Study Unit Introduction to Hardware and Software Reviewed By William J. Scannella
Dec 05, 2015
Study Unit
Introduction toHardware andSoftwareReviewed By
William J. Scannella
All terms mentioned in this text that are known to be trademarks or service markshave been appropriately capitalized. Use of a term in this text should not beregarded as affecting the validity of any trademark or service mark.
About the Reviewer
William Scannella has more than 25 years experience in the PC
and information technology industry. He has worked as a help-
desk analyst, desktop support technician, software tester, and
systems analyst. He has developed print and online documentation
and training for in-house-developed and off-the-shelf systems.
Mr. Scannella has a masters degree in technical writing from
Miami University of Ohio.
Copyright © 2011 by Penn Foster, Inc.
All rights reserved. No part of the material protected by this copyright may bereproduced or utilized in any form or by any means, electronic or mechanical,including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the copyright owner.
Requests for permission to make copies of any part of the work should be mailed to Copyright Permissions, Penn Foster, 925 Oak Street, Scranton,Pennsylvania 18515.
Printed in the United States of America
iii
Pr
ev
ie
wP
re
vi
ew
This study unit is an introduction to
personal computer (PC) hardware
(the physical parts of a computer),
software (the programs used to run
a computer), and how hardware and
software work together in a PC.
Remember that this study unit is an
introduction and is laying the
groundwork for the rest of the program. As a capable PC
technician, you’ll need to fully understand the basics of
hardware and software.
You’ll learn about input and output devices, the system
board, storage devices, interface or expansion cards, and
the power supply and electrical system.
We’ll discuss three important types of software and describe
what they do. We’ll talk about the boot, or start-up process.
You’ll also study a section on how software manages hard-
ware resources. Finally, you’ll be introduced to the
protection of data.
When you complete this study unit, you’ll be ableto
• Discuss the general purpose and function of computerhardware
• List the input and output devices that are commonlyused with a PC
• Describe the major components contained in a PC andstate the purpose of each
• Discuss the purpose of networks
• Discuss the three types of computer software needed fora computer to operate
• Discuss the three most common types of application software
• Explain how to use application software
• Describe network software and its use
• Explain the boot or startup process
• Describe the steps involved in the boot process
• Discuss the relationship between hardware and software
v
HARDWARE 1Hardware inside the Computer 3Input Devices 11Output Devices 18Networks 28The Internet 33
SOFTWARE 36Firmware (BIOS) 36Operating Systems 39Application Software 41Networking Software 55
HOW HARDWARE AND SOFTWARE WORK TOGETHER 57
The Boot Process 57Protecting Data, Software, and Hardware 61Practical Exercise 62
SELF-CHECK ANSWERS 67
Co
nt
en
ts
Co
nt
en
ts
1
HARDWAREIn this study unit, you’ll learn the definition of hardware.
You’ll need to understand hardware and how it functions
within a personal computer (PC). We’ll give you a thorough
tour of PC-attached input and output devices and a descrip-
tion of what they do. We’ll talk about the ports (connections)
on the PC to which these input and output devices attach.
We’ll conclude with the identification and discussion of the
typical hardware components contained within the PC and
with a thorough description of the system board.
Hardware has four main functions: input, processing, out-
put, and storage. The CPU processes the data that’s input
into the system and directs it to be output or stored.
Input and output devices need three things to operate:
• A communications method to send data to a device, or
receive data from, the central processing unit (CPU)
• Software to instruct and control the device
• Electricity to power the device
We can separate hardware into three categories: hardware
inside the computer, input devices, and output devices.
Let’s take a closer look at each of them.
Introduction to Hardwareand Software
Remember to regularly
check “My Courses”
on your student
homepage. Your
instructor may post
additional resources
that you can access
to enhance your
learning experience.
Introduction to Hardware and Software2
CAUTION
Failure to wear a wrist strap during repair may cause electrostatic
discharge and damage the equipment.
WARNING
Failure to remove power from the
system may cause personal injury,
shock, or even death. When removing
and installing any device in a PC, always
remove the power cord from the back of
the power supply.
Introduction to Hardware and Software 3
Hardware inside the ComputerAs a knowledgeable PC technician, you need to know the
definition of hardware (Figure 1). Hardware refers to the
physical parts of a PC. The hard drive, RAM chips, keyboard,
and monitor are considered hardware.
The hard drive, similar to a small metallic phonograph
record, is the main mass storage device that contains your
operating system and application programs. A RAM chip is a
temporary memory section where your computer works on
programs and data, swapping pieces back and forth from
the hard drive. (For the most part, RAM loses its contents
when you turn your computer off.) The keyboard is a device,
similar to a typewriter, that’s used to input information to
a computer. The monitor is an output device, similar to a
television screen, in which text and graphics are displayed.
The System Board
The system board is the largest, most complex, and impor-
tant circuit board in the computer (Figure 2). It contains the
CPU, or central processing unit. The speed, power, and type
of CPU are among the main factors determining how well
your computer performs. The CPU contains the “brain” that
handles all mathematical calculations and logical operations,
and a control unit that seeks instructions from memory,
FIGURE 1—Like the key-board, monitor, and otherphysical components, theinside of a PC is consid-ered hardware.
Introduction to Hardware and Software4
translates those instructions into commands, and executes
them. Some common CPU name brands are Intel, Pentium, and
AMD.
All of the computer’s devices are either mounted on the
system board, connected to it through a port, or connected
to it indirectly through an expansion card. Ports can be
mounted internally, where they connect to devices inside
the computer or externally, where they connect to devices
outside the computer. The system board is sometimes
referred to as the motherboard.
The following components are found on all system boards:
• Central processing unit (CPU), which is the processor
• Chip set that supports the CPU
• Random access memory (RAM), which holds data as it’s
processed
• Cache memory to speed up memory access (optional)
FIGURE 2—SystemBoard
Introduction to Hardware and Software 5
• Bus used for communication on the system board
• Expansion slots to connect expansion cards to the
system board
• Flash BIOS (basic input/output system) memory chip to
permanently store programs that control basic hardware
functions
• CMOS (complementary metal-oxide semiconductor)
configuration chip, where the BIOS is located
The number system we use to count and calculate is known as
the decimal system. This system uses the integers 0 to 9 and is
called a base 10 system, because it consists of a total of 10
integers. After early attempts failed at creating a computer-like
device that could directly store digits and letters, a system was
developed in the 1940s using only two digits, 0 and 1. Machine
language, or the language the CPU uses to communicate with
the rest of the computer, operates using this system of two
digits (also called a binary or base 2 number system). All
commands, data, and instructions in the CPU are similar
to thousands of microswitches that exist in either the “on”
or “off” position. These binary digits, or bits, are deciphered
into executable commands. All communications within a
computer are in binary.
Storage Devices
Inside the processor are two types of storage devices: primary
and secondary. Primary storage temporarily holds data and
instructions while it’s being processed. Secondary storage
stores data permanently in such devices as the computer’s
hard drive, CDs, DVDs, or USB drives. You can access infor-
mation quicker from primary storage than from secondary
storage.
Primary Storage. The devices that provide primary storage
are RAM (random access memory) chips (Figure 3) and some
adapter cards. The RAM chips are embedded on a board (also
called a memory module) that plugs into the computer’s moth-
erboard. A common type of memory module is the DIMM (dual
inline memory module) and as there are variations of DIMMs,
you would match the memory module to whatever the mother-
board supports. Video memory cards contain their own memory
chips embedded on the card.
As you know, RAM chips don’t hold memory permanently;
RAM needs continuous electrical power to hold data. That’s
why primary storage is also called temporary or volatile storage.
Secondary Storage. Secondary storage differs from primary
storage in that secondary storage is permanent. When you turn
off your computer, the data in secondary storage remains there.
It’s important to know that data and instructions can’t be
processed from secondary storage. The data must first be
copied into RAM for processing.
Hard drives, optical drives, and removable storage like flash
drives or memory cards are types of secondary storage. The
hard drive, or hard disk drive (HDD), is the computer’s main
secondary storage device (Figure 4). Inside the hard drive case
are platters or disks that rotate at a high speed. An arm with a
sensitive read/write head writes new data to the platters and
reads data from them. Integrated Drive Electronics (IDE) is
the internal technology used in the magnetic hard drives.
Introduction to Hardware and Software6
FIGURE 3—DIMMs are miniature circuit boards that add RAM to the systemboard.
Introduction to Hardware and Software 7
A new technology to hold data is a non-volatile flash memory
chip, which isn’t a moving mechanical disk. It’s similar to the
chip used in a USB flash drive. Since it has no moving parts,
it’s referred to as a solid state drive (SSD). SSD drives are
much faster and durable than hard drives; they last longer
but are more expensive.
Most computers today include an optical drive, CD, DVD, or
Blu-ray. The drives that can read a disc and write to a disc
are read/write and include the letters RW in its name, for
example CD-RW.
Two removable storage devices popular today are the USB
flash drive (thumb drive) and memory cards (Figure 5) used
in digital cameras. They both use non-volatile flash memory
chips. You insert flash drive into the USB port on a computer.
Some flash drives can hold up to 64 MB of data. You would
connect the memory card into the SD card slot on a laptop.
Some older computers include the floppy drive, which holds
3.5 inch disks and can hold up to 1.44 MD of data.
FIGURE 4—Hard Drive
Introduction to Hardware and Software8
Expansion Cards
Expansion cards are circuit boards mounted in expansion
slots on the system board (Figure 6). They enhance the capa-
bility of the computer, and enable the CPU to connect to an
external device. Common types of expansion cards are
• Video cards
• Sound cards
• Network cards
• Internal modem cards
• I/O controller cards
FIGURE 5—USB flashdrives and memorycards
Introduction to Hardware and Software 9
The BusThe bus is a group of circuits etched into the top and bottom
of the system board. The circuits are in the form of fine lines
or traces that carry data, instructions, and power from com-
ponent to component on the board. Data travels through the
bus in binary. The traces run in parallel lines of 8, 16, 32,
64, or 128 bits. A bus that has 8 traces is called an 8-bit
bus, or a bus where 8 binary digits of ones and zeroes can
travel simultaneously.
