates automatically. Updates are also scheduled to take place daily by

default; this can be configured via the Client Management settings. Note the option to retry and randomise the start time: this helps to ensure that an

update will take place (Figure 68):

Figure 68 – Scheduling regular updates

Source: GTS Learning (2013:140)

6.2.6.4 Driver updates

Windows ships with a number of core and third-party hardware drivers.

Updates for these devices can be obtained via Windows Update, however, they will be listed as optional updates and might thus not install automatically.

Most of the time, third-party drivers should be obtained from the vendor’s

website. To update, you download the driver files and install them using the

supplied setup program (or extract them manually and save such to the hard disk). You can then use the device’s property dialog in Device Manager to

update the driver. You can either scan for the update automatically or point the tool to the updated version that you saved to disk.

Page 139: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 134

© CTI Education Group

6.2.6.5 Firmware updates

Motherboard manufactures may regularly update their BIOS to fix bugs, solve OS incompatibilities or add new features. You should visit your motherboard

manufacturer’s website regularly to check if and when upgrades are available.

In addition to the PC BIOS, you may need to update the firmware on other devices, such as drive units, printers and networking equipment. Devices

directly attached to a PC (via USB or Firewire) can, normally, be updated from Windows using a setup utility provided by the vendor. A network device would,

typically, be updated using its management software or web configuration interface (Figure 69):

Figure 69 – Updating the firmware on a SOHO DSL router using its web interface

Source: GTS Learning (2013:141)

Page 140: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 135

© CTI Education Group

6.3 Data backup

One of the most important operations in computing is the creation of secure backups of data files. Typically, network backups take place using a tape

system, which has the advantages of high capacity, relatively low cost and

portability. For this type of backup, advanced backup software, capable of backing up online databases and remote systems, is required.

When a computer is connected to a network, it is bad practice for a user to

store data locally (on the client PC’s hard drive). Network home folders and the use of scripts to copy data can help users to transfer such to a file server,

where it can be backed up safely.

Personal backups are necessary for home users or workgroups, where no central file server is available. In such a scenario, the backup software supplied

with Windows XP (ntbackup) is serviceable (Figure 70):

Figure 70 – Performing a backup in Windows XP

Source: GTS Learning (2013:142)

Page 141: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 136

© CTI Education Group

Windows Vista (Figure 71) supplies a simplified wizard-driven tool with options to back up the whole system (an image) or just user data to an appropriate

device (hard disk or recordable DVD).

Figure 71 – Windows Vista Backup and Restore Centre

Source: GTS Learning (2013:143)

The backup tool included with Windows 7 (Figure 72) has the ability to back up selected locations as well as the option to make system images in all versions.

Windows Home editions are restricted to backing up to local drives or removable media while Business/Ultimate editions can back up to a network

share (in Vista, network locations can be selected in all editions except Home Basic).

Figure 72 – Windows 7 Backup and Restore Centre

Source: GTS Learning (2013:143)

Page 142: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 137

© CTI Education Group

A network backup requires high capacity media with multiple GBs. This requires the use of tape-based systems, such as linear tape open (LTO). For a

workgroup or workstation, tape-based media might be too expensive. Alternatives include removable hard disks or even flash memory/USB drives.

6.3.1 Backup types A backup is, usually, performed using one of three main types, namely:

1. Full 2. Incremental

3. Differential

A full backup includes all selected files and directories while incremental and differential backups check the status of the archive attribute before including a

file. The archive attribute is set whenever a file is modified. This allows for backup software to determine which files have been changed and, therefore,

need to be copied.

Table 11 summarises the backup types:

Table 11 – Choosing a backup type

Source: GTS Learning (2013:144)

The criteria for determining which method to use is based on the time it takes to restore vs the time it takes to back up. Assuming a backup is performed

every working day, an incremental backup only includes files changed during that day, while a differential backup includes all files changed since the last full

backup.

Type Data Selection Backup /

Restore Time Archive Attribute

Full All selected data regardless of when it has previously been backed up

High / low (one tape set)

Cleared

Incremental New files and files modified since the last backup

Low / high (multiple tape sets)

Cleared

Differential All data modified since the last full backup

Moderate / moderate (no more than 2 sets)

Not Cleared

Page 143: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 138

© CTI Education Group

Incremental backups save on backup time but can be more time consuming when the system must be restored. The system must be restored from the last

full backup set and then from each incremental backup that has subsequently occurred. A differential backup system, in turn, only involves two tape sets

when a restore is required.

