Top Banner
Study Unit Introduction to Hardware and Software Reviewed By William J. Scannella
71

Study Unit-Introduction to Hardware and Software

Dec 05, 2015

Download

Documents

Ileana Craita

hardware and software
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Study Unit-Introduction to Hardware and Software

Study Unit

Introduction toHardware andSoftwareReviewed By

William J. Scannella

Page 2: Study Unit-Introduction to Hardware and Software

All terms mentioned in this text that are known to be trademarks or service markshave been appropriately capitalized. Use of a term in this text should not beregarded as affecting the validity of any trademark or service mark.

About the Reviewer

William Scannella has more than 25 years experience in the PC

and information technology industry. He has worked as a help-

desk analyst, desktop support technician, software tester, and

systems analyst. He has developed print and online documentation

and training for in-house-developed and off-the-shelf systems.

Mr. Scannella has a masters degree in technical writing from

Miami University of Ohio.

Copyright © 2011 by Penn Foster, Inc.

All rights reserved. No part of the material protected by this copyright may bereproduced or utilized in any form or by any means, electronic or mechanical,including photocopying, recording, or by any information storage and retrieval system, without permission in writing from the copyright owner.

Requests for permission to make copies of any part of the work should be mailed to Copyright Permissions, Penn Foster, 925 Oak Street, Scranton,Pennsylvania 18515.

Printed in the United States of America

Page 3: Study Unit-Introduction to Hardware and Software

iii

Pr

ev

ie

wP

re

vi

ew

This study unit is an introduction to

personal computer (PC) hardware

(the physical parts of a computer),

software (the programs used to run

a computer), and how hardware and

software work together in a PC.

Remember that this study unit is an

introduction and is laying the

groundwork for the rest of the program. As a capable PC

technician, you’ll need to fully understand the basics of

hardware and software.

You’ll learn about input and output devices, the system

board, storage devices, interface or expansion cards, and

the power supply and electrical system.

We’ll discuss three important types of software and describe

what they do. We’ll talk about the boot, or start-up process.

You’ll also study a section on how software manages hard-

ware resources. Finally, you’ll be introduced to the

protection of data.

When you complete this study unit, you’ll be ableto

• Discuss the general purpose and function of computerhardware

• List the input and output devices that are commonlyused with a PC

• Describe the major components contained in a PC andstate the purpose of each

• Discuss the purpose of networks

• Discuss the three types of computer software needed fora computer to operate

• Discuss the three most common types of application software

• Explain how to use application software

• Describe network software and its use

• Explain the boot or startup process

• Describe the steps involved in the boot process

• Discuss the relationship between hardware and software

Page 4: Study Unit-Introduction to Hardware and Software

v

HARDWARE 1Hardware inside the Computer 3Input Devices 11Output Devices 18Networks 28The Internet 33

SOFTWARE 36Firmware (BIOS) 36Operating Systems 39Application Software 41Networking Software 55

HOW HARDWARE AND SOFTWARE WORK TOGETHER 57

The Boot Process 57Protecting Data, Software, and Hardware 61Practical Exercise 62

SELF-CHECK ANSWERS 67

Co

nt

en

ts

Co

nt

en

ts

Page 5: Study Unit-Introduction to Hardware and Software

1

HARDWAREIn this study unit, you’ll learn the definition of hardware.

You’ll need to understand hardware and how it functions

within a personal computer (PC). We’ll give you a thorough

tour of PC-attached input and output devices and a descrip-

tion of what they do. We’ll talk about the ports (connections)

on the PC to which these input and output devices attach.

We’ll conclude with the identification and discussion of the

typical hardware components contained within the PC and

with a thorough description of the system board.

Hardware has four main functions: input, processing, out-

put, and storage. The CPU processes the data that’s input

into the system and directs it to be output or stored.

Input and output devices need three things to operate:

• A communications method to send data to a device, or

receive data from, the central processing unit (CPU)

• Software to instruct and control the device

• Electricity to power the device

We can separate hardware into three categories: hardware

inside the computer, input devices, and output devices.

Let’s take a closer look at each of them.

Introduction to Hardwareand Software

Remember to regularly

check “My Courses”

on your student

homepage. Your

instructor may post

additional resources

that you can access

to enhance your

learning experience.

Page 6: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software2

CAUTION

Failure to wear a wrist strap during repair may cause electrostatic

discharge and damage the equipment.

WARNING

Failure to remove power from the

system may cause personal injury,

shock, or even death. When removing

and installing any device in a PC, always

remove the power cord from the back of

the power supply.

Page 7: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 3

Hardware inside the ComputerAs a knowledgeable PC technician, you need to know the

definition of hardware (Figure 1). Hardware refers to the

physical parts of a PC. The hard drive, RAM chips, keyboard,

and monitor are considered hardware.

The hard drive, similar to a small metallic phonograph

record, is the main mass storage device that contains your

operating system and application programs. A RAM chip is a

temporary memory section where your computer works on

programs and data, swapping pieces back and forth from

the hard drive. (For the most part, RAM loses its contents

when you turn your computer off.) The keyboard is a device,

similar to a typewriter, that’s used to input information to

a computer. The monitor is an output device, similar to a

television screen, in which text and graphics are displayed.

The System Board

The system board is the largest, most complex, and impor-

tant circuit board in the computer (Figure 2). It contains the

CPU, or central processing unit. The speed, power, and type

of CPU are among the main factors determining how well

your computer performs. The CPU contains the “brain” that

handles all mathematical calculations and logical operations,

and a control unit that seeks instructions from memory,

FIGURE 1—Like the key-board, monitor, and otherphysical components, theinside of a PC is consid-ered hardware.

Page 8: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software4

translates those instructions into commands, and executes

them. Some common CPU name brands are Intel, Pentium, and

AMD.

All of the computer’s devices are either mounted on the

system board, connected to it through a port, or connected

to it indirectly through an expansion card. Ports can be

mounted internally, where they connect to devices inside

the computer or externally, where they connect to devices

outside the computer. The system board is sometimes

referred to as the motherboard.

The following components are found on all system boards:

• Central processing unit (CPU), which is the processor

• Chip set that supports the CPU

• Random access memory (RAM), which holds data as it’s

processed

• Cache memory to speed up memory access (optional)

FIGURE 2—SystemBoard

Page 9: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 5

• Bus used for communication on the system board

• Expansion slots to connect expansion cards to the

system board

• Flash BIOS (basic input/output system) memory chip to

permanently store programs that control basic hardware

functions

• CMOS (complementary metal-oxide semiconductor)

configuration chip, where the BIOS is located

The number system we use to count and calculate is known as

the decimal system. This system uses the integers 0 to 9 and is

called a base 10 system, because it consists of a total of 10

integers. After early attempts failed at creating a computer-like

device that could directly store digits and letters, a system was

developed in the 1940s using only two digits, 0 and 1. Machine

language, or the language the CPU uses to communicate with

the rest of the computer, operates using this system of two

digits (also called a binary or base 2 number system). All

commands, data, and instructions in the CPU are similar

to thousands of microswitches that exist in either the “on”

or “off” position. These binary digits, or bits, are deciphered

into executable commands. All communications within a

computer are in binary.

Storage Devices

Inside the processor are two types of storage devices: primary

and secondary. Primary storage temporarily holds data and

instructions while it’s being processed. Secondary storage

stores data permanently in such devices as the computer’s

hard drive, CDs, DVDs, or USB drives. You can access infor-

mation quicker from primary storage than from secondary

storage.

Primary Storage. The devices that provide primary storage

are RAM (random access memory) chips (Figure 3) and some

adapter cards. The RAM chips are embedded on a board (also

called a memory module) that plugs into the computer’s moth-

erboard. A common type of memory module is the DIMM (dual

inline memory module) and as there are variations of DIMMs,

Page 10: Study Unit-Introduction to Hardware and Software

you would match the memory module to whatever the mother-

board supports. Video memory cards contain their own memory

chips embedded on the card.

As you know, RAM chips don’t hold memory permanently;

RAM needs continuous electrical power to hold data. That’s

why primary storage is also called temporary or volatile storage.

Secondary Storage. Secondary storage differs from primary

storage in that secondary storage is permanent. When you turn

off your computer, the data in secondary storage remains there.

It’s important to know that data and instructions can’t be

processed from secondary storage. The data must first be

copied into RAM for processing.

Hard drives, optical drives, and removable storage like flash

drives or memory cards are types of secondary storage. The

hard drive, or hard disk drive (HDD), is the computer’s main

secondary storage device (Figure 4). Inside the hard drive case

are platters or disks that rotate at a high speed. An arm with a

sensitive read/write head writes new data to the platters and

reads data from them. Integrated Drive Electronics (IDE) is

the internal technology used in the magnetic hard drives.