The four system resources—memory addresses, I/O addresses,
interrupt request numbers (IRQ), and direct memory access
(DMA) channels—use dedicated lines on the system board.
We know that all hardware devices are directly or indirectly
connected to the system board because they need the CPU
to process their data. One of the methods of connecting
the devices to the system boards is to use a bus. There are
potentially several buses on the system board. One type,
however, the PCI, or peripheral component interconnect, is
now the most common virtually replacing the older ISA bus.
The PCI architecture was introduced in the early 1990s by
Intel and released into the public domain. This meant that
manufacturers of peripherals could use the PCI technology
at no cost. That fact and the technical improvements of PCI:
increased speed, flexibility, and the ability to handle 32-bit
instructions made the PCI bus the premier expansion bus.
In addition, the PCI bus is self-configuring, that is, once a
FIGURE 6—Expansion Card
Introduction to Hardware and Software10
new peripheral is plugged in, the PCI bus will automatically
make the settings necessary for the peripheral to operate
properly. This innovation led to the plug and play (PNP)
approach now common in modern versions of the Windows
operating system. Systems with PNP automatically recognize
and configure peripheral devices when they are connected to
a computer.
A system board can have more than one bus. One of the
buses on the system board is called the system clock.
Supplying electricity to a special type of quartz crystal
mounted on the system board causes this clock to oscillate,
or vibrate. This oscillation is a cyclical wave of binary 1s
and 0s. These occur at a constant rate or frequency (Figure 7).
The completion of one cycle is indicated by the clock ticking
once. Every time the clock ticks, data is sent. An 8-bit bus
allows a single bit (1 or 0) to flow down each of the 8 wires of
the bus. Hertz is a measure of frequency. One cycle/second
is said to have a frequency of 1 hertz. If your CPU is running
at 800 MHz (megahertz = 1,000,000 hertz), your clock is
ticking at 800,000,000 times/second. The faster the clock
speed and the wider the bus (or bus speed), the faster your
computer will run.
There are other bus architectures, such as Extended Industry
Standard Architecture (EISA), Video Electronics Standards
Association VL bus (VESA), PCI local bus, Universal Serial
Bus (USB), Serial ATA, Apple’s Firewire, and Micro Channel.
In addition, derived system clocks handle timing for other
devices, such as Accelerated Graphics Port (AGP) video and
cache.
1
0
ONE CYCLE
FIGURE 7—Graphic Depiction of the System Clock’s Oscillating Cycle
Introduction to Hardware and Software 11
The Power Supply
The power supply of a computer takes 120-volt alternating
current (ordinary household electricity) and converts it to
direct current that the computer can use (Figure 8). The
computer operates only with low voltages of direct current.
Modern power supplies provide 3.3, 5, and 12 volts DC
power. The power supply provides power to the system board,
disk and optical drives, interface cards, and cooling fans.
Input DevicesA keyboard and mouse are the most common forms of input
devices. Input devices transfer or send data to the computer.
We’ll also discuss some other types of input devices. Let’s
start with the keyboard.
The Keyboard
The 104 advanced keyboard, or Windows keyboard, is the
most common keyboard layout available (Figure 9). There are
other keyboards, which can be purchased separately from a
packaged computer system, that contain fewer keys, and
thus are made smaller to provide space-saving conveniences.
Still other modern keyboards contain special function keys
dedicated for Internet browsing or programmable “hot” keys
to be used with multiple software applications. Some of the
newer keyboards are ergonomically designed with special
FIGURE 8—Power Supply
contours intended to better fit the natural contour of the
hands or with built-in wrist rests to aid in reducing the
chance of pain or injury produced by repetitive tasks.
Ergonomics (from the Greek word ergon, meaning work) is
the science of matching machines to the shape of the human
body to achieve greater comfort and efficiency, thereby reducing
the chances of pain or injury.
The difference between keyboards is often in their “feel.”
Some keyboards feature sensitive keys with a rapid clicking
action. Activating a sensitive key requires very little pressure.
Any hesitation on the user’s part in releasing a depressed key
results in multiple characters displayed on the screen. People
who are fast and accurate typists often prefer this type of
action on their keyboards.
Other keyboards feature keys with slightly tighter spring
action. Since it takes more pressure to depress this type of
key, there’s less chance of producing multiple characters. The
type of keyboard that’s best for a particular person is purely
a matter of taste. If you ever decide to purchase a keyboard
separately from a full computer system, try out different
boards and select the one that feels best to you and is the
easiest for you to use.
Introduction to Hardware and Software12
FIGURE 9—Typical Windows Keyboard
Introduction to Hardware and Software 13
The Mouse
Another input device is the mouse. The name “mouse” is
used because the device was originally connected to the
computer by a thin wire, or cable, which resembles a
mouse’s tail. Although wired mice are still the most common
type in use, wireless mice are gaining in popularity.
A mouse is a hand-operated device that controls the position
of the cursor on a display screen. (A cursor is a highlighted
spot on a computer screen, which shows where the next
character will be inserted or deleted.) When a mouse is used,
the cursor is called a mouse pointer, which when moved with
the mouse, allows the user to make selections and to draw
pictures. Most mice have a hard rubber ball on their under-
sides. When the user rolls the mouse around, the cursor, or
pointer, moves as well. Like many other peripheral devices, a
mouse requires companion software to operate properly.
A mouse has either two or three buttons for performing
program functions. A three-button mouse offers more options,
but most software programs require the use of only two
buttons, even on a three-button mouse.
An alternative to the three button mouse style is the newer
wheel mouse, which contains a thin rubber wheel between
the left- and right-click buttons (Figure 10). The wheel spins
in notched increments and allows easy page scrolling with a
quick flick of the wheel. In some devices, the wheel is also
clickable, allowing either an autoscroll function or other
application specific specialized function that can be cus-
tomized by the end user. These types include Microsoft’s
IntelliMouse and Logitech’s Mouseman.
With the latest advances in mouse technology, it appears
that the roller ball mouse may even be in danger of extinction.
The now-preferred device for pointing and clicking is the
optical mouse (Figure 11). This type of mouse connects
to the mouse port on the back of the computer.
Introduction to Hardware and Software14
Optical mice have several benefits over wheeled mice, namely,
• No moving parts, which means less wear and a lower
chance of failure
• No way for dirt to get inside the mouse and interfere
with the tracking sensors
• Smoother response because of increased tracking
resolution
• No requirement of a special surface, such as a mouse pad
FIGURE 10—Wheel Mouse
FIGURE 11—Optical Mouse
Introduction to Hardware and Software 15
A wireless, or cordless, mouse (Figure 12) is usually used
with notebooks and laptops. The wireless mouse transmits
data via infrared radiation (IrDA) or radio (including Bluetooth).
You connect the receiver to the computer through a serial or
USB port. The newer nano receivers were designed to be
small enough to remain connected in a laptop or notebook
computer during transport.
Computer mice are classified by their connection type. The
serial mouse uses one of the serial ports in the back of the
computer; the USB mouse connects through one of the USB
ports; the PS/2 style mouse employs the PS/2 connector still
found on some PCs. The “wireless” mouse actually communi-
cates with a small receiver plugged into one of the USB ports.
Mouse design has become increasingly important as more
and more software programs take advantage of this device’s
speed and accuracy of movement. Some people find that
prolonged use of their mice causes soreness and fatigue in
the hand that rests on the mouse. Mouse manufacturers
have worked hard to come up with ergonomic designs that
reduce or eliminate such discomfort.
FIGURE 12—Wireless, orCordless, Mouse
Introduction to Hardware and Software16
Other Input Devices
A trackball is a variation of the mouse. The technology and
on-screen effect of rapid cursor movement is the same for
both the trackball and the mouse. However, instead of rolling
the entire device the way you do a mouse, you simply roll the
exposed upper half of the ball with your fingers. Some track-
balls are built into the right side of the keyboard. Others are
separate units that connect to the back of the computer and
attach to the keyboard for stability. Fans of the trackball
prefer this device because it requires less arm movement.
Many notebook style computers have a built in trackball.
Some artists who use computers to produce graphics have
their own special set of input tools. These devices include
graphics pads and electronic pens (or styluses). There’s even
a product that combines the features of a mouse, a stylus,
and a pad into one device. The aim of all these input devices
is to unleash the creativity of publishers and artists and to
allow them to draw freehand. The images traced on a pad or
other surface appear directly on the monitor’s screen. When
the artwork is completed, the image can be saved as a file
and stored for future use. The general aim of these devices is
to make computer data entry as much like writing and draw-
ing as possible. Let’s look at each of these devices.
A light pen is an input device that looks like a ballpoint pen.
It has an electrically sensitive point on its tip instead of an
inked point. However, the real model for light pens isn’t the
writing instrument, but rather the human finger. When a
light pen is attached to a computer, the user can point to a
specific location directly on the screen itself, thus command-
ing the software to perform certain functions. Like the
mouse, the light pen is better at selecting choices and draw-
ing than at inputting text. A disadvantage of light pens is
that extended use can become tiresome, since users must
hold their arms in an upright position to touch the screen.
A mouse pen is another pointing device which works like a
mouse but handles like a pen. The mouse pen is really just a
mouse, reduced to a tiny size and mounted on the end of a
pen-shaped handle. Many people find this innovative shape
to be more convenient to use than a traditional mouse, which
demands more desk space. The mouse pen requires only a
Introduction to Hardware and Software 17
tiny amount of surface. The corner of a desk or the top of
a book is sufficient to activate the mouse pen’s pointing
functions.
Another input device is the digitizing tablet. With a digitizing
tablet, the user controls cursor movement by sliding a puck
or a stylus along the tablet’s electronically sensitive surface.
A scanner is an input device that converts photographs,
artwork on paper, or text on paper into electronic data that
can be stored in computer files. These files can later be used
in page layout programs. A scanner works like a camera,
capturing information electronically (Figure 13).