Do not combine differential and incremental backups. Use full backups interspersed with differential backups or full backups interspersed with

incremental backups.

Most software also has the capacity to do copy backups. These are made outside of the tape rotation system (ad hoc) and do not affect the archive

attribute.

6.3.2 Restoring data and verifying backups It is critical to test that backup operations function properly. The following

represents some of the main backup security issues:

Compatibility: a tape backup is useless without a drive capable of reading the media. Most drives can read tape formats from the previous generation

or more. If a Legacy drive fails and there is no replacement available, there is a very real risk to the security of an organisation’s data

Error detection: problems with the tape or configuration can cause backup

jobs to fail. Depending on the error, the whole job could be cancelled or some data may not get backed up. Backup software, usually, have the

facility to verify a backup (this makes the backup operation take longer) and report errors to the log

Configuration: when setting up a new job (and periodically thereafter), it is wise to check the media catalogue to ensure that all expected data has been

backed up Test restore: another option is to test that a restore operation can be

performed successfully. This is important when using new backup software; to test old tapes, to check a new job and to perform random spot checks.

When you do a test restore, you redirect data to a different folder to avoid overwriting live data (Figure 73)

Page 144: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 139

© CTI Education Group

Figure 73 – Redirecting file output for a restore operation

Source: GTS Learning (2013:145)

6.3.3 Shadow copies

A shadow copy or volume snapshot service (VSS) underpins the backup and system restore functionality in Windows Vista and Windows 7. The VSS creates

snapshots of each volume; this allows the backup program to access ‘open’ files and to preserve multiple system restore points.

Shadow copies also enable the previous versions feature. If you open a file or

folder’s property dialog, you can use the Previous Versions tab to locate older copies of a file or folder. These can be restored – either by copying the version

to a new file (select Open or Copy) or by overwriting the current file (select Restore) (Figure 74):

Page 145: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 140

© CTI Education Group

Figure 74 – Folder properties in the Previous Versions tab

Source: GTS Learning (2013:146)

Previous file or folder versions are made available for either system restore

points or backup copies.

6.3.4 Restoring user profiles A backup is, usually, made with the purpose of being able to restore files and

settings to the same version of Windows. Data file backups can also be used to restore data to a new computer and there are circumstances when you would

want to restore data and settings (a whole user profile) from a computer running an older version of Windows to one running a newer version. Microsoft

has released several tools fit for these purposes.

6.3.4.1 User State Migration tool

If performing a clean installation or providing a user with a new computer

rather than performing an upgrade, you may want to retain user settings from the old PC. These may include desktop and browser configurations, application

settings and data files. The User State Migration tool will assist in this process as part of a large scale deployment. The files for the User State Migration tool

are found in the Windows Automated Install Kit (AIK), available from Microsoft’s website.

Page 146: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 141

© CTI Education Group

The User State Migration tool consists of two tools, namely:

1. ScanState: this is used on the old PC to copy files and settings to a migration store. The tool is used in conjunction with extensible markup

language (XML) configuration files that specify what to back up 2. LoadState: this is used on the new PC to restore files and settings, again

using XML configuration files

6.3.4.2 File and Settings Transfer Wizard

This program provides a friendly interface to the User State Migration tool, designed for home users. Again, it is useful if you are planning to perform a

clean installation or for users that have bought a new computer and want to

transfer settings from an old computer.

To perform such a transfer, you will need to do the following:

Put the Windows setup disc in the old computer or installation and choose Perform Additional Tasks > Transfer Files and Settings

Select Old computer and click Next Choose a location in which to store the data or transfer such to the new

computer. Click Next Choose what you want to transfer and click Next. Acknowledge any

warnings and click Next again (Figure 75):

Figure 75 – File and Settings Transfer Wizard

Source: GTS Learning (2013:148)

Upgrade the target workstation and use the wizard on that computer to complete the process

Page 147: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 142

© CTI Education Group

6.3.4.3 Windows Easy Transfer tool

In Windows Vista and Windows 7, the Windows Easy Transfer tool replaces the File and Settings Transfer Wizard. It, essentially, has the same functionality

except that it does not support versions of Windows older than Windows XP (the Vista version can collect data files only from Windows 2000). The

Windows Easy Transfer tool cannot be used to transfer from a 64-bit version of Windows to a 32-bit version, though it can transfer from a 32-bit source to a

64-bit destination. The tool also does not transfer applications.