Introduction to Hardware and Software6

FIGURE 3—DIMMs are miniature circuit boards that add RAM to the systemboard.

Page 11: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 7

A new technology to hold data is a non-volatile flash memory

chip, which isn’t a moving mechanical disk. It’s similar to the

chip used in a USB flash drive. Since it has no moving parts,

it’s referred to as a solid state drive (SSD). SSD drives are

much faster and durable than hard drives; they last longer

but are more expensive.

Most computers today include an optical drive, CD, DVD, or

Blu-ray. The drives that can read a disc and write to a disc

are read/write and include the letters RW in its name, for

example CD-RW.

Two removable storage devices popular today are the USB

flash drive (thumb drive) and memory cards (Figure 5) used

in digital cameras. They both use non-volatile flash memory

chips. You insert flash drive into the USB port on a computer.

Some flash drives can hold up to 64 MB of data. You would

connect the memory card into the SD card slot on a laptop.

Some older computers include the floppy drive, which holds

3.5 inch disks and can hold up to 1.44 MD of data.

FIGURE 4—Hard Drive

Page 12: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software8

Expansion Cards

Expansion cards are circuit boards mounted in expansion

slots on the system board (Figure 6). They enhance the capa-

bility of the computer, and enable the CPU to connect to an

external device. Common types of expansion cards are

• Video cards

• Sound cards

• Network cards

• Internal modem cards

• I/O controller cards

FIGURE 5—USB flashdrives and memorycards

Page 13: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 9

The BusThe bus is a group of circuits etched into the top and bottom

of the system board. The circuits are in the form of fine lines

or traces that carry data, instructions, and power from com-

ponent to component on the board. Data travels through the

bus in binary. The traces run in parallel lines of 8, 16, 32,

64, or 128 bits. A bus that has 8 traces is called an 8-bit

bus, or a bus where 8 binary digits of ones and zeroes can

travel simultaneously.

The four system resources—memory addresses, I/O addresses,

interrupt request numbers (IRQ), and direct memory access

(DMA) channels—use dedicated lines on the system board.

We know that all hardware devices are directly or indirectly

connected to the system board because they need the CPU

to process their data. One of the methods of connecting

the devices to the system boards is to use a bus. There are

potentially several buses on the system board. One type,

however, the PCI, or peripheral component interconnect, is

now the most common virtually replacing the older ISA bus.

The PCI architecture was introduced in the early 1990s by

Intel and released into the public domain. This meant that

manufacturers of peripherals could use the PCI technology

at no cost. That fact and the technical improvements of PCI:

increased speed, flexibility, and the ability to handle 32-bit

instructions made the PCI bus the premier expansion bus.

In addition, the PCI bus is self-configuring, that is, once a

FIGURE 6—Expansion Card

Page 14: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software10

new peripheral is plugged in, the PCI bus will automatically

make the settings necessary for the peripheral to operate

properly. This innovation led to the plug and play (PNP)

approach now common in modern versions of the Windows

operating system. Systems with PNP automatically recognize

and configure peripheral devices when they are connected to

a computer.

A system board can have more than one bus. One of the

buses on the system board is called the system clock.

Supplying electricity to a special type of quartz crystal

mounted on the system board causes this clock to oscillate,

or vibrate. This oscillation is a cyclical wave of binary 1s

and 0s. These occur at a constant rate or frequency (Figure 7).

The completion of one cycle is indicated by the clock ticking

once. Every time the clock ticks, data is sent. An 8-bit bus

allows a single bit (1 or 0) to flow down each of the 8 wires of

the bus. Hertz is a measure of frequency. One cycle/second

is said to have a frequency of 1 hertz. If your CPU is running

at 800 MHz (megahertz = 1,000,000 hertz), your clock is

ticking at 800,000,000 times/second. The faster the clock

speed and the wider the bus (or bus speed), the faster your

computer will run.

There are other bus architectures, such as Extended Industry

Standard Architecture (EISA), Video Electronics Standards

Association VL bus (VESA), PCI local bus, Universal Serial

Bus (USB), Serial ATA, Apple’s Firewire, and Micro Channel.

In addition, derived system clocks handle timing for other

devices, such as Accelerated Graphics Port (AGP) video and

cache.

1

0

ONE CYCLE

FIGURE 7—Graphic Depiction of the System Clock’s Oscillating Cycle

Page 15: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 11

The Power Supply

The power supply of a computer takes 120-volt alternating

current (ordinary household electricity) and converts it to

direct current that the computer can use (Figure 8). The

computer operates only with low voltages of direct current.

Modern power supplies provide 3.3, 5, and 12 volts DC

power. The power supply provides power to the system board,

disk and optical drives, interface cards, and cooling fans.

Input DevicesA keyboard and mouse are the most common forms of input

devices. Input devices transfer or send data to the computer.

We’ll also discuss some other types of input devices. Let’s

start with the keyboard.

The Keyboard

The 104 advanced keyboard, or Windows keyboard, is the

most common keyboard layout available (Figure 9). There are

other keyboards, which can be purchased separately from a

packaged computer system, that contain fewer keys, and

thus are made smaller to provide space-saving conveniences.

Still other modern keyboards contain special function keys

dedicated for Internet browsing or programmable “hot” keys

to be used with multiple software applications. Some of the

newer keyboards are ergonomically designed with special

FIGURE 8—Power Supply

Page 16: Study Unit-Introduction to Hardware and Software

contours intended to better fit the natural contour of the

hands or with built-in wrist rests to aid in reducing the

chance of pain or injury produced by repetitive tasks.

Ergonomics (from the Greek word ergon, meaning work) is

the science of matching machines to the shape of the human

body to achieve greater comfort and efficiency, thereby reducing

the chances of pain or injury.

The difference between keyboards is often in their “feel.”

Some keyboards feature sensitive keys with a rapid clicking

action. Activating a sensitive key requires very little pressure.

Any hesitation on the user’s part in releasing a depressed key

results in multiple characters displayed on the screen. People

who are fast and accurate typists often prefer this type of

action on their keyboards.

Other keyboards feature keys with slightly tighter spring

action. Since it takes more pressure to depress this type of

key, there’s less chance of producing multiple characters. The

type of keyboard that’s best for a particular person is purely

a matter of taste. If you ever decide to purchase a keyboard

separately from a full computer system, try out different

boards and select the one that feels best to you and is the

easiest for you to use.

Introduction to Hardware and Software12

FIGURE 9—Typical Windows Keyboard

Page 17: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 13

The Mouse

Another input device is the mouse. The name “mouse” is

used because the device was originally connected to the

computer by a thin wire, or cable, which resembles a

mouse’s tail. Although wired mice are still the most common

type in use, wireless mice are gaining in popularity.

A mouse is a hand-operated device that controls the position

of the cursor on a display screen. (A cursor is a highlighted

spot on a computer screen, which shows where the next

character will be inserted or deleted.) When a mouse is used,

the cursor is called a mouse pointer, which when moved with

the mouse, allows the user to make selections and to draw

pictures. Most mice have a hard rubber ball on their under-

sides. When the user rolls the mouse around, the cursor, or

pointer, moves as well. Like many other peripheral devices, a

mouse requires companion software to operate properly.

A mouse has either two or three buttons for performing

program functions. A three-button mouse offers more options,

but most software programs require the use of only two

buttons, even on a three-button mouse.

An alternative to the three button mouse style is the newer

wheel mouse, which contains a thin rubber wheel between

the left- and right-click buttons (Figure 10). The wheel spins

in notched increments and allows easy page scrolling with a

quick flick of the wheel. In some devices, the wheel is also

clickable, allowing either an autoscroll function or other

application specific specialized function that can be cus-

tomized by the end user. These types include Microsoft’s

IntelliMouse and Logitech’s Mouseman.

With the latest advances in mouse technology, it appears

that the roller ball mouse may even be in danger of extinction.

The now-preferred device for pointing and clicking is the

optical mouse (Figure 11). This type of mouse connects

to the mouse port on the back of the computer.

Page 18: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software14

Optical mice have several benefits over wheeled mice, namely,

• No moving parts, which means less wear and a lower

chance of failure

• No way for dirt to get inside the mouse and interfere

with the tracking sensors

• Smoother response because of increased tracking

resolution

• No requirement of a special surface, such as a mouse pad

FIGURE 10—Wheel Mouse

FIGURE 11—Optical Mouse

Page 19: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 15

A wireless, or cordless, mouse (Figure 12) is usually used

with notebooks and laptops. The wireless mouse transmits

data via infrared radiation (IrDA) or radio (including Bluetooth).

You connect the receiver to the computer through a serial or

USB port. The newer nano receivers were designed to be

small enough to remain connected in a laptop or notebook

computer during transport.