Like many other input devices, scanners consist of a combi-
nation of compatible hardware and software. The scanner itself
is a machine (the hardware) that actually scans a document
FIGURE 13—FlatbedScanner
Introduction to Hardware and Software18
and produces a digital image of the document, sending this
image down a wire to your computer. But the output from a
scanner is too rough for your ordinary software to actually use.
The scanner hardware generally needs some accompanying
software to make the scanned image usable. For this reason,
almost all scanner manufacturers include image-processing
software with their scanners. When software is included with
hardware, it’s said to be bundled. A few scanners are sold
without bundled software, but this practice is unproductive
because without some kind of image-processing software, the
scans aren’t usable. Therefore, if you’re considering buying a
scanner, remember that the quality of the hardware and the
quality of the bundled software are equally important.
In addition to traditional keyboard and mouse input devices,
current desktop publishing has brought about the creation of
other computer input devices to aid in the creation of multi-
media. These include digital cameras for both still images
and video images, and digital sound input. Like scanners,
digital cameras allow the user to input photographs and
videos into data files for use in various software applications.
Likewise, sound files can be input using digital microphones
that connect directly to a PC and acquire sound files with the
aid of specific software applications.
The joystick is another popular input device, especially for
use with computer games. There are many different varieties,
with cursor movement being accomplished by tilting the vertical
“stick,” or handle, in any direction in a 360° circle. Special
function buttons are located either on the base of the joystick
or on the handle itself and can be programmed to perform
certain application specific tasks.
Output DevicesOutput devices receive data or information from the com-
puter. Monitors and printers are the most common output
devices. Before going into detail on the different types of
monitors and printers, let’s begin with some of the basics.
Introduction to Hardware and Software 19
Monitors
Let’s clear up some questions you may have about the termi-
nology used when referring to monitors. You’ve probably
noticed that the computer monitor goes by many names.
The most common names used for a monitor are
• Video display
• Video display terminal (VDT)
• Video monitor
• Monitor
• Cathode-ray tube (CRT)
• Terminal (even though it’s not)
• Display screen
• Screen
As a technician, you’ll hear many different names for this
piece of equipment, so it’s a good idea to know the most
common ones being used.
One type of monitor is the CRT PC monitor. Some popular
sizes of these monitors are 15, 17, or 19 inches (as meas-
ured diagonally across the screen face). This distance is
referred to as the screen size. However, there are larger and
smaller sizes available. CRT monitors are quite heavy and,
along with the PC, take up a good amount of space on your
desktop (Figure 14).
The CRT monitor is considered outmoded although many are
still in use and performing adequately for most tasks. They use
the same technology as last-generation analog televisions, and
like older TV sets, they’re being replaced by flat panel LCD
or LED digital screens. CRTs operate at extremely high and
potentially dangerous voltages. It’s possible that you might
encounter one of these older monitors. If it isn’t working, don’t
try to repair it. Only an experienced technician who has the
requisite training and safety measures in place should service
a CRT.
Introduction to Hardware and Software20
The CRT was the most prevalent type of monitor for several
years. New design and improvements, though, are constantly
being introduced. In addition to new devices and device
features, products continue to get smaller and lighter. For
instance, instead of the heavy CRT monitor that’s often
longer (deeper) than it’s wide, you can opt for an LCD, or
liquid crystal display, monitor that’s light and just a couple
of inches thick (Figure 15).
FIGURE 14—Typical CRTMonitor
FIGURE 15—LCD Monitor
Introduction to Hardware and Software 21
LCD monitors utilize more recent technology than CRT
monitors and use less power with their flat screens. This is
because LCDs block light rather than emit it. LCD pixels are
molecules of liquid crystal sandwiched between glass layers.
The crystal molecules, acting like microscopic doors, block
light emitted from the rear layer. In active-matrix displays, a
capacitor is located at each pixel. When electricity is applied
to the capacitor, it polarizes, or changes, the liquid crystal
molecule; this opens the “door” and makes light visible on
the front screen. LCD monitors typically provide a clearer,
sharper image than CRT monitors.
It’s easy to see that it’s impossible to choose a monitor on
technical specifications alone. When selecting a monitor, it’s
a good idea to see how the applications you’ll be using are
handled. A monitor that’s good for displaying text, for exam-
ple, might not be quite so good at displaying images for
on-screen editing. Remember, how well the monitor does the
job you want it to do is the critical element.
Printers
Printers are also considered an output device. We’re now
going to discuss some different types of printers.
Printers can defy your every effort to make them work
correctly, and then suddenly and inexplicably, they’ll start
working again. This is where technicians step into the picture.
Troubleshooting printers takes a great deal of patience, so be
prepared.
Printers can be broadly grouped into two categories: impact
printers and nonimpact printers. An impact printer works
much like its name suggests; the printer’s mechanism strikes
or impacts on a ribbon to produce a character on the page.
Nonimpact printers use jets of ink, laser beams, or other
technology to create images.
The two types of impact printers generally used with PCs are
dot matrix and fixed-character. Minicomputers and mainframe
computers also use dot matrix and fixed-character printers,
with an important difference; they also feature line printing
and page printing. By this, we mean that an entire line (line
printing) or page (page printing) of text is transferred onto
the paper by the printer at one time.
Impact printers are considered self-destructive because every
time they create a character, the impact does a little damage
to the printer. After time, all of the little impacts add up to a
lot of damage.
When personal computers were first introduced, the most
common output device purchased (after the monitor, of
course) was a dot matrix printer. This type of printer is still
used today, although not nearly as often as laser and ink-jet
printers.
Although the mechanics of a dot matrix printer are relatively
simple, they require the exact coordination of many parts
(Figure 16). First, the correct pins must push against the
ribbon. When the print head reaches the right-hand side of
the page, it must return to the left-hand side of the printer so
that it can begin the next line. The ribbon must advance so
that a new section inserts between the print head and the
paper. At the same time, the paper must advance so the next
line of type can print.
Bidirectional printers print in both directions. This function
must coordinate exactly for the printer to work properly.
An average-quality dot matrix printer is called a near-letter-
quality printer because its output isn’t very sharp. However,
some high-end dot matrix printers can create letter-quality
output like that produced by fixed-character printers.
Introduction to Hardware and Software22
PAPER
RIBBON
PRINTING
HEAD
PRINTING
PIN
FIGURE 16—Close-upof Dot Matrix Printeron the Page
Introduction to Hardware and Software 23
Fixed-character printers are based on typewriter technology,
and they look and behave very much like electric or manual
typewriters. The print head, which is usually shaped like a
ball or wheel, consists of a set of reshaped characters. When
a character is chosen, it’s rotated into position and forced
into the ribbon by a hammer. The ribbon then transfers the
image to paper. The advantage of a fixed-character printer is
that the quality of the output is about the same as a type-
writer. Fixed-character printers are also called letter-quality
printers.
Very few fixed-character printers are currently on the market.
That’s because ink-jet and laser printers offer output of simi-
lar or better quality, and with comparable prices and more
flexibility. If you come across a fixed-character printer, con-
sult the user’s manual for troubleshooting information.
Nonimpact technologies include thermal, ink-jet, laser, LED,
color laser, and plotter-type printers. Nonimpact printers
create images without an intermediate component such as a
ribbon. As a rule, nonimpact printers are more durable than
impact printers because they’re not so self-destructive.
One nonimpact printer that relies on established technology
is the thermal printer, which features special heat-sensitive
paper and a thermal print head. The print head raises the
temperature of the paper until it discolors. This technology is
also used for some inexpensive fax machines. Some thermal
printers use heat to transfer a waxy ink from a ribbon to
plain paper.
A thermal printer’s print head consists of pins or wires that
are heated to form characters that resemble dot matrix out-
put. Thermal printers are rarely used today because their
output quality has never been very good, they’re inflexible,
and they require paper that’s expensive and unattractive. The
only advantages of thermal printers are their low cost and
almost noiseless operation. You’re not likely to find any one-
color thermal printers still in operation. If you do come
across one of these printers, consult the user’s manual for
troubleshooting information.
Introduction to Hardware and Software
A more modern thermal printer that can produce four-color
output, however, is enjoying significant popularity. As you
already know, the combination of basic colors at high speeds
can produce most other colors, so a four-color thermal
printer has tremendous output capabilities. Color thermal
printers use plain paper and a much more sophisticated
technology than older thermal printers. Their popularity is
increasing because many people want color output. The rela-
tive inexpensiveness of thermal printers compared with other
types of color printers makes them attractive.
Another type of nonimpact printer is the ink-jet printer
(Figure 17). In many respects, ink-jet printing is similar to
dot matrix printing: characters are formed by ink sprayed
through a matrix of holes. Each hole is about the width of a
human hair. A print head is moved across the page with a
motor, spraying ink across multiple lines at a time in a series
of dots or pixels. The software printer driver controls the amount
of ink and the dot pattern. After the lines are sprayed, a roller
motor steps the paper roll vertically to the next print area.
Ink-jet printing has a significant advantage over dot matrix
24
FIGURE 17—Ink-JetPrinter
Introduction to Hardware and Software 25
printing, however. The dots expand slightly when the ink is
absorbed by the paper, so the image is smoother than that of
a dot matrix printer. The improvement that results from this
ink bleeding is called gain because you “gain” quality.
The resolution on an ink-jet printer is determined by count-
ing the number of ink dots in each square inch of paper. The
resolution is then rated in dots per inch (dpi). The higher the
DPI, the better the quality.
An ink-jet printer can also be used to print in color. If you
use color printing a lot, you’ll save money by using a four-
cartridge or six-cartridge printer instead of a two-cartridge
printer. This is because you can replace individual color car-
tridges when they run out, instead of having to replace the
entire cartridge as you would in a two-cartridge printer.
Ink-jet printers are inexpensive, yet their quality and per-
formance are quite good. In addition, ink-jet printers are
fairly flexible. Some are capable of producing color output,
while others are small enough to be paired with portable
computers. Other advantages of ink-jet printers are their
quiet operation, few moving parts, and easily replaceable ink
cartridges.