To perform a transfer, you will need to do the following:

To transfer files, first run the Windows Easy Transfer tool to create a client

version of the software for your old PC (if the old PC is Windows Vista and you are moving files to Windows 7, create a client version in Windows 7 and

install such on the Windows Vista PC, rather than running an older client version on the old PC)

Install and run the Windows Easy Transfer tool on the old PC and choose a storage location as well as what you want to transfer (Figure 76):

Figure 76 – Running the Windows Easy Transfer tool to collect data from an old PC

Source: GTS Learning (2013:148)

Page 148: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 143

© CTI Education Group

Run the Windows Easy Transfer tool on the new PC and select the transfer file that you made. You can customise what gets restored or use Advanced

Options to map an account from the old PC to a differently named account on the new PC (Figure 77). This is also necessary if you want to transfer

data from a domain account to a non-domain account

Figure 77 – Mapping user accounts in the Windows Easy Transfer tool

Source: GTS Learning (2013:149)

6.4 Computer malware

6.4.1 Malware types

Malware is a term to describe malicious software threats and social engineering tools designed to vandalise or compromise computer systems.

6.4.1.1 Computer viruses and worms

Computer viruses are programs designed to replicate and spread among computer systems. They produce a wide variety of PC symptoms and, in

extreme cases, can cause permanent damage or loss of files.

Page 149: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 144

© CTI Education Group

There are several different types of virus and they are, generally, classified in terms of the different ways in which they can affect a computer. Examples

include:

Boot sector viruses: these attack the boot sector information, the partition table and sometimes the file system

Program viruses: these are sequences of code that insert themselves into another executable program. When an application is executed, the virus

code becomes active Macro-viruses: these viruses affect Microsoft Office documents by using the

programming code that underpins macro-functionality maliciously Worms: these are memory resident viruses that replicate over network

resources

Viruses are classified as software that attempts to self-replicate to other files,

disks, computers or networks. However, a virus’s payload can be programmed to perform many different actions, especially in the case of program and

macro-viruses. A virus’s payload may be programmed to display silly messages, corrupt or delete documents, damage system files or install

spyware.

Most viruses must be activated by the user, thus they need some means to trick the user into opening an infected file. E-mail attachment viruses (usually

program or macro-viruses in an attached file) often use the infected host’s electronic address book to spoof the sender’s address when replicating.

Example Jim’s computer is infected with a virus and has Alan’s

e-mail address in his address book. When Sue gets an infected e-mail, apparently sent by Alan, it is the virus on

Jim’s computer that has sent the message.

Viruses can also use application exploits to replicate without user intervention.

This is why it is imperative to apply security patches to OS and application software, especially web browser and e-mail software, promptly.

6.4.1.2 Trojans

Other types of malware are not classified as viruses as they do not necessarily

try to make copies of themselves. They can, however, be just as much of a security threat as viruses. A Trojan is a program that pretends to be something

else (named after the Trojan horse in Greek history). For example, an amusing background may also install a key logger or rootkit.

Page 150: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 145

© CTI Education Group

6.4.1.3 Spyware and adware

Spyware and adware are classes of program that monitor computer and Internet activity; it then sends this information to someone else. If a user is

not informed, it is spyware; if a user accepts the use of their data, it is adware.

Aggressive spyware programs, known as ‘key loggers’, actively attempt to steal confidential information, for example, capturing credit card numbers by

recording key strokes entered into a web form.

6.4.1.4 Rootkits

A rootkit is a set of tools designed to gain control of a computer without

revealing its presence. The general functions of a rootkit are:

Replacing key system files and utilities to prevent detection and the eradication of the rootkit itself. The most sophisticated rootkits can install

and run with system or kernel level privileges Providing a backdoor channel for the rootkit handler to reconfigure a PC,

steal information or install additional spyware or other malware remotely

Rootkits are often used to compromise a number of computers (botnets) with the purpose of performing wide-scale denial of service (DoS) attacks against

Internet hosts. Rootkits are also used by attackers to conceal their actions (attacks or spam appear to come from the corrupt computer system). Rootkits

may also be deployed as part of digital rights management and copy protection mechanisms. Sony infamously released a music player for its extended copy

protection CDs that also installed a rootkit.