Computer mice are classified by their connection type. The

serial mouse uses one of the serial ports in the back of the

computer; the USB mouse connects through one of the USB

ports; the PS/2 style mouse employs the PS/2 connector still

found on some PCs. The “wireless” mouse actually communi-

cates with a small receiver plugged into one of the USB ports.

Mouse design has become increasingly important as more

and more software programs take advantage of this device’s

speed and accuracy of movement. Some people find that

prolonged use of their mice causes soreness and fatigue in

the hand that rests on the mouse. Mouse manufacturers

have worked hard to come up with ergonomic designs that

reduce or eliminate such discomfort.

FIGURE 12—Wireless, orCordless, Mouse

Page 20: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software16

Other Input Devices

A trackball is a variation of the mouse. The technology and

on-screen effect of rapid cursor movement is the same for

both the trackball and the mouse. However, instead of rolling

the entire device the way you do a mouse, you simply roll the

exposed upper half of the ball with your fingers. Some track-

balls are built into the right side of the keyboard. Others are

separate units that connect to the back of the computer and

attach to the keyboard for stability. Fans of the trackball

prefer this device because it requires less arm movement.

Many notebook style computers have a built in trackball.

Some artists who use computers to produce graphics have

their own special set of input tools. These devices include

graphics pads and electronic pens (or styluses). There’s even

a product that combines the features of a mouse, a stylus,

and a pad into one device. The aim of all these input devices

is to unleash the creativity of publishers and artists and to

allow them to draw freehand. The images traced on a pad or

other surface appear directly on the monitor’s screen. When

the artwork is completed, the image can be saved as a file

and stored for future use. The general aim of these devices is

to make computer data entry as much like writing and draw-

ing as possible. Let’s look at each of these devices.

A light pen is an input device that looks like a ballpoint pen.

It has an electrically sensitive point on its tip instead of an

inked point. However, the real model for light pens isn’t the

writing instrument, but rather the human finger. When a

light pen is attached to a computer, the user can point to a

specific location directly on the screen itself, thus command-

ing the software to perform certain functions. Like the

mouse, the light pen is better at selecting choices and draw-

ing than at inputting text. A disadvantage of light pens is

that extended use can become tiresome, since users must

hold their arms in an upright position to touch the screen.

A mouse pen is another pointing device which works like a

mouse but handles like a pen. The mouse pen is really just a

mouse, reduced to a tiny size and mounted on the end of a

pen-shaped handle. Many people find this innovative shape

to be more convenient to use than a traditional mouse, which

demands more desk space. The mouse pen requires only a

Page 21: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 17

tiny amount of surface. The corner of a desk or the top of

a book is sufficient to activate the mouse pen’s pointing

functions.

Another input device is the digitizing tablet. With a digitizing

tablet, the user controls cursor movement by sliding a puck

or a stylus along the tablet’s electronically sensitive surface.

A scanner is an input device that converts photographs,

artwork on paper, or text on paper into electronic data that

can be stored in computer files. These files can later be used

in page layout programs. A scanner works like a camera,

capturing information electronically (Figure 13).

Like many other input devices, scanners consist of a combi-

nation of compatible hardware and software. The scanner itself

is a machine (the hardware) that actually scans a document

FIGURE 13—FlatbedScanner

Page 22: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software18

and produces a digital image of the document, sending this

image down a wire to your computer. But the output from a

scanner is too rough for your ordinary software to actually use.

The scanner hardware generally needs some accompanying

software to make the scanned image usable. For this reason,

almost all scanner manufacturers include image-processing

software with their scanners. When software is included with

hardware, it’s said to be bundled. A few scanners are sold

without bundled software, but this practice is unproductive

because without some kind of image-processing software, the

scans aren’t usable. Therefore, if you’re considering buying a

scanner, remember that the quality of the hardware and the

quality of the bundled software are equally important.

In addition to traditional keyboard and mouse input devices,

current desktop publishing has brought about the creation of

other computer input devices to aid in the creation of multi-

media. These include digital cameras for both still images

and video images, and digital sound input. Like scanners,

digital cameras allow the user to input photographs and

videos into data files for use in various software applications.

Likewise, sound files can be input using digital microphones

that connect directly to a PC and acquire sound files with the

aid of specific software applications.

The joystick is another popular input device, especially for

use with computer games. There are many different varieties,

with cursor movement being accomplished by tilting the vertical

“stick,” or handle, in any direction in a 360° circle. Special

function buttons are located either on the base of the joystick

or on the handle itself and can be programmed to perform

certain application specific tasks.

Output DevicesOutput devices receive data or information from the com-

puter. Monitors and printers are the most common output

devices. Before going into detail on the different types of

monitors and printers, let’s begin with some of the basics.

Page 23: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 19

Monitors

Let’s clear up some questions you may have about the termi-

nology used when referring to monitors. You’ve probably

noticed that the computer monitor goes by many names.

The most common names used for a monitor are

• Video display

• Video display terminal (VDT)

• Video monitor

• Monitor

• Cathode-ray tube (CRT)

• Terminal (even though it’s not)

• Display screen

• Screen

As a technician, you’ll hear many different names for this

piece of equipment, so it’s a good idea to know the most

common ones being used.

One type of monitor is the CRT PC monitor. Some popular

sizes of these monitors are 15, 17, or 19 inches (as meas-

ured diagonally across the screen face). This distance is

referred to as the screen size. However, there are larger and

smaller sizes available. CRT monitors are quite heavy and,

along with the PC, take up a good amount of space on your

desktop (Figure 14).

The CRT monitor is considered outmoded although many are

still in use and performing adequately for most tasks. They use

the same technology as last-generation analog televisions, and

like older TV sets, they’re being replaced by flat panel LCD

or LED digital screens. CRTs operate at extremely high and

potentially dangerous voltages. It’s possible that you might

encounter one of these older monitors. If it isn’t working, don’t

try to repair it. Only an experienced technician who has the

requisite training and safety measures in place should service

a CRT.

Page 24: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software20

The CRT was the most prevalent type of monitor for several

years. New design and improvements, though, are constantly

being introduced. In addition to new devices and device

features, products continue to get smaller and lighter. For

instance, instead of the heavy CRT monitor that’s often

longer (deeper) than it’s wide, you can opt for an LCD, or

liquid crystal display, monitor that’s light and just a couple

of inches thick (Figure 15).

FIGURE 14—Typical CRTMonitor

FIGURE 15—LCD Monitor

Page 25: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 21

LCD monitors utilize more recent technology than CRT

monitors and use less power with their flat screens. This is

because LCDs block light rather than emit it. LCD pixels are

molecules of liquid crystal sandwiched between glass layers.

The crystal molecules, acting like microscopic doors, block

light emitted from the rear layer. In active-matrix displays, a

capacitor is located at each pixel. When electricity is applied

to the capacitor, it polarizes, or changes, the liquid crystal

molecule; this opens the “door” and makes light visible on

the front screen. LCD monitors typically provide a clearer,

sharper image than CRT monitors.

It’s easy to see that it’s impossible to choose a monitor on

technical specifications alone. When selecting a monitor, it’s

a good idea to see how the applications you’ll be using are

handled. A monitor that’s good for displaying text, for exam-

ple, might not be quite so good at displaying images for

on-screen editing. Remember, how well the monitor does the

job you want it to do is the critical element.

Printers

Printers are also considered an output device. We’re now

going to discuss some different types of printers.

Printers can defy your every effort to make them work

correctly, and then suddenly and inexplicably, they’ll start

working again. This is where technicians step into the picture.

Troubleshooting printers takes a great deal of patience, so be

prepared.

Printers can be broadly grouped into two categories: impact

printers and nonimpact printers. An impact printer works

much like its name suggests; the printer’s mechanism strikes

or impacts on a ribbon to produce a character on the page.

Nonimpact printers use jets of ink, laser beams, or other

technology to create images.

The two types of impact printers generally used with PCs are

dot matrix and fixed-character. Minicomputers and mainframe

computers also use dot matrix and fixed-character printers,

with an important difference; they also feature line printing

and page printing. By this, we mean that an entire line (line

printing) or page (page printing) of text is transferred onto

the paper by the printer at one time.

Page 26: Study Unit-Introduction to Hardware and Software

Impact printers are considered self-destructive because every

time they create a character, the impact does a little damage

to the printer. After time, all of the little impacts add up to a

lot of damage.

When personal computers were first introduced, the most

common output device purchased (after the monitor, of

course) was a dot matrix printer. This type of printer is still

used today, although not nearly as often as laser and ink-jet

printers.

Although the mechanics of a dot matrix printer are relatively

simple, they require the exact coordination of many parts

(Figure 16). First, the correct pins must push against the

ribbon. When the print head reaches the right-hand side of

the page, it must return to the left-hand side of the printer so

that it can begin the next line. The ribbon must advance so

that a new section inserts between the print head and the

paper. At the same time, the paper must advance so the next

line of type can print.