Many computer users find that ink-jet printers are adequate
substitutes for laser printers. Ink-jets offer the quality and
flexibility of laser printers, as they can print attractive text
and graphics. Moreover, the output quality is much better
than that of dot matrix printers, and the cost is about half
the price of laser printers. Given these advantages, it’s no
wonder that ink-jet printers are selling at such a high rate.
Another type of nonimpact printer is the laser printer
(Figure 18). Without question, laser printers are the top of
the line for output. They’re fast, quiet, versatile, and most
of all, they produce documents of a remarkable quality.
Their output capabilities are very close to that produced
by professional typesetting equipment!
The laser printing process consists of six separate steps.
First, the drum is cleaned of any residual electrical charge
and scraped of any residual toner. Next, the drum is
conditioned to hold a high uniform electrical charge of
–600 V. The third step is called writing. A scanning mirror
directs the laser onto the area of the drum that you wish to
print. Wherever the laser touches the drum, electricity is
discharged (down to –100 V). This is done one line at a time
across the entire drum.
The next step, developing, applies toner to the drum by way
of a developing cylinder, which rotates close to the drum.
The toner on the cylinder is charged anywhere from –200 to
–500 V. Toner from the cylinder is attracted to the lower-
voltage areas of the drum (–100 V) that are created by the
writing laser. In the next step, transferring, a positive charge
is applied to the paper and the toner leaves the drum, adher-
ing, by static charge, to the paper. The toner then remains on
the surface of the paper until fusing occurs. In this last step,
heat and pressure are applied to affix the toner to the paper.
Laser resolution refers to the number of dots per inch (dpi), or
how many dots are printed as the drum rotates. A laser with
a 1200 dpi writes 1200 dots along the drum for every inch of
drum circumference (that is, as the drum rotates one inch).
Introduction to Hardware and Software26
FIGURE 18—Laser Printer
Introduction to Hardware and Software 27
Laser printers are also classified according to their speed in
pages per minute (ppm). Inexpensive laser printers run at
about 12 ppm, while top-end printers run at 30 ppm or
higher. Be advised that the speed rating of a laser printer
isn’t always the best measure of its capabilities. Laser print-
ers that output pure text pages at high rates of speed might
slow down considerably when printing graphics.
The color laser printer is also a type of nonimpact printer.
The vast majority of laser printers sold at the present time
are monochrome, but the prices of color laser printers are
decreasing and their output is very professional looking. For
these reasons, the use of color laser printers is sure to grow
in popularity.
Color laser printers work in the same way as monochrome
laser printers, except that colored toner is deposited on the
drum. Color lasers uses combinations of cyan, magenta,
yellow, and black toners (CMYK) to produce all the various
colors. The toner is deposited on the paper in one of two
ways. In the first method, all four colors are pulled to the
drum and transferred to the paper at once. In the second
method, one color of toner is put on the drum at a time,
and the paper is run over the drum four times.
Another type of nonimpact printer is the light-emitting diode
(LED) printer. The LED printer is a less expensive alternative
to the conventional laser printer. An LED printer works in
the same way as a laser printer except that the laser and
mirror in a laser printer are replaced by a row of LEDs. This
arrangement is less expensive than the laser and mirror. A
300 dpi printer will have 300 LEDs per inch, spread across
the page width.
The last type of nonimpact printer we’re going to discuss is
the plotter. Architects, designers, and drafting professionals
generally work on documents that are too large for regular
printers to reproduce. Therefore, these professionals use
plotters instead of printers. Plotters use rolls of paper 36
inches wide or wider. Images are drawn on the paper by
ink-filled pens or cartridges that move back and forth as
the paper passes under them. They’re filled with ink of one
or more colors as needs dictate, and they must be refilled
or replaced periodically.
Introduction to Hardware and Software28
Plotters work in almost exactly the same way as printers.
Plotters are connected to a serial or parallel port with a cable.
Images are created with graphics software and then sent to
the plotter the way they would be sent to a printer.
NetworksNetworking is a very specialized field. As a result, there are
many experts that specialize in networking only. As a PC
repair technician, you’ll be exposed to networking at some
level. What we’re going to do now is give you an introduction
into networking and some of the related hardware.
With the advent of the IBM PC in 1981, many employees were
provided with their own computers to run their own software
applications and manage their own data. They no longer had to
depend on the centrally controlled mainframe and minicomput-
ers, that were run and maintained by a separate department,
usually called management information services (MIS). One
of the disadvantages to this newfound independence was
the inability to share information and expensive peripheral
devices, such as printers, with other PC users. Individuals
began looking for ways to link their personal computers
together to share data and hardware resources. Today,
computer networking is a popular computing specialty, and
development of network hardware and software is growing
faster than any other area of computing.
Building a network is challenging. However, since you’ll prob-
ably find that many of the personal computers you’ll work on
are connected to networks, you’ll need to thoroughly under-
stand this aspect of computing. A network is a system of
linked computers and computer peripherals. The purpose of
a network is to allow users to share data and program files
and other resources such as disk drives and printers.
In general, most networks have these characteristics:
• Connections to a number of computers and peripheral
devices
• Connections made through some type of cable or broadcast
• Shared data and resources
Introduction to Hardware and Software 29
• Individual computers in the network that perform some
processing functions
• Computers managed by one or more individuals using
specialized software
• A common protocol, or set of rules, that’s used to share
data
There are many different varieties of networks. Some consist
of a few computers located in the same room that share data
files and the same printer. Others consist of thousands of
computers spread out over many cities or even countries.
These large networks share hundreds and possibly thou-
sands of printers, exchange electronic mail (e-mail), support
video conferencing, and may be protected by sophisticated
security systems.
One of the most important benefits of a network is that it
allows individual users to share printers and other peripherals.
Sharing these devices eliminates the need for mechanical
switches to allow printer sharing, allows users to redirect out-
put to a chosen device, and allows users to share expensive
devices that they might not have access to in a stand-alone
environment.
In a network, users aren’t limited to the data on their indi-
vidual PCs. Instead, they can access, or share, data on other
network computers. The ability to share data allows multiple
users to access database files at the same time, to access
common documents and forms used in the organization, to
share files, and to collaborate on documents.
In addition to peripherals and data, network users can also
share application software. Here’s how it works. One copy of
the software is installed on a PC, called a server. When a user
needs the particular software, he or she can simply access it
from the server. Sharing application software has several
advantages. For example, sharing applications helps to reduce
the amount of time needed for software maintenance and
installation, and also reduces the costs involved. Sharing
applications also establishes a standardized software setup
and prevents users from modifying software configurations.
This saves time and money spent on support and mainte-
nance. Finally, sharing applications prevents the illegal
lll
Introduction to Hardware and Software30
copying of software, because a software-metering application
tracks the number of users that open and close particular
applications.
Another advantage is that networks can provide substantial
communications benefits, such as e-mail, scheduling, and
access to remote host (mini or mainframe) computers. It can
also provide access to larger networks like the Internet.
Finally, networks provide varying levels of security to their
users. For example, all networks require users to input a
login ID and a password before they can access the information
on the network. Additionally, networks may limit the time
of day at which users can access the network and the work-
stations from which users can access the network. They
may also provide access limitations to certain files and even
certain devices (disk drives) on the network. A stand-alone
workstation provides virtually no security.
A network’s hardware components usually include a server,
workstations, network adapters, and a cable system. We’ll
discuss these hardware components next.
Server. A computer that’s attached to a network for a specific
purpose. It runs the network operating system and offers
network services to users at their individual workstations.
These services include file storage, user management, security,
network commands, application software storage, printing
services, and other communication services. Network servers
contain higher-speed processors, larger hard drives, and
more memory as compared to desktop personal computers.
A server may also be a specialized computer such as a Sun
Microsystems Netra Server or even a minicomputer such as
an IBM AS/400. Typically, a LAN server is a high-end PC or
specialized PC built to be a server, such as the Hewlett Packard
NetServer.
Workstation. A computer that’s attached to a network and
operated by individual users. Workstations don’t function as
servers. Instead, the workstations (sometimes called clients)
use the services that are offered by the server, such as file
storage and printing services. The types of computers that
are used as workstations vary, depending on user needs and
on the network’s operating system and application software.
Introduction to Hardware and Software 31
A workstation may be a PC running Microsoft Windows XP,
Vista, Windows 7, a UNIX-based machine, a Macintosh
running OS X or a machine running LINUX.
Network adapters. A network interface card (NIC) is a
specialized adapter card that fits into one of the bus slots
on a computer’s motherboard (Figure 19). An NIC is an
extension of the computer’s bus and is used along with the
cable system for communication between the computer and
network clients or between one network client and another.
The NIC contains some RAM that serves as a communica-
tions buffer, customized chips that are used to exchange
data between computers, and other network circuitry. It
also contains the connector that’s used to join the cable to
the computer.
The type of NIC you select is based on the type of cable you
decide to run. Ethernet NICs may support thick Ethernet cable,
thin Ethernet (coaxial) cable, and unshielded twisted-pair (UTP)
cable. Token-ring NICs support shielded twisted-pair (STP)
cable and UTP cable. Another type of adapter may be an exter-
nal device connecting to the PC using a USB port. The adapter
supplies a registered jack (RJ-45) port that looks like a large
phone jack. We’ll discuss cable types next.
FIGURE 19—TypicalNetwork InterfaceCard (NIC)
Introduction to Hardware and Software32
Cable system. The physical transmission medium that ties
the various components of a network together. That is, the
cable system provides the physical connections between
the workstations and the server. The cables, however, are
often the part of a network that receives the least amount
of attention, and the least amount of money during installation
and maintenance.
Three major types of cable are used in LANs: twisted-pair
cable, coaxial cable, and fiber-optic cable. Each type has
specific properties that relate to their data handling capacities,
their immunities to electrical interference, the distances
over which the data can travel, and installation costs.