6.4.1.5 Phishing

Phishing is a technique that tricks a user into revealing confidential information

by requesting such in an official-looking e-mail (perhaps pretending to come from a bank or genuine service provider). The e-mail will contain a link to a

counterfeit site or to a valid site that is vulnerable to a cross-site scripting attack. The user is prompted to input confidential data, such as an online bank

account number and password, which are then stolen by the attacker.

6.4.1.6 Spam

Spam is unsolicited e-mail messages, the content of which is, usually, pornography, miracle cures for various personal conditions or bogus stock

market tips. Spam is also used to launch phishing attacks and spread worms

and viruses.

Page 151: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 146

© CTI Education Group

Spam needs to be filtered before it reaches a user’s inbox. Most e-mail applications now ship with junk mail filters or you can install a filter from the

organisation’s mail gateway.

The main problem with spam filters is that they can block genuine messages too, leading to missed communication.

6.4.2 Malware symptoms

6.4.2.1 General symptoms

The following are examples of symptoms that may indicate a virus infection:

A computer fails to boot or experiences lockups The file system or individual files are corrupt or deleted

Date stamps and file sizes of infected files change Permission attributes of files change, resulting in access denied errors

New executable files (exe and dll) appear in system folders. They may have file names that are very close to valid programs (for example, notpad.exe)

Strange messages or graphics appear onscreen Security applications (antivirus, firewall, Windows Update) stop working

Applications for Windows tools (for example, Notepad) stop working Performance at startup or in general is very slow

Network performance is slow or Internet connections are disrupted

Any sort of activity or configuration change that was not initiated by the user is

a good reason to suspect malware.

6.4.2.2 Spyware, adware and web browser symptoms

Malware often targets web browsers. Remember that malware is not always destructive. Malware, such as adware and spyware, is designed with

commercial or criminal intent, rather than to vandalise a computer system.

Common symptoms of infection by spyware or adware are:

Pop-ups or additional toolbars The home page or search provider changes suddenly

Searches returning results are different to other computers

Slow performance and excessive crashing (faults) Viruses and Trojans may spawn pop-ups without the user opening the

browser

Page 152: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 147

© CTI Education Group

Another major symptom is redirection: this is where the user tries to open one page but gets sent to another; often this may imitate the target page. In

adware this is just a blunt means of driving traffic through a site, but spyware may exploit such to capture authentication details.

6.4.2.3 Trojan, rootkit and botnet symptoms

Malware that tries to compromise a PC will try to create a communication

channel with its ‘master’. If the firewall is still working, you may see unfamiliar processes or ports trying to connect to the Internet.

Remember that the most powerful malware can disguise its presence.

Example

The Netstat utility shows open ports on a PC. A rootkit may replace Netstat with a modified version that does not show

the ports in use by the rootkit.

6.4.3 Virus alert hoaxes Hoax virus alerts are quite common. They are often sent as mass e-mails as a

prank. Some hoax virus alerts describe a number of steps that you “must take” to remove the virus, however, following these steps may cause damage to

your computer.

If you have an antivirus, the vendor may provide a virus alert service. You should use the antivirus to remove a virus from an infected file.

Rogue antiviruses are particularly popular to disguise Trojans. In the early versions a website would display a pop-up disguised as a normal Windows

dialog with a fake security alert, warning the user that viruses have been detected. As browser and security software have moved to block such, cold

calling vulnerable users claiming to represent Microsoft Support has become popular.

Page 153: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 148

© CTI Education Group

6.4.4 Preventing malware infection

There are numerous sources of malware infection. The primary sources are:

Visiting ‘unsavoury’ websites with an unpatched browser, low security settings and no antivirus software

Opening links in unsolicited e-mails Infection from another compromised machine on the same network

Executing a file of unknown provenance: e-mail attachments are still the

most popular medium but others include file sharing sites, websites in general, attachments sent via chat/instant messaging, AutoRun USB sticks

and CDs

A number of steps can be taken to reduce the risk and impact of software infection. These include:

Perform regular backups that allow for data to be recovered in the case of

loss owing to a virus infection Apply OS and application security patches

Do not allow users to install their own software programs. If necessary, measures, such as removing or disabling removable drives, can be

employed. Windows-based systems allow the administrator to determine who can run new programs, install new software or download files from the

web

Install and use an antivirus package. The virus package must be kept up to date with updated signatures and definitions; viruses are continually being

developed thus the latest signatures offer the most protection Select antivirus software that scans automatically (on access)