Bidirectional printers print in both directions. This function

must coordinate exactly for the printer to work properly.

An average-quality dot matrix printer is called a near-letter-

quality printer because its output isn’t very sharp. However,

some high-end dot matrix printers can create letter-quality

output like that produced by fixed-character printers.

Introduction to Hardware and Software22

PAPER

RIBBON

PRINTING

HEAD

PRINTING

PIN

FIGURE 16—Close-upof Dot Matrix Printeron the Page

Page 27: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 23

Fixed-character printers are based on typewriter technology,

and they look and behave very much like electric or manual

typewriters. The print head, which is usually shaped like a

ball or wheel, consists of a set of reshaped characters. When

a character is chosen, it’s rotated into position and forced

into the ribbon by a hammer. The ribbon then transfers the

image to paper. The advantage of a fixed-character printer is

that the quality of the output is about the same as a type-

writer. Fixed-character printers are also called letter-quality

printers.

Very few fixed-character printers are currently on the market.

That’s because ink-jet and laser printers offer output of simi-

lar or better quality, and with comparable prices and more

flexibility. If you come across a fixed-character printer, con-

sult the user’s manual for troubleshooting information.

Nonimpact technologies include thermal, ink-jet, laser, LED,

color laser, and plotter-type printers. Nonimpact printers

create images without an intermediate component such as a

ribbon. As a rule, nonimpact printers are more durable than

impact printers because they’re not so self-destructive.

One nonimpact printer that relies on established technology

is the thermal printer, which features special heat-sensitive

paper and a thermal print head. The print head raises the

temperature of the paper until it discolors. This technology is

also used for some inexpensive fax machines. Some thermal

printers use heat to transfer a waxy ink from a ribbon to

plain paper.

A thermal printer’s print head consists of pins or wires that

are heated to form characters that resemble dot matrix out-

put. Thermal printers are rarely used today because their

output quality has never been very good, they’re inflexible,

and they require paper that’s expensive and unattractive. The

only advantages of thermal printers are their low cost and

almost noiseless operation. You’re not likely to find any one-

color thermal printers still in operation. If you do come

across one of these printers, consult the user’s manual for

troubleshooting information.

Page 28: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software

A more modern thermal printer that can produce four-color

output, however, is enjoying significant popularity. As you

already know, the combination of basic colors at high speeds

can produce most other colors, so a four-color thermal

printer has tremendous output capabilities. Color thermal

printers use plain paper and a much more sophisticated

technology than older thermal printers. Their popularity is

increasing because many people want color output. The rela-

tive inexpensiveness of thermal printers compared with other

types of color printers makes them attractive.

Another type of nonimpact printer is the ink-jet printer

(Figure 17). In many respects, ink-jet printing is similar to

dot matrix printing: characters are formed by ink sprayed

through a matrix of holes. Each hole is about the width of a

human hair. A print head is moved across the page with a

motor, spraying ink across multiple lines at a time in a series

of dots or pixels. The software printer driver controls the amount

of ink and the dot pattern. After the lines are sprayed, a roller

motor steps the paper roll vertically to the next print area.

Ink-jet printing has a significant advantage over dot matrix

24

FIGURE 17—Ink-JetPrinter

Page 29: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 25

printing, however. The dots expand slightly when the ink is

absorbed by the paper, so the image is smoother than that of

a dot matrix printer. The improvement that results from this

ink bleeding is called gain because you “gain” quality.

The resolution on an ink-jet printer is determined by count-

ing the number of ink dots in each square inch of paper. The

resolution is then rated in dots per inch (dpi). The higher the

DPI, the better the quality.

An ink-jet printer can also be used to print in color. If you

use color printing a lot, you’ll save money by using a four-

cartridge or six-cartridge printer instead of a two-cartridge

printer. This is because you can replace individual color car-

tridges when they run out, instead of having to replace the

entire cartridge as you would in a two-cartridge printer.

Ink-jet printers are inexpensive, yet their quality and per-

formance are quite good. In addition, ink-jet printers are

fairly flexible. Some are capable of producing color output,

while others are small enough to be paired with portable

computers. Other advantages of ink-jet printers are their

quiet operation, few moving parts, and easily replaceable ink

cartridges.

Many computer users find that ink-jet printers are adequate

substitutes for laser printers. Ink-jets offer the quality and

flexibility of laser printers, as they can print attractive text

and graphics. Moreover, the output quality is much better

than that of dot matrix printers, and the cost is about half

the price of laser printers. Given these advantages, it’s no

wonder that ink-jet printers are selling at such a high rate.

Another type of nonimpact printer is the laser printer

(Figure 18). Without question, laser printers are the top of

the line for output. They’re fast, quiet, versatile, and most

of all, they produce documents of a remarkable quality.

Their output capabilities are very close to that produced

by professional typesetting equipment!

Page 30: Study Unit-Introduction to Hardware and Software

The laser printing process consists of six separate steps.

First, the drum is cleaned of any residual electrical charge

and scraped of any residual toner. Next, the drum is

conditioned to hold a high uniform electrical charge of

–600 V. The third step is called writing. A scanning mirror

directs the laser onto the area of the drum that you wish to

print. Wherever the laser touches the drum, electricity is

discharged (down to –100 V). This is done one line at a time

across the entire drum.

The next step, developing, applies toner to the drum by way

of a developing cylinder, which rotates close to the drum.

The toner on the cylinder is charged anywhere from –200 to

–500 V. Toner from the cylinder is attracted to the lower-

voltage areas of the drum (–100 V) that are created by the

writing laser. In the next step, transferring, a positive charge

is applied to the paper and the toner leaves the drum, adher-

ing, by static charge, to the paper. The toner then remains on

the surface of the paper until fusing occurs. In this last step,

heat and pressure are applied to affix the toner to the paper.

Laser resolution refers to the number of dots per inch (dpi), or

how many dots are printed as the drum rotates. A laser with

a 1200 dpi writes 1200 dots along the drum for every inch of

drum circumference (that is, as the drum rotates one inch).

Introduction to Hardware and Software26

FIGURE 18—Laser Printer

Page 31: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 27

Laser printers are also classified according to their speed in

pages per minute (ppm). Inexpensive laser printers run at

about 12 ppm, while top-end printers run at 30 ppm or

higher. Be advised that the speed rating of a laser printer

isn’t always the best measure of its capabilities. Laser print-

ers that output pure text pages at high rates of speed might

slow down considerably when printing graphics.

The color laser printer is also a type of nonimpact printer.

The vast majority of laser printers sold at the present time

are monochrome, but the prices of color laser printers are

decreasing and their output is very professional looking. For

these reasons, the use of color laser printers is sure to grow

in popularity.

Color laser printers work in the same way as monochrome

laser printers, except that colored toner is deposited on the

drum. Color lasers uses combinations of cyan, magenta,

yellow, and black toners (CMYK) to produce all the various

colors. The toner is deposited on the paper in one of two

ways. In the first method, all four colors are pulled to the

drum and transferred to the paper at once. In the second

method, one color of toner is put on the drum at a time,

and the paper is run over the drum four times.

Another type of nonimpact printer is the light-emitting diode

(LED) printer. The LED printer is a less expensive alternative

to the conventional laser printer. An LED printer works in

the same way as a laser printer except that the laser and

mirror in a laser printer are replaced by a row of LEDs. This

arrangement is less expensive than the laser and mirror. A

300 dpi printer will have 300 LEDs per inch, spread across

the page width.

The last type of nonimpact printer we’re going to discuss is

the plotter. Architects, designers, and drafting professionals

generally work on documents that are too large for regular

printers to reproduce. Therefore, these professionals use

plotters instead of printers. Plotters use rolls of paper 36

inches wide or wider. Images are drawn on the paper by

ink-filled pens or cartridges that move back and forth as

the paper passes under them. They’re filled with ink of one

or more colors as needs dictate, and they must be refilled

or replaced periodically.

Page 32: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software28

Plotters work in almost exactly the same way as printers.

Plotters are connected to a serial or parallel port with a cable.

Images are created with graphics software and then sent to

the plotter the way they would be sent to a printer.

NetworksNetworking is a very specialized field. As a result, there are

many experts that specialize in networking only. As a PC

repair technician, you’ll be exposed to networking at some

level. What we’re going to do now is give you an introduction

into networking and some of the related hardware.

With the advent of the IBM PC in 1981, many employees were

provided with their own computers to run their own software

applications and manage their own data. They no longer had to

depend on the centrally controlled mainframe and minicomput-

ers, that were run and maintained by a separate department,

usually called management information services (MIS). One

of the disadvantages to this newfound independence was

the inability to share information and expensive peripheral

devices, such as printers, with other PC users. Individuals

began looking for ways to link their personal computers

together to share data and hardware resources. Today,

computer networking is a popular computing specialty, and

development of network hardware and software is growing

faster than any other area of computing.