Twisted-pair cable or Category 5 (Cat 5). This is the
cable that’s used most often in LANs (Figure 20). It may be
either STP cable or UTP cable. Shielded cable offers more
protection against electrical interference but is more expensive
than UTP. UTP cable is one of the most popular types of cable,
partly because it’s commonly used in telephone installations
and many buildings have an excess of it already installed.
In some office environments, telephone wiring is run to cen-
tralized communications closets where telephone equipment
is installed. These closets are ideal places to locate hubs or
concentrators for a network. A hub, switch, or concentrator
is a central location where cables that are connected to
workstations can be attached.
FIGURE 20—Cat 5 Cables
Introduction to Hardware and Software 33
UTP cable consists of at least two conductor wires that
are twisted together and housed in a plastic sheathing.
The number of twists per foot is standard in the United
States and is used to offset electrical power interference.
STP cable is essentially the same as UTP cable, except that
the wire twists may be wrapped in an aluminum backed
plastic sheathing or a braided metal shield. The shields are
grounded to drain off electrical interference. UTP cable should
be used in situations where electromagnetic interference is
low, because electromagnetic interference can disrupt the
data signals.
The InternetNow we’re going to discuss another topic, the Internet.
Breaking down the word Internet reveals exactly what
the Internet is. The prefix inter means “between,” and the
suffix net is short for “networks.” Therefore, the Internet
is a virtual world that exists between computer networks.
What we’re going to do now is give you an introduction to
the Internet and its related hardware.
The power and potential of the Internet are truly amazing,
and perhaps more than a little bit scary. You may find your-
self wondering, “Who’s in charge of all of this?” The answer
is surprising: “No one.” While the individual networks (the
LANs we discussed earlier) are managed by their own net-
work administrators, no one person or organization manages
the Internet. Instead, it’s a cooperative network of people
who provide information following an agreed upon set of
standards.
The Internet’s structure is often compared to an enormous
highway system. You’ve probably even heard the Internet
referred to as the “information superhighway.” This analogy
came about because the backbones of the Internet are some
very high-speed central networks. These backbones are similar
to interstate highways; they allow you to get on and off smaller
networks of “roads.” Think of the smaller networks as high-
ways and the even smaller networks as city streets. All of
these networks, highways, and streets are interconnected,
or linked, so you can move around on them at will.
Introduction to Hardware and Software34
The interconnected nature of the Internet is virtually trans-
parent to users, which means that as you travel along the
Internet, you won’t even be aware of all the connections
being made.
Because the Internet connects so many different networks,
a common language, or protocol, is necessary to allow the
networks to communicate with each other. This language
is called Transmission Control Protocol/Internet Protocol
(TCP/IP).
To access the Internet, your most basic needs are a computer
system equipped with a modem and a telephone line. More
sophisticated options are also available, such as obtaining
a connection via your cable TV or satellite dish system.
(You can contact your cable company or satellite dish
service provider for information on the options available
in your area.)
If you plan on accessing the Internet by some other medium,
such as Cable modem, DSL satellite, or fiber optic, you’ll
need more sophisticated equipment. Check with your cable
company or other provider for exact specifications before
you buy anything.
Cable modem. One popular way for a computer to connect
to the Internet is through a cable modem. The TV signal to
the television and the data signals to your PC share the same
coax cable.
DSL (Digital Subscriber Line). Another common Internet
connection is through DSL, which uses the phone line for
transmission and covers a wide range of speeds.
Satellite. Unlike cable and DSL, satellite access to the
Internet is available almost everywhere and so is popular
with people who live in remote areas and for Internet access
on airplanes. You need a satellite dish mounted on your roof
to communicate with the satellite used by the ISP that offers
the satellite service.
Fiber Optic. Fiber-optic technology uses a dedicated line
(point-to-point connection) from the ISP to your residence
or office. The cables used are fiber-optic cabling.
Introduction to Hardware and Software 35
Self-Check 1
At the end of each section of Introduction to Hardware and Software, you’ll be asked
to pause and check your understanding of what you have just read by completing a
“Self-Check” exercise. Answering these questions will help you review what you’ve
studied so far. Please complete Self-Check 1 now.
1. Describe the sort of language used for all communications within a computer.
__________________________________________________________
__________________________________________________________
2. Hardware performs what four primary functions?
__________________________________________________________
3. Electronic hardware devices need what three things to operate?
__________________________________________________________
4. Name two input devices.
__________________________________________________________
5. What common protocol allows networks to communicate with each other?
__________________________________________________________
Check your answers against those on page 67.
Introduction to Hardware and Software36
SOFTWAREAs a knowledgeable computer technician, you need to under-
stand software and how it functions within a personal
computer (PC). We’ll give you an understanding of the three
types of software and how they’re used to run a PC.
There are three different types of software required for a PC
to operate: the firmware or BIOS (basic input-output system),
the operating system (OS), and application software. In this
section, we’ll discuss all three in detail. We’ll also touch on
the software that’s needed for networking.
When a computer starts up, the firmware and operating sys-
tem work together to determine if the system is functioning
properly. After the computer starts up or boots, the operat-
ing system works with the application software and the
firmware to perform the tasks necessary to do the job. The
software has three distinct layers. The first layer contains
the BIOS and device drivers. The second layer consists of
the operating system and the third layer is the application
software.
Firmware (BIOS)The firmware program that’s resident on the system board is
called the system BIOS, or on-board BIOS. It’s located on the
system board in ROM (read-only memory) chips (Figure 21).
ROM chips have programming permanently etched into them
when they’re manufactured and can never be erased. Newer
ROM chips, called PROMs, EPROMs, and EEPROMs, allow
microcode updates. Microcode is firmware code that’s
inserted into a ROM.
Programmable read-only memory chips (PROMs) can be
updated only once using an electrical current supplied
by a machine called a PROM programmer. Electrically
programmable read-only memory chips (EPROMs) can be
updated by first shining intense ultraviolet light into a small
window on the chip. This erases the chip and allows new
code to be inserted into the chip. (The chip is then said
to be reprogrammed.) EPROMs can be used more than once.
Introduction to Hardware and Software 37
Electronically erasable programmable read-only memory chips
(EEPROMs) are erased using a larger voltage than the chip
requires. Flash memory, which is a form of EEPROM, can
be erased and programmed using normal PC voltages.
EEPROMs can be used multiple times but don’t last as
long as EPROMs. Also, the entire chip has to be erased
and reprogrammed. Selectively changing only sections of
microcode isn’t allowed.
Contained within system BIOS is startup BIOS, which
executes a power-on self-test (POST) that tests the system
clock, video display adapter, RAM, and other system func-
tions. Once these tests have been successfully completed,
you’ll hear a single beep, and the startup BIOS turns control
over to the operating system. The operating system (OS) is
then in charge and manages all applications and computer
operations until you power down.
Once the computer is running, the OS communicates with
and controls the hardware. It does this by either interfacing
with the hardware directly, using BIOS to communicate, or
by using software called device drivers. Device drivers are
software programs designed to interface with the hardware
FIGURE 21—SystemBIOS
Introduction to Hardware and Software38
devices. Device drivers are stored on secondary storage
devices such as hard drives. They can originate from the
OS or can be provided by the manufacturer of the device for
which they are to interface. Using BIOS and device drivers
allows the OS and application software to run without the
burden of knowing how to communicate with specific hard-
ware devices.
For the CPU to process data or follow instructions, it must
store the data or instructions and know where to find them.
The CPU stores this data in RAM and can find it by assigning
an address to each location in RAM where information is
stored. These locations are called memory addresses. They’re
displayed as hexadecimal (base 16) numbers in segment/offset
form (i.e., 0011:0001).
When the computer is running the BIOS, OS, application
software, and device drivers are all operating too. When the
time comes for an output operation to begin, the application
software passes data and instructions to the OS, which then
sends it to the device driver or to the BIOS. The device driver,
managing the input device (such as the keyboard or mouse) or
BIOS, tells the application that it’s OK to send the data. The
application software gives the memory address of the data to
the OS. The OS tells the output device driver to go to that
memory address and output the contents of that location
on the designated device. The advantage of drivers is that
the application doesn’t have to send the data directly, but
only reference the address where the data resides. Therefore,
the application doesn’t need to communicate with every
specific output and input device. Communications are
handled by BIOS and the drivers.
Introduction to Hardware and Software 39
Operating SystemsYou’ve seen that the operating system (OS) is the software that
manages the sharing of the resources of a computer. There are
many operating systems on the market, but a computer needs
only one, matched to its hardware configuration. Generally
speaking, an OS processes system data and user input, and
responds by allocating and managing tasks and internal system
resources as a service to users and programs of the system. It
performs such basic tasks as controlling and allocating mem-
ory, prioritizing system requests, controlling input and output
devices, facilitating networking, and managing file systems.
The original OS for IBM-compatible PCs was DOS (Disk
Operating System). DOS was refined and expanded over the
years, but has been incorporated into Windows. The OS went
from having a command-line to a more user-friendly graphical
interface. Other high-end operating systems include UNIX,
Macintosh OS X, LINUX and some vestiges of OS/2.
Operating systems have been evolving over the past few
decades. Here are the core functions, as we understand
them today:
• Process management: Allocates resources to processes,
enables processes to share and exchange information,
protects the resources of each process and enables
synchronization among processes
• Input-Output management: Co-ordination and assignment
of the different output and input devices while one or
more programs are being executed
• Memory management: Allocates main memory and other
storage areas to the programs and data
• File management: Controls and tracks on various storage
devices all files that have been modified.
• Diagnostics: Monitors condition and identifies trouble
with hardware or software
• User interaction: Facilitates communication between the
computer system and the user
Introduction to Hardware and Software40
• Security: Establishes and implements data security and
integrity routines
• Networking: Provides basic protocols to enable communi-
cation and data sharing
Operating systems are stored on hard drives, while application
software can be stored on a variety of secondary storage
devices such as hard drives, floppy drives (which newer
computers don’t have anymore), or optical drives (Figure 22).