Configure filtering on the messaging server as this will prevent most of the unsolicited messages (spam) arriving at the server from getting to the user’s

mailbox Do not log on with administrator privileges except where necessary. Limit

administrative privileges to a few select accounts. Keep passwords for these accounts secure

Educate users about not running attachments and supplement this with procedures that will prevent files, such as executables and Microsoft Office

macros, from being allowed to run. This could be accomplished, for instance, by only allowing digitally signed code to be executed

Audit system events, such as logons, and review logs for unusual activity

Establish a procedure for recovery following virus infection to minimise the spread and effects of such

Page 154: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 149

© CTI Education Group

Routine procedures, such as applying critical and security patches to the OS and applications as well as updating virus definitions and malware threats in

antivirus software, should be automated, where possible, or performed according to a strict schedule.

An organisation needs to develop and enforce effective policies, backed up by

disciplinary procedures to supplement training and education programmes.

6.4.4.1 Antivirus software

Antivirus software uses a database of known virus patterns (definitions) as well as heuristics malware identification techniques to try to identify infected files

and prevent viruses from spreading. ‘Heuristics’ mean that the software uses

knowledge of the sort of things that viruses do to try to spot (and block) virus-like behaviour.

Antivirus software scans files and blocks access if it detects anything

suspicious. The user can then decide either to try to disinfect the file, quarantine such (block further access) or delete such.

The antivirus scanner also runs at boot time to prevent boot sector viruses

from infecting the computer. Most types of software can also scan system memory (to detect worms), e-mail attachments, removable drives and network

drives.

The latest antivirus software, usually, includes anti-Trojan software as well as spam, adware and spyware blockers.

Antivirus software tends to come as either personal security suites, designed to protect a single host, or network security suites, designed to be centrally

managed from a server console. Most antivirus software is designed for Windows PCs and networks, as these are the systems targeted by most virus

writers; however, software is also available for Linux and Apple Mac OSs.

Some of the major vendors are Symantec (including the Norton brand), McAfee, Trend Micro, Kaspersky, ESET (NOD32) and BitDefender.

Many antivirus vendors offer applications that are specifically designed for the

protection of organisations connected to the Internet. For example, Symantec Endpoint Protection (Figure 78) can be configured to download virus definitions

and product updates to clients automatically, scan Microsoft Exchange and Lotus Notes messaging systems, and protect against Trojans and spyware.

Page 155: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 150

© CTI Education Group

Figure 78 – Symantec Endpoint Protection

Source: GTS Learning (2013:232)

The following steps use Symantec Endpoint Protection as an example of

scanning for viruses.

Scanning for viruses

Open the antivirus application and select the Scan for Threats option

Check the drives and/or folders that you want to scan You can choose between an active scan of commonly targeted folders and

file types, a full scan or custom scan (Figure 79):

Figure 79 – Symantec Endpoint Protection scanning

Source: GTS Learning (2013:233)

Page 156: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 151

© CTI Education Group

On access scanning

Almost all security software is now configured to scan on access. This reduces performance somewhat but is essential to maintaining effective protection

against malware.

When configuring antivirus software, it is vital to configure proper exceptions (Figure 80). Real-time scanning of some system files and folders (most notably

those used by Windows Update) can cause serious performance problems.

Figure 80 – Configuring on access scans

Source: GTS Learning (2013:234)

Scheduled scanning

All security software supports scheduled scanning. This can, however, seriously affect performance so it is best to run such when a computer is otherwise

unused. Symantec Endpoint Protection performs an active scan at startup but the user can define any type of scan to run to a schedule of their own

choosing.

Page 157: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 152

© CTI Education Group

Quarantining and remediating infected systems

Malware, such as worms, propagate over networks. This means that one of the first actions should be to disconnect the network link. If a file is infected with a

virus, you can use antivirus software to try to remove the infection (cleaning), quarantine the file (the antivirus software blocks any attempt to open such) or

erase the file. You can configure the action that the software should attempt when it discovers malware as part of a scan (Figure 81):

Figure 81 – Configuring scan remediation options in Symantec Endpoint Protection

Source: GTS Learning (2013:235)

If you cannot clean a file and have a backup copy, use such to restore the file. Check the files that you restore to ensure that your backups are not also

infected.