Building a network is challenging. However, since you’ll prob-

ably find that many of the personal computers you’ll work on

are connected to networks, you’ll need to thoroughly under-

stand this aspect of computing. A network is a system of

linked computers and computer peripherals. The purpose of

a network is to allow users to share data and program files

and other resources such as disk drives and printers.

In general, most networks have these characteristics:

• Connections to a number of computers and peripheral

devices

• Connections made through some type of cable or broadcast

• Shared data and resources

Page 33: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 29

• Individual computers in the network that perform some

processing functions

• Computers managed by one or more individuals using

specialized software

• A common protocol, or set of rules, that’s used to share

data

There are many different varieties of networks. Some consist

of a few computers located in the same room that share data

files and the same printer. Others consist of thousands of

computers spread out over many cities or even countries.

These large networks share hundreds and possibly thou-

sands of printers, exchange electronic mail (e-mail), support

video conferencing, and may be protected by sophisticated

security systems.

One of the most important benefits of a network is that it

allows individual users to share printers and other peripherals.

Sharing these devices eliminates the need for mechanical

switches to allow printer sharing, allows users to redirect out-

put to a chosen device, and allows users to share expensive

devices that they might not have access to in a stand-alone

environment.

In a network, users aren’t limited to the data on their indi-

vidual PCs. Instead, they can access, or share, data on other

network computers. The ability to share data allows multiple

users to access database files at the same time, to access

common documents and forms used in the organization, to

share files, and to collaborate on documents.

In addition to peripherals and data, network users can also

share application software. Here’s how it works. One copy of

the software is installed on a PC, called a server. When a user

needs the particular software, he or she can simply access it

from the server. Sharing application software has several

advantages. For example, sharing applications helps to reduce

the amount of time needed for software maintenance and

installation, and also reduces the costs involved. Sharing

applications also establishes a standardized software setup

and prevents users from modifying software configurations.

This saves time and money spent on support and mainte-

nance. Finally, sharing applications prevents the illegal

Page 34: Study Unit-Introduction to Hardware and Software

lll

Introduction to Hardware and Software30

copying of software, because a software-metering application

tracks the number of users that open and close particular

applications.

Another advantage is that networks can provide substantial

communications benefits, such as e-mail, scheduling, and

access to remote host (mini or mainframe) computers. It can

also provide access to larger networks like the Internet.

Finally, networks provide varying levels of security to their

users. For example, all networks require users to input a

login ID and a password before they can access the information

on the network. Additionally, networks may limit the time

of day at which users can access the network and the work-

stations from which users can access the network. They

may also provide access limitations to certain files and even

certain devices (disk drives) on the network. A stand-alone

workstation provides virtually no security.

A network’s hardware components usually include a server,

workstations, network adapters, and a cable system. We’ll

discuss these hardware components next.

Server. A computer that’s attached to a network for a specific

purpose. It runs the network operating system and offers

network services to users at their individual workstations.

These services include file storage, user management, security,

network commands, application software storage, printing

services, and other communication services. Network servers

contain higher-speed processors, larger hard drives, and

more memory as compared to desktop personal computers.

A server may also be a specialized computer such as a Sun

Microsystems Netra Server or even a minicomputer such as

an IBM AS/400. Typically, a LAN server is a high-end PC or

specialized PC built to be a server, such as the Hewlett Packard

NetServer.

Workstation. A computer that’s attached to a network and

operated by individual users. Workstations don’t function as

servers. Instead, the workstations (sometimes called clients)

use the services that are offered by the server, such as file

storage and printing services. The types of computers that

are used as workstations vary, depending on user needs and

on the network’s operating system and application software.

Page 35: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 31

A workstation may be a PC running Microsoft Windows XP,

Vista, Windows 7, a UNIX-based machine, a Macintosh

running OS X or a machine running LINUX.

Network adapters. A network interface card (NIC) is a

specialized adapter card that fits into one of the bus slots

on a computer’s motherboard (Figure 19). An NIC is an

extension of the computer’s bus and is used along with the

cable system for communication between the computer and

network clients or between one network client and another.

The NIC contains some RAM that serves as a communica-

tions buffer, customized chips that are used to exchange

data between computers, and other network circuitry. It

also contains the connector that’s used to join the cable to

the computer.

The type of NIC you select is based on the type of cable you

decide to run. Ethernet NICs may support thick Ethernet cable,

thin Ethernet (coaxial) cable, and unshielded twisted-pair (UTP)

cable. Token-ring NICs support shielded twisted-pair (STP)

cable and UTP cable. Another type of adapter may be an exter-

nal device connecting to the PC using a USB port. The adapter

supplies a registered jack (RJ-45) port that looks like a large

phone jack. We’ll discuss cable types next.

FIGURE 19—TypicalNetwork InterfaceCard (NIC)

Page 36: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software32

Cable system. The physical transmission medium that ties

the various components of a network together. That is, the

cable system provides the physical connections between

the workstations and the server. The cables, however, are

often the part of a network that receives the least amount

of attention, and the least amount of money during installation

and maintenance.

Three major types of cable are used in LANs: twisted-pair

cable, coaxial cable, and fiber-optic cable. Each type has

specific properties that relate to their data handling capacities,

their immunities to electrical interference, the distances

over which the data can travel, and installation costs.

Twisted-pair cable or Category 5 (Cat 5). This is the

cable that’s used most often in LANs (Figure 20). It may be

either STP cable or UTP cable. Shielded cable offers more

protection against electrical interference but is more expensive

than UTP. UTP cable is one of the most popular types of cable,

partly because it’s commonly used in telephone installations

and many buildings have an excess of it already installed.

In some office environments, telephone wiring is run to cen-

tralized communications closets where telephone equipment

is installed. These closets are ideal places to locate hubs or

concentrators for a network. A hub, switch, or concentrator

is a central location where cables that are connected to

workstations can be attached.

FIGURE 20—Cat 5 Cables

Page 37: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 33

UTP cable consists of at least two conductor wires that

are twisted together and housed in a plastic sheathing.

The number of twists per foot is standard in the United

States and is used to offset electrical power interference.

STP cable is essentially the same as UTP cable, except that

the wire twists may be wrapped in an aluminum backed

plastic sheathing or a braided metal shield. The shields are

grounded to drain off electrical interference. UTP cable should

be used in situations where electromagnetic interference is

low, because electromagnetic interference can disrupt the

data signals.

The InternetNow we’re going to discuss another topic, the Internet.

Breaking down the word Internet reveals exactly what

the Internet is. The prefix inter means “between,” and the

suffix net is short for “networks.” Therefore, the Internet

is a virtual world that exists between computer networks.

What we’re going to do now is give you an introduction to

the Internet and its related hardware.

The power and potential of the Internet are truly amazing,

and perhaps more than a little bit scary. You may find your-

self wondering, “Who’s in charge of all of this?” The answer

is surprising: “No one.” While the individual networks (the

LANs we discussed earlier) are managed by their own net-

work administrators, no one person or organization manages

the Internet. Instead, it’s a cooperative network of people

who provide information following an agreed upon set of

standards.

The Internet’s structure is often compared to an enormous

highway system. You’ve probably even heard the Internet

referred to as the “information superhighway.” This analogy

came about because the backbones of the Internet are some

very high-speed central networks. These backbones are similar

to interstate highways; they allow you to get on and off smaller

networks of “roads.” Think of the smaller networks as high-

ways and the even smaller networks as city streets. All of

these networks, highways, and streets are interconnected,

or linked, so you can move around on them at will.

Page 38: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software34

The interconnected nature of the Internet is virtually trans-

parent to users, which means that as you travel along the

Internet, you won’t even be aware of all the connections

being made.

Because the Internet connects so many different networks,

a common language, or protocol, is necessary to allow the

networks to communicate with each other. This language

is called Transmission Control Protocol/Internet Protocol

(TCP/IP).

To access the Internet, your most basic needs are a computer

system equipped with a modem and a telephone line. More

sophisticated options are also available, such as obtaining

a connection via your cable TV or satellite dish system.

(You can contact your cable company or satellite dish

service provider for information on the options available

in your area.)

If you plan on accessing the Internet by some other medium,

such as Cable modem, DSL satellite, or fiber optic, you’ll

need more sophisticated equipment. Check with your cable

company or other provider for exact specifications before

you buy anything.

Cable modem. One popular way for a computer to connect

to the Internet is through a cable modem. The TV signal to

the television and the data signals to your PC share the same

coax cable.

DSL (Digital Subscriber Line). Another common Internet

connection is through DSL, which uses the phone line for

transmission and covers a wide range of speeds.