Application software is stored in files called program files,
which are comprised of data or programmed instructions
and are stored under a file name that the operating system
can recognize. Each time the computer is started, the OS is
loaded into RAM so that the CPU can access it.
There are three types of user interfaces used with the operating
system; a command-driven interface, a menu-driven interface,
and an icon-driven interface. An example of a command
interface is the DOS prompt, or C prompt (C>:). From this
interface, you may input and execute DOS and allowable
system commands or run certain programs or script files,
such as autoexec.bat or regedit.exe. Menu-driven programs
allow you to choose selections or options, such as choosing
the “Format” option on the menu bar of a word processing
program. A dropdown submenu allows you to select bullets,
which then opens other menu options.
OS
BACK-UP
ON
CD-ROM
FIGURE 22—Manufacturersoften provide a CD-ROM or DVD-ROM backup of the computer’s operatingsystem. Unlike the OS,though, application soft-ware doesn’t come alreadyinstalled—you must runthe appropriate CD-ROMsor DVDs to access theseprograms.
Introduction to Hardware and Software 41
The icon-driven interface, or graphical user interface (GUI), is
used by most modern applications and operating systems.
The Windows desktop and accompanying icons for Microsoft
Internet Explorer or “My Documents” are good examples.
These icons are shortcuts. Selecting the My Documents icon
opens that folder or directory and the contents are displayed.
When you select the Internet Explorer icon, that program is
executed and a browser window opens.
Application SoftwareBefore delving into our discussion of software application
types and products, let’s take a minute to go over a few
considerations that apply to all applications when recom-
mending software. Some of these thoughts relate to
troubleshooting software problems as well.
• Compatibility. Will the application run with the
intended hardware and operating system?
• Cost. Does the price fit the budget?
• History of the product. Has this application been
known to be “buggy” in the past? (Bug is the common
term for a problem with a software application.)
• History of the developer/vendor. Does the vendor
have a good track record for providing quality products?
Will the vendor be around a year from now to support
the product?
• Customer support. Does the vendor provide support
vehicles for the application (user manual, support
Web site, toll-free telephone support)? If and when
the software exhibits problems, or if you’re having
trouble understanding a feature of the software, is
help available?
Knowing how to use computer software has become a necessity
for today’s workers. Computer software helps users complete
routine job tasks with greater efficiency and accuracy as well
as to solve business problems. We often refer to software
that directs a computer to perform tasks and produce infor-
mation as application software. The most popular types of
Introduction to Hardware and Software42
application software help users prepare and work with a
variety of documents such as letters, memos, spreadsheets,
and database reports. One of the most useful features of cur-
rent software packages is integration. Integration is the
ability to place information that’s created in one type of
application, into a document that’s created with a different
type of application. Integration thus allows you to share
information among applications.
As a knowledgeable computer technician, you’ll have to learn
about some of the common types of application software on
the market today. You’ll discover the many tasks that appli-
cation software can help you accomplish so that you can
work more efficiently on the job. Some application software
may also be called productivity software. Microsoft Office, for
example, is called a productivity suite, but it’s also a set of
applications. What’s the difference between productivity soft-
ware and application software? The distinction is simple.
Productivity software is used in work or business as a tool.
Application software is any software that you install on a PC.
There are 11 application software categories:
• Word processing
• Spreadsheet
• Database management
• Graphics
• Communications
• Games
• Mathematical modeling
• Software development tools
• Accounting and office administration
• Desktop publishing
• Utilities
We’re going to discuss in detail, the first three types of appli-
cation software listed above (word processing, spreadsheet,
and database management) because they’re commonly used
Introduction to Hardware and Software 43
in business today. In fact, depending on where your travels
take you as a PC technician, you may be called upon to
know how to use one or all of these three types of software.
We’re also going to go into some detail on communications
software applications as it applies to the Internet. We’ll
briefly discuss the remaining types of software listed above,
just so that you’re familiar with them. In addition, we’ll
touch on shareware since it’s something you’ll probably
run into.
Word Processing Applications
Word processing is the act of creating written communica-
tions with a personal computer. The term denotes working
with words to produce a variety of written documents using
electronic means. With word processing software, you enter
text using a computer keyboard. The computer screen will
display the document exactly as it will appear when printed
out (Figure 23). We call this helpful feature WYSIWYG, which
stands for what you see is what you get. Word processing
has many other examples of its own vocabulary.
Word processing applications are typically used for writing let-
ters, memos, reports, and small documents. Word processing
software can help you be more creative by simplifying many
of the mechanical tasks involved in writing and editing. You
spend less energy on the mechanics of editing, which leaves
you with more time for the creative process. Good writing
requires revision; a first draft is rarely a final draft. When
you work with pencil and paper or with a typewriter, rewriting
and revising a written document can be tedious. With word
processing software, your changes are easy to make. All
of the editing work involved, such as moving paragraphs,
correcting spelling, finding appropriate synonyms, centering
a heading and changing it to all caps, etc. takes you only
several minutes to complete. As a result, word processing
software has rendered the common typewriter virtually
extinct. Popular word processors include Microsoft Word and
Corel WordPerfect.
Another impressive characteristic of today’s word processing
software packages is that they do more than just help you
record and edit text. You can now add many enhancements
Introduction to Hardware and Software44
to your documents, including graphics, color, word art,
special fonts, and even audio. These enhancements give you
a whole new way to help you convey your ideas to others
more effectively, more efficiently, and with a lot of style.
Spreadsheet Applications
The spreadsheet application is most commonly used for
tabulating numbers. A spreadsheet is basically a worksheet
with columns and rows (Figure 24). The columns and rows
are in a grid in which you enter labels, values, and mathe-
matical functions. The intersection of a row and column is
called a cell. Cells contain numbers along with column head-
ings and row headings to explain what the figures mean.
Businesses have been using spreadsheets for hundreds of
years. Accountants and bookkeepers use them to keep track
of financial information. Meteorologists use them to work
with figures compiled about temperature and rainfall meas-
urements. Sales workers track monthly sales of merchandise
with them.
FIGURE 23—Typical Word Processing Screen
Introduction to Hardware and Software 45
Spreadsheets can be prepared manually with a pencil and
paper printed with columns and rows. This specially printed
paper used for spreadsheet preparation is called ledger
paper. Though some individuals and small businesses still
use the manual method of preparing spreadsheets, electronic
spreadsheets have many advantages over the old, labor-
intensive manual method. In an electronic spreadsheet, like
the one shown in Figure 24, complex mathematical calcula-
tions can be applied to the fields, row, and columns of the
spreadsheet. In addition, the mathematical formulas are
calculated automatically. If you change one number, the soft-
ware automatically updates the totals. You can automatically
format a spreadsheet to give it a professional look with styl-
ish fonts and colors. Electronic spreadsheets also allow you
to quickly prepare graphs based on the mathematical data.
There are many tasks that electronic spreadsheets can per-
form to help you be more productive on the job and with
your personal finances. Two examples of popular spreadsheet
applications are Microsoft Excel and Lotus 1-2-3.
FIGURE 24—Typical Spreadsheet Screen
Introduction to Hardware and Software46
In today’s workplace, spreadsheet software is second only to
word processing software as a productivity tool. A variety of
professions use electronic spreadsheets. Stockbrokers use
spreadsheets to keep investor records and track the stock
market. Scientists use them to analyze data from experi-
ments. Builders use them to compare construction bids and
keep track of costs. Bankers use them to calculate loan
repayment schedules. Teachers use them to track student
progress.
Spreadsheet software can also be used to create and
maintain
• Financial statements
• Payroll records
• Loan analyses
• Sales reports
• Inventory analyses
As you can see, the applications of electronic spreadsheets
are many.
Database Applications
A database is a large collection of facts that can be com-
bined to produce information that’s used for a variety of
things. It’s like a set of index cards, an address book, a
recipe catalog, library card catalog, or any other manual
system you may have seen used to keep track of informa-
tion. State, local, and the federal governments keep giant
databases containing information about their citizens in the
form of
• Customer demographics
• Earnings data
• Income tax information
• Social Security records
• Real estate holdings and property tax liabilities
• Computer identification records
Introduction to Hardware and Software 47
• Legal records
• Addresses and telephone numbers
An electronic database is a computerized version of a data-
base. With an electronic database, you can search through
hundreds or thousands of records in seconds to find the
information that you need. With a manual file retrieval
system, it may take minutes to find information, or it may
take hours. With an electronic database, you can add or
update information in just a few moments and easily compile
data. With a manual database, such tasks are labor inten-
sive. Just imagine the inefficiency not only of governments,
but also of businesses, if they all maintained information on
paper documents. Paper documents require expensive physi-
cal space, costly storage equipment, and extra workers to
handle record-keeping tasks.
No one can dispute the importance of an electronic data man-
agement system to an organization. Besides organizing and
storing information, such a data management system main-
tains, sorts, retrieves, adds, deletes, and formats vast amounts
of text and numerical data into usable reports. In addition, this
data can be grouped, manipulated, and queried in a multitude
of ways. Microsoft Access and FileMaker Pro are popular appli-
cations used for database management (Figure 25).
Introduction to Hardware and Software48
Word processing, spreadsheet, and database software are
sometimes packaged together, along with other ancillary
applications, and sold as what’s commonly called an office
suite or bundle. Microsoft Office and WordPerfect Office are
examples of office bundles.
Graphics Applications
Illustrations are used in everything from textbooks to coupons.
With the advent of word processing software, electronic com-
puter games, desktop publishing software, spreadsheet and
database software, Web sites, etc., the demand for being able
to create, manipulate, and edit illustrations for such uses has
exploded.
Graphics applications vary in complexity according to the
required end result. For instance, there are expensive, high-
end applications used for engineering and design work such as
AutoCAD and PTC Pro/Engineer. There are also applications to
suit creative illustrating needs, such as Adobe Illustrator, Corel
FIGURE 25—Typical Database Screen
Introduction to Hardware and Software 49
Draw and Microsoft Paint (Figure 26). Other graphics applica-
tions such as Adobe Photoshop and Corel Photo Pro are used
to create and edit photographs and scanned images.