The only other alternative is to remove the virus manually or to reformat the

machine, reinstall software and restore data files from a (clean) backup.

For assistance, check the website and support services for your antivirus software. In some cases, you may have to follow a further procedure to

remove the virus or Trojan, such as booting into Safe Mode or Recovery Console.

Antivirus software will not necessarily be able to recover data from infected

files. Also, if a virus does disrupt the computer system, you might not be able to run antivirus software anyway and would have to perform a complete

system restore.

Removing backdoor applications

Antivirus software may have routines for removing Trojans and rootkits but the

most secure way is to quarantine the computer by removing it from the network. You could use Safe Mode or secure boot tools, such as booting to the

PE from the Windows setup disc, to try to remove the malware.

Page 158: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 153

© CTI Education Group

If the malware cannot be removed, repartition and reformat the drives, then reinstall the OS, applications and data from a backup (provided that you have

a backup that was made before the installation of the backdoor).

It is also important to configure a firewall on the network to block outgoing communication. This makes it more difficult for the backdoor application to

send data back to the attacker.

Most antivirus software now combines the functionality of basic malware detection with the capabilities of previously standalone programs, such as

personal firewalls, adware or spyware detection and intrusion detection (Figure 82):

Figure 82 – Monitoring services and intrusion attempts in Symantec Endpoint

Protection

Source: GTS Learning (2013:236)

6.4.4.2 Windows security tools

As Internet threats have become more prevalent, security features have

become a core part of Windows.

Page 159: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 154

© CTI Education Group

Security Centre

The Security Centre Control Panel applet was introduced in Windows XP SP2 (Figure 83) to provide a central location for monitoring the status of security

features (Windows Update, Firewall and Antivirus). Windows also displays alerts in the notification area if security features are missing or disabled.

Figure 83 – Security Centre in Windows XP

Source: GTS Learning (2013:237)

In Windows 7, the applet is called ‘Action Centre’.

Windows Defender

Windows Vista and Windows 7 ship with the antispyware program Windows Defender. This provides protection against programs that might try to modify

the web browser or startup programs, display excessive pop-ups or try to track web activity. Note, however, that this is not an antivirus or anti-Trojan tool.

Page 160: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Unit 6 – System Maintenance and Upgrade Page 155

© CTI Education Group

If you have antivirus software, you may want to disable Windows Defender as the two may conflict. Do the following:

Open Windows Defender from the Control Panel and select the Tools option

Click Options, then scroll to the bottom of the dialog and uncheck Use Windows Defender (under Administration Options) (Figure 84):

Figure 84 – Windows Defender

Source: GTS Learning (2013:238)

Concluding remarks In this unit, we introduced third-party utilities that can be used to support the

OS to perform system maintenance. We also discussed the various Windows

file management and backup procedures. The unit concluded by exploring the most common types of malware that can cause harm to computer systems as

well as the various methods to mitigate such.

Self-assessment

Test your knowledge

1. Define utility software, scheduled maintenance tasks, patches and updates.

2. Briefly discuss the types of malware that can affect a computer and how to protect against such.

Page 161: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Glossary Page 156

© CTI Education Group

Glossary BIOS Basic input-output system

CMOS Complementary metal-oxide semiconductor

CPU Central processing unit

DNS Domain name system

ECC Error checking and correction

ESD Electrostatic discharge

FAT File allocation table

FTP File Transfer Protocol

GUI Graphics user interface

HBA Host bus adapter

HDD Hard disk drive

HTTP Hypertext Transfer Protocol

IDE Integrated drive electronics

I/O Input/output

NAS Network attached storage

NTFS New technology file system

OS Operating system

PATA Parallel advanced technology attachment

POST Power-on self-test

PSU Power supply unit

RAID Redundant array of independent disks

RAM Random access memory

ROM Read-only memory

SATA Serial advanced technology attachment

SCSI Small computer system interface

SP Service pack

USB Universal serial bus

Page 162: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

Bibliography Page 157

© CTI Education Group

Bibliography Elango, S.; Jothi, A.; Malaiarasu, P.; Ramachandran, V. & Rhymend-Uthariaraj,

V. 2005. Computer science: volume 1: concepts. [Online] Available at: http://www.textbooksonline.tn.nic.in/books/11/std11-compsci-em-1.pdf

[Accessed: 08 October 2014].