Satellite. Unlike cable and DSL, satellite access to the

Internet is available almost everywhere and so is popular

with people who live in remote areas and for Internet access

on airplanes. You need a satellite dish mounted on your roof

to communicate with the satellite used by the ISP that offers

the satellite service.

Fiber Optic. Fiber-optic technology uses a dedicated line

(point-to-point connection) from the ISP to your residence

or office. The cables used are fiber-optic cabling.

Page 39: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 35

Self-Check 1

At the end of each section of Introduction to Hardware and Software, you’ll be asked

to pause and check your understanding of what you have just read by completing a

“Self-Check” exercise. Answering these questions will help you review what you’ve

studied so far. Please complete Self-Check 1 now.

1. Describe the sort of language used for all communications within a computer.

__________________________________________________________

__________________________________________________________

2. Hardware performs what four primary functions?

__________________________________________________________

3. Electronic hardware devices need what three things to operate?

__________________________________________________________

4. Name two input devices.

__________________________________________________________

5. What common protocol allows networks to communicate with each other?

__________________________________________________________

Check your answers against those on page 67.

Page 40: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software36

SOFTWAREAs a knowledgeable computer technician, you need to under-

stand software and how it functions within a personal

computer (PC). We’ll give you an understanding of the three

types of software and how they’re used to run a PC.

There are three different types of software required for a PC

to operate: the firmware or BIOS (basic input-output system),

the operating system (OS), and application software. In this

section, we’ll discuss all three in detail. We’ll also touch on

the software that’s needed for networking.

When a computer starts up, the firmware and operating sys-

tem work together to determine if the system is functioning

properly. After the computer starts up or boots, the operat-

ing system works with the application software and the

firmware to perform the tasks necessary to do the job. The

software has three distinct layers. The first layer contains

the BIOS and device drivers. The second layer consists of

the operating system and the third layer is the application

software.

Firmware (BIOS)The firmware program that’s resident on the system board is

called the system BIOS, or on-board BIOS. It’s located on the

system board in ROM (read-only memory) chips (Figure 21).

ROM chips have programming permanently etched into them

when they’re manufactured and can never be erased. Newer

ROM chips, called PROMs, EPROMs, and EEPROMs, allow

microcode updates. Microcode is firmware code that’s

inserted into a ROM.

Programmable read-only memory chips (PROMs) can be

updated only once using an electrical current supplied

by a machine called a PROM programmer. Electrically

programmable read-only memory chips (EPROMs) can be

updated by first shining intense ultraviolet light into a small

window on the chip. This erases the chip and allows new

code to be inserted into the chip. (The chip is then said

to be reprogrammed.) EPROMs can be used more than once.

Page 41: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 37

Electronically erasable programmable read-only memory chips

(EEPROMs) are erased using a larger voltage than the chip

requires. Flash memory, which is a form of EEPROM, can

be erased and programmed using normal PC voltages.

EEPROMs can be used multiple times but don’t last as

long as EPROMs. Also, the entire chip has to be erased

and reprogrammed. Selectively changing only sections of

microcode isn’t allowed.

Contained within system BIOS is startup BIOS, which

executes a power-on self-test (POST) that tests the system

clock, video display adapter, RAM, and other system func-

tions. Once these tests have been successfully completed,

you’ll hear a single beep, and the startup BIOS turns control

over to the operating system. The operating system (OS) is

then in charge and manages all applications and computer

operations until you power down.

Once the computer is running, the OS communicates with

and controls the hardware. It does this by either interfacing

with the hardware directly, using BIOS to communicate, or

by using software called device drivers. Device drivers are

software programs designed to interface with the hardware

FIGURE 21—SystemBIOS

Page 42: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software38

devices. Device drivers are stored on secondary storage

devices such as hard drives. They can originate from the

OS or can be provided by the manufacturer of the device for

which they are to interface. Using BIOS and device drivers

allows the OS and application software to run without the

burden of knowing how to communicate with specific hard-

ware devices.

For the CPU to process data or follow instructions, it must

store the data or instructions and know where to find them.

The CPU stores this data in RAM and can find it by assigning

an address to each location in RAM where information is

stored. These locations are called memory addresses. They’re

displayed as hexadecimal (base 16) numbers in segment/offset

form (i.e., 0011:0001).

When the computer is running the BIOS, OS, application

software, and device drivers are all operating too. When the

time comes for an output operation to begin, the application

software passes data and instructions to the OS, which then

sends it to the device driver or to the BIOS. The device driver,

managing the input device (such as the keyboard or mouse) or

BIOS, tells the application that it’s OK to send the data. The

application software gives the memory address of the data to

the OS. The OS tells the output device driver to go to that

memory address and output the contents of that location

on the designated device. The advantage of drivers is that

the application doesn’t have to send the data directly, but

only reference the address where the data resides. Therefore,

the application doesn’t need to communicate with every

specific output and input device. Communications are

handled by BIOS and the drivers.

Page 43: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 39

Operating SystemsYou’ve seen that the operating system (OS) is the software that

manages the sharing of the resources of a computer. There are

many operating systems on the market, but a computer needs

only one, matched to its hardware configuration. Generally

speaking, an OS processes system data and user input, and

responds by allocating and managing tasks and internal system

resources as a service to users and programs of the system. It

performs such basic tasks as controlling and allocating mem-

ory, prioritizing system requests, controlling input and output

devices, facilitating networking, and managing file systems.

The original OS for IBM-compatible PCs was DOS (Disk

Operating System). DOS was refined and expanded over the

years, but has been incorporated into Windows. The OS went

from having a command-line to a more user-friendly graphical

interface. Other high-end operating systems include UNIX,

Macintosh OS X, LINUX and some vestiges of OS/2.

Operating systems have been evolving over the past few

decades. Here are the core functions, as we understand

them today:

• Process management: Allocates resources to processes,

enables processes to share and exchange information,

protects the resources of each process and enables

synchronization among processes

• Input-Output management: Co-ordination and assignment

of the different output and input devices while one or

more programs are being executed

• Memory management: Allocates main memory and other

storage areas to the programs and data

• File management: Controls and tracks on various storage

devices all files that have been modified.

• Diagnostics: Monitors condition and identifies trouble

with hardware or software

• User interaction: Facilitates communication between the

computer system and the user

Page 44: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software40

• Security: Establishes and implements data security and

integrity routines

• Networking: Provides basic protocols to enable communi-

cation and data sharing

Operating systems are stored on hard drives, while application

software can be stored on a variety of secondary storage

devices such as hard drives, floppy drives (which newer

computers don’t have anymore), or optical drives (Figure 22).

Application software is stored in files called program files,

which are comprised of data or programmed instructions

and are stored under a file name that the operating system

can recognize. Each time the computer is started, the OS is

loaded into RAM so that the CPU can access it.

There are three types of user interfaces used with the operating

system; a command-driven interface, a menu-driven interface,

and an icon-driven interface. An example of a command

interface is the DOS prompt, or C prompt (C>:). From this

interface, you may input and execute DOS and allowable

system commands or run certain programs or script files,

such as autoexec.bat or regedit.exe. Menu-driven programs

allow you to choose selections or options, such as choosing

the “Format” option on the menu bar of a word processing

program. A dropdown submenu allows you to select bullets,

which then opens other menu options.

OS

BACK-UP

ON

CD-ROM

FIGURE 22—Manufacturersoften provide a CD-ROM or DVD-ROM backup of the computer’s operatingsystem. Unlike the OS,though, application soft-ware doesn’t come alreadyinstalled—you must runthe appropriate CD-ROMsor DVDs to access theseprograms.

Page 45: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 41

The icon-driven interface, or graphical user interface (GUI), is

used by most modern applications and operating systems.

The Windows desktop and accompanying icons for Microsoft

Internet Explorer or “My Documents” are good examples.

These icons are shortcuts. Selecting the My Documents icon

opens that folder or directory and the contents are displayed.

When you select the Internet Explorer icon, that program is

executed and a browser window opens.

Application SoftwareBefore delving into our discussion of software application

types and products, let’s take a minute to go over a few

considerations that apply to all applications when recom-

mending software. Some of these thoughts relate to

troubleshooting software problems as well.

• Compatibility. Will the application run with the

intended hardware and operating system?

• Cost. Does the price fit the budget?

• History of the product. Has this application been

known to be “buggy” in the past? (Bug is the common

term for a problem with a software application.)

• History of the developer/vendor. Does the vendor

have a good track record for providing quality products?

Will the vendor be around a year from now to support

the product?

• Customer support. Does the vendor provide support

vehicles for the application (user manual, support

Web site, toll-free telephone support)? If and when

the software exhibits problems, or if you’re having

trouble understanding a feature of the software, is

help available?