Communication Applications
The growth of the Internet has spawned an immense variety
of communications applications. Prior to the Internet, special
communications programs were needed for two computers
to communicate with each other. These days, the actual PC-
to-PC communication is handled by networking software and
protocols built into the Windows operating system.
FIGURE 26—Opening Screen of Microsoft Paint
Introduction to Hardware and Software50
Windows also contains the basic networking software for
accessing the Internet. One additional component is needed,
however, to make the actual connection. You can compare
the technologies that make Internet communication possible
to an appliance in your home, for example, an electric coffee
maker. It is capable of making coffee as long as it has elec-
tric power. And that power comes from the electric utility
service. In the same way, your computer is ready to commu-
nicate over the Internet as long as it is linked through a
“utility service.” This “utility service” that offers customers
access to the Internet is known as an Internet Service
Provider or ISP.
The ISP connects its customers using the appropriate data
transmission technology such as DSL, cable modem, satel-
lite, wireless or dedicated high-speed interconnects. Many
options exist in the ISP market, with companies like ATT,
Verizon, COMCAST, Qwest holding a large share of the sub-
scriber pool. In the earlier days of consumer interest in the
Internet, large ISPs dominated the market. Companies such
as AOL, Netcom, ATT Worldnet to name a few, delivered con-
nection services using special proprietary software. While
some of these companies still provide connection service,
they no longer provide or require special purpose software.
Almost all interaction with the Internet now is performed
through standard browser programs such as Internet Explorer,
Firefox, Safari, Chrome, and others.
By far, the majority of ISP customers access the Internet on
high-speed, broadband connections. The number of dial-up
customers is shrinking every month as more communities
connect to digital networks with high bandwidth capabilities.
The statistics in 2010 show that U.S. broadband usage contin-
ues to grow, with 64 percent of U.S. households subscribing
to high-speed Internet up from 51 percent two years earlier.
All ISPs aren’t the same, and it’s important that you select
one that meets your needs. You’re the only person who can
determine how you plan to use the Internet. How often will
you be online each week or month? How long will your average
session last? What Internet resources do you plan to use?
Introduction to Hardware and Software 51
What hours of the day or night will you need technical
support? Answering these and other similar questions should
give you a start in choosing the ISP that’s right for you.
World Wide Web (WWW). This is what people generally refer
to as the Internet. However, it’s really not the same thing as
the Internet, but rather a user-friendly system of organizing
information on the Internet for remote access. The WWW is
the host of all the world’s Web sites and Web pages. A Web
browser is required to access the WWW. Microsoft Internet
Explorer and Mozilla Firefox are both Web browsers (Figure 27).
E-mail. Person-to-person communication via e-mail has
become very popular for both businesses and individuals.
E-mail messages can contain attachments such as document
files or digital photos. Common e-mail applications include
Microsoft Outlook (and Outlook Express) and Qualcomm
Eudora.
FIGURE 27—A Webbrowser such as InternetExplorer provides a gate-way to the World WideWeb.
Introduction to Hardware and Software52
FTP. Some people prefer to use an FTP (file transfer protocol) to
transfer files to others because FTP file transfers are generally
quicker and more reliable than other methods (Figure 28).
Frequently, FTP transfers are handled automatically through
the Web browser without any user interventions. Dedicated
FTP client applications (GlobalSCAPE CuteFTP, Ipswitch
WS_FTP) are available for users who deal with a large number
of file transfers.
Chat. For those who wish to type messages to someone in
real-time, a chat application is the tool to use. Chat tools are
popular with younger computer users but are beginning to
gain acceptance as a business tool. AOL Instant Message (IM)
and Yahoo Messenger are among the most widely used chat
tools.
Streaming media. Computer users can enjoy music and
video streamed to their PCs from fast Internet servers. Microsoft
Windows Media Player and RealNetworks RealPlayer are both
suitable applications.
FIGURE 28—FTP sites allow users to transfer electronic files quickly and easily.
Introduction to Hardware and Software 53
Other Application Software
There are probably as many different PC-based game titles
available today as there are all other software applications
combined. Computer games range from the simple card
game Solitaire, which is provided with all versions of Windows,
to complex 3-D games with intricate plots and storylines.
Mathematical modeling applications are geared towards
engineers, scientists, and other technical professionals who
regularly perform advanced technical calculations. Mathsoft
Mathcad is commonly used for mathematical modeling.
Software development tools aid in the creation and mainte-
nance of software applications. Source code editors and
compilers fall into this category. Specific applications vary
according to the programming language and platform.
Offices, small and large alike, depend on accounting and
office administration applications for everything from keeping
the books to payroll and accounts payable. Intuit Quickbooks
and Peachtree Accounting are widely used to support these
types of needs. These types of applications are also considered
to be productivity software.
Desktop publishing (DTP) applications, which are also
productivity software, are better suited to the task of creating
brochures, books, manuals, and large publications than word
processor applications. They’re excellent for fine-tuning
appearance and managing smaller chapters and sections
for compilation into a larger volume. DTP programs are
generally more expensive than word processors and often-
times lack some of the lesser-used editing functions present in
word processors. Examples of desktop publishing applications
are Adobe InDesign and Quark XPress (Figure 29).
There’s a utility to serve just about any computer-related need
imaginable. We couldn’t even begin to scratch the surface with
a discussion on utilities here. Examples of utility software
include Norton Anti-virus, DriverScanner, Winzip, and
backup software. To satisfy your curiosity, visit the following
Web sites:
http://downloads.cnet.com
http://www.tucows.com
Though it’s not considered a software application category
like the ones we’ve just discussed, we thought it would be
a good time to introduce you to shareware. The ability of
computer users to download files from the Internet has given
rise to a new vehicle for marketing software commonly known
as shareware. Shareware typically allows a user to try a soft-
ware application for a limited time or with a reduced feature
set before making the purchase. This allows the user to
Introduction to Hardware and Software54
FIGURE 29—This publication was created using Quark XPress desktop publishing software.
Introduction to Hardware and Software 55
determine if the application truly fits the bill and for the
software developer to reach a broader market than by tradi-
tional means. PKZip and Winzip, both archiving utilities for
handling .zip files, are examples of shareware in widespread
use today.
Networking SoftwareWe’ve discussed the hardware required for networking.
Now we’re going to discuss the software that’s required for
networking.
Just stringing cables between computers won’t produce a
functioning network. Along with the hardware, some network
software needs to be installed to tell the computers what to
do with their connections. This software serves as the operating
system for the local area network (LAN).
Network operating systems perform the following functions:
• Provide a user interface
• Give users access to applications and data files
• Give users access to system resources, such as a printer
or a disk drive
• Provide network and file security
• Resolve conflicts between users trying to access the
same file
• Manage communications between the workstations in
the LAN
• Establish user privileges and priorities
Most LANs are open systems, which means that they can
support a variety of hardware and software components often
made by different vendors. A closed system is comprised of
proprietary hardware and software from one manufacturer or
vendor. This keeps you locked into sometimes old or expen-
sive technology and doesn’t allow easy expansion with newer
devices or applications. Open systems are favored by network
manufacturers and users because they’re more flexible and
less expensive to operate. An open system can usually
Introduction to Hardware and Software56
include all the existing hardware and software that a business
has already purchased and can be expanded to include
future purchases.
Please complete Self-Check 2 now.
Self-Check 2
1. How does firmware differ from a software program stored on the hard drive?
__________________________________________________________
__________________________________________________________
2. Which type of software application would include Microsoft Word?
__________________________________________________________
3. What does BIOS stand for, and what does it do?
__________________________________________________________
4. List three well-known operating systems.
__________________________________________________________
5. Give three examples of operating systems that use a GUI.
__________________________________________________________
Check your answers against those on page 67.
Introduction to Hardware and Software 57
HOW HARDWARE ANDSOFTWARE WORK TOGETHERIn this section, you’ll learn what happens when you first
turn on your personal computer (PC). You’ll need to under-
stand the boot, or startup, process so that you can diagnose
problems as either hardware or software related. We’ll give
you an understanding of the boot process and how it sets the
stage for a PC to operate.
The Boot ProcessIn the boot process, the BIOS checks the computer’s hard-
ware, to make sure it’s within the necessary parameters to
ensure the computer will function correctly. The operating
system then checks the system before allowing the applica-
tion software to take over control. To perform these checks,
the software uses resources to communicate with the hard-
ware, and the hardware uses resources to communicate with
the software. These system resources are memory addresses,
I/O addresses, interrupt request numbers (IRQ), and direct
memory access (DMA) channels.
The POST or Boot Screen
Today, most manufacturers of computer systems for the
home and office overlay a bitmap image of their company
logo over the POST and boot screens (see the upper screen
in Figure 30). Because of this, you won’t normally see the
information unless an error comes up during boot-up or you
press the assigned key on your keyboard that hides the logo.
For the BIOS used on the Dell PC shown in Figure 30, pressing
and releasing the Esc key when the Dell logo is displayed
switches to the POST/boot information (see the lower screen
in Figure 30). Not all computers that start with this type of
screen use the Esc key for this process. You’ll need to check
the user guide or manual that came with your PC to find out
which key will work with your PC.
Introduction to Hardware and Software58
Sometimes within the CMOS settings there’s an option to
select whether to display the logo or show the boot progress
after the PC is first turned on. If your computer boots up
with the manufacturer’s logo and you can find this option
in one of your CMOS configuration screens, you can change
the setting so that the POST information screen is always
displayed during boot-up. When exiting the CMOS configura-
tion utility, make sure to select the option that indicates the
changes will be saved (i.e., Save Settings & Exit).
The Windows XP Boot Process
Windows XP is presently the most common Microsoft OS.
When Microsoft was designing Windows XP, they looked at
customer input and it showed that one of the most desired
features was a fast system boot. We’ll discuss this Fastboot
process and some other Windows XP–related boot processes
next.