Doctor, Q.; Dulaney, E.A. & Skandier, T. 2012. CompTIA A+ complete study guide. 2nd edition. Indianapolis: Wiley.

GTS Learning. 2013. CompTIA A+ certification: 801 support skills: study

notes. [Online] Available at: https://s3.amazonaws.com/gtslearning-

samples/comptia-aplus-220-801-courseware-sample.pdf [Accessed: 08 October 2014].

Page 163: Computer Systems - WordPress.com · 1.1 Explain the role of computer systems in different environments 1.2 Explain the hardware, software and peripheral components of computer systems

© CTI Education Group

Contact details

Bedfordview Campus

9 Concorde Road East, Bedfordview P.O. Box 1389, Bedfordview, 2008 Tel: +27 (0)10 595 2999, Fax: +27 (0)86 686 4950 Email: [email protected]

Bloemfontein Campus

Tourist Centre, 60 Park Avenue, Willows, Bloemfontein P.O. Box 1015, Bloemfontein, 9300 Tel: +27 (0)51 430 2701, Fax: +27 (0)51 430 2708 Email: [email protected]

Cape Town Campus

The Brookside Building, 11 Imam Haron Str (old Lansdowne Road), Claremont P.O. Box 2325, Clareinch, 7740 Tel: +27 (0)21 674 6567, Fax: +27 (0)21 674 6599 Email: [email protected]

Durban Campus

1 Lunar Row, Umhlanga Ridge, Durban

P.O. Box 20251, Durban North, 4016 Tel: +27 (0)31 564 0570/5, Fax: +27 (0)31 564 8978 Email: [email protected]

Durbanville Campus

Kaapzicht, 9 Rogers Street, Tyger Valley P.O. Box 284, Private Bag X7

Tyger Valley, 7536 Tel: +27 (0)21 914 8000, Fax: +27 (0)21 914 8004 Email: [email protected]

East London Campus

12 Stewart Drive, Berea, East London PostNet Suite 373

Private Bag X9063, East London, 5200 Tel: +27 (0)43 721 2564, Fax: +27 (0)43 721 2597 Email: [email protected]

Nelspruit Campus 50 Murray Street, Nelspruit P.O. Box 9497, Sonpark, Nelspruit, 1206 Tel: +27 (0)13 755 3918, Fax: +27 (0)13 755 3918 Email: [email protected]

Port Elizabeth Campus

Building 4, Ascot Office Park Cnr Ascot & Conyngham Roads, Greenacres P.O. Box 40049, Walmer, 6065 Tel: +27 (0)41 374 7978, Fax: +27 (0)41 374 3190 Email: [email protected]

Potchefstroom Campus

12 Esselen Street, Cnr Esselen Street & Steve Biko Avenue, Die Bult, Potchefstroom P.O. Box 19900, Noordbrug, 2522 Tel: +27 (0)18 297 7760, Fax: +27 (0)18 297 7783 Email: [email protected]

Pretoria Campus

22 Umgazi Street, Menlo Park, Pretoria PostNet Suite A147, Private Bag X18, Lynnwood Ridge, 0040 Tel: +27 (0)12 348 3060, Fax: +27 (0)12 348 3063 Email: [email protected]

Randburg Campus

6 Hunter Avenue, Cnr Bram Fischer Drive Ferndale, Randburg P.O. Box 920, Randburg, 2125 Tel: +27 (0)11 789 3178, Fax: +27 (0)11 789 4606 Email: [email protected]

Vanderbijlpark Campus

Building 2, Cnr Rutherford & Frikkie Meyer Boulevards Vanderbijlpark P.O. Box 6371, Vanderbijlpark, 1900 Tel: +27 (0)16 931 1180, Fax: +27 (0)16 933 1055 Email: [email protected]

Group Head Office

Management Services Building 44 Alsatian Road, Glen Austin Extension 3, Midrand P.O. Box 1398, Randburg, 2125 Tel: +27 (0)11 467 8422, Fax: +27 (0)86 583 6660 Website: www.cti.ac.za

CTI is part of Pearson, the world’s leading learning company. Pearson is the corporate owner, not a registered

provider nor conferrer of qualifications in South Africa. CTI Education Group (Pty) Ltd. is registered with the Department of Higher Education and Training as a private higher education institution under the

Higher Education Act, 101, of 1997. Registration Certificate number: 2004/HE07/004. www.cti.ac.za.