Knowing how to use computer software has become a necessity

for today’s workers. Computer software helps users complete

routine job tasks with greater efficiency and accuracy as well

as to solve business problems. We often refer to software

that directs a computer to perform tasks and produce infor-

mation as application software. The most popular types of

Page 46: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software42

application software help users prepare and work with a

variety of documents such as letters, memos, spreadsheets,

and database reports. One of the most useful features of cur-

rent software packages is integration. Integration is the

ability to place information that’s created in one type of

application, into a document that’s created with a different

type of application. Integration thus allows you to share

information among applications.

As a knowledgeable computer technician, you’ll have to learn

about some of the common types of application software on

the market today. You’ll discover the many tasks that appli-

cation software can help you accomplish so that you can

work more efficiently on the job. Some application software

may also be called productivity software. Microsoft Office, for

example, is called a productivity suite, but it’s also a set of

applications. What’s the difference between productivity soft-

ware and application software? The distinction is simple.

Productivity software is used in work or business as a tool.

Application software is any software that you install on a PC.

There are 11 application software categories:

• Word processing

• Spreadsheet

• Database management

• Graphics

• Communications

• Games

• Mathematical modeling

• Software development tools

• Accounting and office administration

• Desktop publishing

• Utilities

We’re going to discuss in detail, the first three types of appli-

cation software listed above (word processing, spreadsheet,

and database management) because they’re commonly used

Page 47: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 43

in business today. In fact, depending on where your travels

take you as a PC technician, you may be called upon to

know how to use one or all of these three types of software.

We’re also going to go into some detail on communications

software applications as it applies to the Internet. We’ll

briefly discuss the remaining types of software listed above,

just so that you’re familiar with them. In addition, we’ll

touch on shareware since it’s something you’ll probably

run into.

Word Processing Applications

Word processing is the act of creating written communica-

tions with a personal computer. The term denotes working

with words to produce a variety of written documents using

electronic means. With word processing software, you enter

text using a computer keyboard. The computer screen will

display the document exactly as it will appear when printed

out (Figure 23). We call this helpful feature WYSIWYG, which

stands for what you see is what you get. Word processing

has many other examples of its own vocabulary.

Word processing applications are typically used for writing let-

ters, memos, reports, and small documents. Word processing

software can help you be more creative by simplifying many

of the mechanical tasks involved in writing and editing. You

spend less energy on the mechanics of editing, which leaves

you with more time for the creative process. Good writing

requires revision; a first draft is rarely a final draft. When

you work with pencil and paper or with a typewriter, rewriting

and revising a written document can be tedious. With word

processing software, your changes are easy to make. All

of the editing work involved, such as moving paragraphs,

correcting spelling, finding appropriate synonyms, centering

a heading and changing it to all caps, etc. takes you only

several minutes to complete. As a result, word processing

software has rendered the common typewriter virtually

extinct. Popular word processors include Microsoft Word and

Corel WordPerfect.

Another impressive characteristic of today’s word processing

software packages is that they do more than just help you

record and edit text. You can now add many enhancements

Page 48: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software44

to your documents, including graphics, color, word art,

special fonts, and even audio. These enhancements give you

a whole new way to help you convey your ideas to others

more effectively, more efficiently, and with a lot of style.

Spreadsheet Applications

The spreadsheet application is most commonly used for

tabulating numbers. A spreadsheet is basically a worksheet

with columns and rows (Figure 24). The columns and rows

are in a grid in which you enter labels, values, and mathe-

matical functions. The intersection of a row and column is

called a cell. Cells contain numbers along with column head-

ings and row headings to explain what the figures mean.

Businesses have been using spreadsheets for hundreds of

years. Accountants and bookkeepers use them to keep track

of financial information. Meteorologists use them to work

with figures compiled about temperature and rainfall meas-

urements. Sales workers track monthly sales of merchandise

with them.

FIGURE 23—Typical Word Processing Screen

Page 49: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 45

Spreadsheets can be prepared manually with a pencil and

paper printed with columns and rows. This specially printed

paper used for spreadsheet preparation is called ledger

paper. Though some individuals and small businesses still

use the manual method of preparing spreadsheets, electronic

spreadsheets have many advantages over the old, labor-

intensive manual method. In an electronic spreadsheet, like

the one shown in Figure 24, complex mathematical calcula-

tions can be applied to the fields, row, and columns of the

spreadsheet. In addition, the mathematical formulas are

calculated automatically. If you change one number, the soft-

ware automatically updates the totals. You can automatically

format a spreadsheet to give it a professional look with styl-

ish fonts and colors. Electronic spreadsheets also allow you

to quickly prepare graphs based on the mathematical data.

There are many tasks that electronic spreadsheets can per-

form to help you be more productive on the job and with

your personal finances. Two examples of popular spreadsheet

applications are Microsoft Excel and Lotus 1-2-3.

FIGURE 24—Typical Spreadsheet Screen

Page 50: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software46

In today’s workplace, spreadsheet software is second only to

word processing software as a productivity tool. A variety of

professions use electronic spreadsheets. Stockbrokers use

spreadsheets to keep investor records and track the stock

market. Scientists use them to analyze data from experi-

ments. Builders use them to compare construction bids and

keep track of costs. Bankers use them to calculate loan

repayment schedules. Teachers use them to track student

progress.

Spreadsheet software can also be used to create and

maintain

• Financial statements

• Payroll records

• Loan analyses

• Sales reports

• Inventory analyses

As you can see, the applications of electronic spreadsheets

are many.

Database Applications

A database is a large collection of facts that can be com-

bined to produce information that’s used for a variety of

things. It’s like a set of index cards, an address book, a

recipe catalog, library card catalog, or any other manual

system you may have seen used to keep track of informa-

tion. State, local, and the federal governments keep giant

databases containing information about their citizens in the

form of

• Customer demographics

• Earnings data

• Income tax information

• Social Security records

• Real estate holdings and property tax liabilities

• Computer identification records

Page 51: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 47

• Legal records

• Addresses and telephone numbers

An electronic database is a computerized version of a data-

base. With an electronic database, you can search through

hundreds or thousands of records in seconds to find the

information that you need. With a manual file retrieval

system, it may take minutes to find information, or it may

take hours. With an electronic database, you can add or

update information in just a few moments and easily compile

data. With a manual database, such tasks are labor inten-

sive. Just imagine the inefficiency not only of governments,

but also of businesses, if they all maintained information on

paper documents. Paper documents require expensive physi-

cal space, costly storage equipment, and extra workers to

handle record-keeping tasks.

No one can dispute the importance of an electronic data man-

agement system to an organization. Besides organizing and

storing information, such a data management system main-

tains, sorts, retrieves, adds, deletes, and formats vast amounts

of text and numerical data into usable reports. In addition, this

data can be grouped, manipulated, and queried in a multitude

of ways. Microsoft Access and FileMaker Pro are popular appli-

cations used for database management (Figure 25).

Page 52: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software48

Word processing, spreadsheet, and database software are

sometimes packaged together, along with other ancillary

applications, and sold as what’s commonly called an office

suite or bundle. Microsoft Office and WordPerfect Office are

examples of office bundles.

Graphics Applications

Illustrations are used in everything from textbooks to coupons.

With the advent of word processing software, electronic com-

puter games, desktop publishing software, spreadsheet and

database software, Web sites, etc., the demand for being able

to create, manipulate, and edit illustrations for such uses has

exploded.

Graphics applications vary in complexity according to the

required end result. For instance, there are expensive, high-

end applications used for engineering and design work such as

AutoCAD and PTC Pro/Engineer. There are also applications to

suit creative illustrating needs, such as Adobe Illustrator, Corel

FIGURE 25—Typical Database Screen

Page 53: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 49

Draw and Microsoft Paint (Figure 26). Other graphics applica-

tions such as Adobe Photoshop and Corel Photo Pro are used

to create and edit photographs and scanned images.

Communication Applications

The growth of the Internet has spawned an immense variety

of communications applications. Prior to the Internet, special

communications programs were needed for two computers

to communicate with each other. These days, the actual PC-

to-PC communication is handled by networking software and

protocols built into the Windows operating system.

FIGURE 26—Opening Screen of Microsoft Paint

Page 54: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software50

Windows also contains the basic networking software for

accessing the Internet. One additional component is needed,

however, to make the actual connection. You can compare

the technologies that make Internet communication possible

to an appliance in your home, for example, an electric coffee

maker. It is capable of making coffee as long as it has elec-

tric power. And that power comes from the electric utility

service. In the same way, your computer is ready to commu-

nicate over the Internet as long as it is linked through a

“utility service.” This “utility service” that offers customers

access to the Internet is known as an Internet Service

Provider or ISP.