FIGURE 30—Pressingand releasing the Esckey switches from thelogo to the POST/boot information.
Introduction to Hardware and Software 59
Microsoft wanted to really enhance XP, but enhancements
didn’t help with speeding up the boot process. To achieve
more speed, they decided to boost XP’s minimum hardware
requirements to twice the RAM of Windows 2000, and added
a quicker processor. Microsoft also wanted the OS to run
quicker than earlier versions on the same PC. So when
adding new features, designers were required to figure out
the effect new features would have on performance, and
figure out how to make up for the loss in another part of
the OS. From all this, Microsoft’s Fastboot feature was born.
Fastboot intended to make a workstation do a cold boot in
under thirty seconds, resume operation from sleep mode in
less than twenty seconds, and come up from standby in less
than five. Fastboot meant reconfiguring the entire boot pro-
cedure, deleting anything that absolutely didn’t need to be
done at that time, and finding more efficient ways to perform
only the basic functions. Fastboot addresses nine different
parts of the boot process, from new BIOS features to loading
the shell. Device drivers are stripped back to only initialize
the devices during boot up, leaving the rest as a post-boot
activity. The three items that produced the biggest improve-
ment are simultaneous processing, prefetching, and layout
optimization, which we’ll discuss next.
In previous OSs the boot process was slow because it was
a serial activity, meaning that one step had to be completed
before another step began. But a 233MHz processor with
128MB RAM, the minimum required for XP, is more than
capable of performing several functions at one time. So
Microsoft decided to run the boot functions in parallel, pro-
cessing these items simultaneously. Because the slowest
device affects the boot process the most, XP loads these
devices in parallel, including serial plug-and-play devices.
It also overlaps device startup with disk I/Os. To further
speed up the boot process, XP also performs functions such
as network startup, winlogon, and protocol binding parallel
to the boot process. This parallel processing not only speeds
up the boot process, it also makes it faster for the OS to
carry out other functions during regular operations.
Introduction to Hardware and Software60
To speed up the boot, Windows XP uses two technologies:
prefetching and layout optimization. When an XP system is
booted for the first time, it saves information on all logical
disk-read operations in a prefetch file (.pf), also called a
scenario file, which is stored in the C:\Windows\prefetch
folder. The next time the computer boots, it reads that data
file and preloads these boot files into memory in parallel with
the boot process so that all the files are available the instant
they’re needed. This way, if a certain executable file requires
a set of DLLs to accompany it, those files will already be
loaded into memory.
Along with prefetching, helping to speed things up is layout
optimization, which is a process of defragmenting the boot
files and placing them together in a certain order on the disk
for quick retrieval. The XP boot loader (ntldr) caches file and
directory metadata in large pieces on the disk allowing each
system file to be read with a single I/O. This results in the
Windows XP boot loader operating four to five times faster
than in Windows 2000. Prefetching is responsible for 90
percent of these gains, whereas layout optimization gives
only a small gain of 10 percent.
Fastboot layout optimization is unique in that XP knows
exactly what files are needed for the boot process and can set
them out in the exact order needed for speedier boots. When
the boot process is finished, XP won’t waste any resources
trying to optimize beyond the boot process.
With Fastboot, the boot process is now faster and easier.
By using a streamlined procedure, parallel processing,
prefetching, and layout optimization, Windows XP meets
the challenge of speeding up the boot process.
The Windows 7/Vista Boot Process
The Windows 7/Vista boot process differs from XP in the way
the operating system is located and initialized. In a Vista envi-
ronment, the Partition Boot Record (PBR) code uses BOOTMGR
rather than NTDLR to find any operating systems located on
the disk and then to start them up. Bootmgr loads the Boot
Configuration Database (BCD), which starts Winload.exe
and this program in turn initializes the kernel. The boot
Introduction to Hardware and Software 61
configuration stored by Boot.ini in previous Windows versions
is now stored in the BCD. Thus, the many components of the
boot process are clearly segregated from one another. This
arrangement allows for support of other operating systems,
dual-boot capability, and makes problems with startup easier
to diagnose and repair.
Protecting Data, Software, andHardwareYou’ll need to understand how to maintain a functioning
system by protecting the data, software applications, and
hardware from damage. There’s no guarantee that a PC
will perform as expected and not have a failure. You can,
however, avoid some common causes of loss or damage by
taking a few precautions. Some of these are as follows.
Saving setup information in CMOS. The setup information
in CMOS is so important that a backup copy should be made
in case the data is lost. There are commercial PC utilities that
will back this information up. The data can be lost if the bat-
tery fails or is replaced, if there are errors on the system board,
or if the user accidently changes setup without realizing it.
Keeping OS rescue disks. An OS rescue disk will allow you
to boot the computer and start the operating system if that
valuable data is lost.
Backing up your hard drive. In most cases, the most
valuable component of a computer isn’t the hardware
or the software, it’s the data contained in it. Hard drives
do fail, so make a backup to be prepared for that possibility.
A backup is a copy of the file saved in another location or
storage media.
Saving documentation. Make sure you keep and safely
file all documentation that comes with a PC. The information
contained in the documentation can be invaluable when
troubleshooting problems with a computer. It’s also important
to keep the system recovery disks that are supplied by the
manufacturer. In proprietary systems, these CDs allow you
to restore your computer to its original condition should the
hard drive crash or some software problem corrupt the OS.
Introduction to Hardware and Software62
Protecting from electricity. There are two types of electric-
ity that can damage a computer or its data. The first type is
static electricity, also known as electrostatic discharge (ESD).
Never touch the inside of a computer without wearing a
grounding wrist strap or working on a grounded pad.
The second type of electricity that can cause damage or loss
of data is voltage surges in the AC power that runs the PC.
These surges have several causes, including lightning. There
are products that can be purchased to temper or eliminate
these surges. Surge arresters, line conditioners and uninter-
ruptible power supplies (UPS) are some of the products
available. A surge arrester, or surge protector, keeps voltage
spikes in your 120 V alternating current line from damaging
your computer by grounding, or dissipating, voltage over a
certain limit (such as 200 volts). Line conditioners filter out
noise on the power lines and keep voltages within a certain
range. A UPS utilizes a battery and provides power for a
limited time when primary electricity to the computer is
lost. This starts automatically on power loss and gives you
time to save and back up files or data resident in RAM.
Practical Exercise
Observing the Boot Process Using DOS/Windows
• The goal of this exercise is to make you familiar with
the boot process for Windows XP by demonstrating the
interaction between your hardware and the startup of
the operating system.
• You’ll follow along with the sequence of steps, typing or
selecting options as instructed. The outcome of your
activities should match the description.
Introduction to Hardware and Software 63
• Requirements: Windows XP installed on a PC with
separate monitor, keyboard and mouse.
Sequence of steps for a successful boot process—no intervention:
Action or event Indicator Y/N?
1 Confirm PC is powered off PC power indicator light is OFF
2 Confirm Monitor has itspower Power indicator light is ON
3 Turn on the power to the PC
PC power indicator lightgoes to ON
4 Windows XP splash screendisplays Status bar shows activity
5User security logon screendisplays to check user IDand password
Select user correct usericon and enter password
6 Welcome screen displays Shows message: “Loadingpersonal settings”
7 Your desktop appears andboot process ends
Any programs in theStartup folder will load
Introduction to Hardware and Software64
If your PC booted properly, you can move to the next
sequence. If not, double-check your work and repeat.
Windows 7/Vista Boot Process
Windows Vista boot-up process is slightly different from
Windows XP’s. Most of the differences take place in the
background and don’t show up on the user interface. The
user still must provide security logon id and password.
There is no splash screen as such. Rather, it is integrated
into the routine that loads the main desktop screen.
Sequence of steps for a successful boot process: with user intervention:
Action or event Indicator Y/N?
1 Confirm PC is powered off PC power indicator light is OFF
2 Confirm Monitor has itspower Power indicator light is ON
3 Turn on the power to the PC
PC power indicator lightgoes to ON
4 Immediately press the F8 key
A text screen will displayindicating that Windowsdid not start normally*
5Using arrow keys, highlight“Last known good configuration”
This is the most recentsettings for startup thatworked successfully
6 Press the Return key
Windows will run throughthe standard successfulboot process as shownabove (steps 4–7)
*
This screen displays the option “Allow Windows to start normally”.This option is running on a timer, and if you don’t select one ofthe other choices, this one will automatically run and Windows XPwill boot successfully.
Introduction to Hardware and Software 65
Self-Check 3
1. Name four system resources that software uses to manage hardware.
__________________________________________________________
__________________________________________________________
2. The partition table is a map of what?
__________________________________________________________
3. What is a backup?
__________________________________________________________
4. Where can you find the option on whether to display the manufacturer’s logo or show theboot progress?
__________________________________________________________
5. The Windows 7/Vista boot process continues to rely on which file to locate and launch theoperating system?
__________________________________________________________
Check your answers against those on page 67.
Introduction to Hardware and Software66
NOTES
67
Self-Check 1
1. Binary, using the digits 0 and 1, similar to microswitches
that exist in either the “on” or “off” position
2. Input, output, processing, and storage
3. A method for the CPU to communicate with the device,
software to instruct and control the device, and electric-
ity to power the device
4. Any two of the following: mouse, keyboard, scanner,
joystick, digital camera, trackball
5. TCP/IP
Self-Check 2
1. Programs stored on firmware can’t be easily erased or
overwritten.
2. Word processing
3. BIOS stands for “basic input-output system” and is used
to manage the startup of the computer and ongoing
input and output operations of basic components such
as a floppy disk or hard drive.
4. Windows XP, Windows Vista, Windows 7, or UNIX
5. Windows XP, Windows Vista, Windows 7, or MacIntosh
OS X
Self-Check 3
1. I/O address, IRQ, memory addresses, and DMA channels
2. The hard drive of your PC
3. A copy of the file(s) saved in another location or on
storage media
4. You can find this option in one of your CMOS configuration
screens.
5. BOOTMGR
An
sw
er
sA
ns
we
rs