The ISP connects its customers using the appropriate data

transmission technology such as DSL, cable modem, satel-

lite, wireless or dedicated high-speed interconnects. Many

options exist in the ISP market, with companies like ATT,

Verizon, COMCAST, Qwest holding a large share of the sub-

scriber pool. In the earlier days of consumer interest in the

Internet, large ISPs dominated the market. Companies such

as AOL, Netcom, ATT Worldnet to name a few, delivered con-

nection services using special proprietary software. While

some of these companies still provide connection service,

they no longer provide or require special purpose software.

Almost all interaction with the Internet now is performed

through standard browser programs such as Internet Explorer,

Firefox, Safari, Chrome, and others.

By far, the majority of ISP customers access the Internet on

high-speed, broadband connections. The number of dial-up

customers is shrinking every month as more communities

connect to digital networks with high bandwidth capabilities.

The statistics in 2010 show that U.S. broadband usage contin-

ues to grow, with 64 percent of U.S. households subscribing

to high-speed Internet up from 51 percent two years earlier.

All ISPs aren’t the same, and it’s important that you select

one that meets your needs. You’re the only person who can

determine how you plan to use the Internet. How often will

you be online each week or month? How long will your average

session last? What Internet resources do you plan to use?

Page 55: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 51

What hours of the day or night will you need technical

support? Answering these and other similar questions should

give you a start in choosing the ISP that’s right for you.

World Wide Web (WWW). This is what people generally refer

to as the Internet. However, it’s really not the same thing as

the Internet, but rather a user-friendly system of organizing

information on the Internet for remote access. The WWW is

the host of all the world’s Web sites and Web pages. A Web

browser is required to access the WWW. Microsoft Internet

Explorer and Mozilla Firefox are both Web browsers (Figure 27).

E-mail. Person-to-person communication via e-mail has

become very popular for both businesses and individuals.

E-mail messages can contain attachments such as document

files or digital photos. Common e-mail applications include

Microsoft Outlook (and Outlook Express) and Qualcomm

Eudora.

FIGURE 27—A Webbrowser such as InternetExplorer provides a gate-way to the World WideWeb.

Page 56: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software52

FTP. Some people prefer to use an FTP (file transfer protocol) to

transfer files to others because FTP file transfers are generally

quicker and more reliable than other methods (Figure 28).

Frequently, FTP transfers are handled automatically through

the Web browser without any user interventions. Dedicated

FTP client applications (GlobalSCAPE CuteFTP, Ipswitch

WS_FTP) are available for users who deal with a large number

of file transfers.

Chat. For those who wish to type messages to someone in

real-time, a chat application is the tool to use. Chat tools are

popular with younger computer users but are beginning to

gain acceptance as a business tool. AOL Instant Message (IM)

and Yahoo Messenger are among the most widely used chat

tools.

Streaming media. Computer users can enjoy music and

video streamed to their PCs from fast Internet servers. Microsoft

Windows Media Player and RealNetworks RealPlayer are both

suitable applications.

FIGURE 28—FTP sites allow users to transfer electronic files quickly and easily.

Page 57: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 53

Other Application Software

There are probably as many different PC-based game titles

available today as there are all other software applications

combined. Computer games range from the simple card

game Solitaire, which is provided with all versions of Windows,

to complex 3-D games with intricate plots and storylines.

Mathematical modeling applications are geared towards

engineers, scientists, and other technical professionals who

regularly perform advanced technical calculations. Mathsoft

Mathcad is commonly used for mathematical modeling.

Software development tools aid in the creation and mainte-

nance of software applications. Source code editors and

compilers fall into this category. Specific applications vary

according to the programming language and platform.

Offices, small and large alike, depend on accounting and

office administration applications for everything from keeping

the books to payroll and accounts payable. Intuit Quickbooks

and Peachtree Accounting are widely used to support these

types of needs. These types of applications are also considered

to be productivity software.

Desktop publishing (DTP) applications, which are also

productivity software, are better suited to the task of creating

brochures, books, manuals, and large publications than word

processor applications. They’re excellent for fine-tuning

appearance and managing smaller chapters and sections

for compilation into a larger volume. DTP programs are

generally more expensive than word processors and often-

times lack some of the lesser-used editing functions present in

word processors. Examples of desktop publishing applications

are Adobe InDesign and Quark XPress (Figure 29).

Page 58: Study Unit-Introduction to Hardware and Software

There’s a utility to serve just about any computer-related need

imaginable. We couldn’t even begin to scratch the surface with

a discussion on utilities here. Examples of utility software

include Norton Anti-virus, DriverScanner, Winzip, and

backup software. To satisfy your curiosity, visit the following

Web sites:

http://downloads.cnet.com

http://www.tucows.com

Though it’s not considered a software application category

like the ones we’ve just discussed, we thought it would be

a good time to introduce you to shareware. The ability of

computer users to download files from the Internet has given

rise to a new vehicle for marketing software commonly known

as shareware. Shareware typically allows a user to try a soft-

ware application for a limited time or with a reduced feature

set before making the purchase. This allows the user to

Introduction to Hardware and Software54

FIGURE 29—This publication was created using Quark XPress desktop publishing software.

Page 59: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 55

determine if the application truly fits the bill and for the

software developer to reach a broader market than by tradi-

tional means. PKZip and Winzip, both archiving utilities for

handling .zip files, are examples of shareware in widespread

use today.

Networking SoftwareWe’ve discussed the hardware required for networking.

Now we’re going to discuss the software that’s required for

networking.

Just stringing cables between computers won’t produce a

functioning network. Along with the hardware, some network

software needs to be installed to tell the computers what to

do with their connections. This software serves as the operating

system for the local area network (LAN).

Network operating systems perform the following functions:

• Provide a user interface

• Give users access to applications and data files

• Give users access to system resources, such as a printer

or a disk drive

• Provide network and file security

• Resolve conflicts between users trying to access the

same file

• Manage communications between the workstations in

the LAN

• Establish user privileges and priorities

Most LANs are open systems, which means that they can

support a variety of hardware and software components often

made by different vendors. A closed system is comprised of

proprietary hardware and software from one manufacturer or

vendor. This keeps you locked into sometimes old or expen-

sive technology and doesn’t allow easy expansion with newer

devices or applications. Open systems are favored by network

manufacturers and users because they’re more flexible and

less expensive to operate. An open system can usually

Page 60: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software56

include all the existing hardware and software that a business

has already purchased and can be expanded to include

future purchases.

Please complete Self-Check 2 now.

Self-Check 2

1. How does firmware differ from a software program stored on the hard drive?

__________________________________________________________

__________________________________________________________

2. Which type of software application would include Microsoft Word?

__________________________________________________________

3. What does BIOS stand for, and what does it do?

__________________________________________________________

4. List three well-known operating systems.

__________________________________________________________

5. Give three examples of operating systems that use a GUI.

__________________________________________________________

Check your answers against those on page 67.

Page 61: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 57

HOW HARDWARE ANDSOFTWARE WORK TOGETHERIn this section, you’ll learn what happens when you first

turn on your personal computer (PC). You’ll need to under-

stand the boot, or startup, process so that you can diagnose

problems as either hardware or software related. We’ll give

you an understanding of the boot process and how it sets the

stage for a PC to operate.

The Boot ProcessIn the boot process, the BIOS checks the computer’s hard-

ware, to make sure it’s within the necessary parameters to

ensure the computer will function correctly. The operating

system then checks the system before allowing the applica-

tion software to take over control. To perform these checks,

the software uses resources to communicate with the hard-

ware, and the hardware uses resources to communicate with

the software. These system resources are memory addresses,

I/O addresses, interrupt request numbers (IRQ), and direct

memory access (DMA) channels.

The POST or Boot Screen

Today, most manufacturers of computer systems for the

home and office overlay a bitmap image of their company

logo over the POST and boot screens (see the upper screen

in Figure 30). Because of this, you won’t normally see the

information unless an error comes up during boot-up or you

press the assigned key on your keyboard that hides the logo.

For the BIOS used on the Dell PC shown in Figure 30, pressing

and releasing the Esc key when the Dell logo is displayed

switches to the POST/boot information (see the lower screen

in Figure 30). Not all computers that start with this type of

screen use the Esc key for this process. You’ll need to check

the user guide or manual that came with your PC to find out

which key will work with your PC.

Page 62: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software58

Sometimes within the CMOS settings there’s an option to

select whether to display the logo or show the boot progress

after the PC is first turned on. If your computer boots up

with the manufacturer’s logo and you can find this option

in one of your CMOS configuration screens, you can change

the setting so that the POST information screen is always

displayed during boot-up. When exiting the CMOS configura-

tion utility, make sure to select the option that indicates the

changes will be saved (i.e., Save Settings & Exit).

The Windows XP Boot Process

Windows XP is presently the most common Microsoft OS.

When Microsoft was designing Windows XP, they looked at

customer input and it showed that one of the most desired

features was a fast system boot. We’ll discuss this Fastboot

process and some other Windows XP–related boot processes

next.

FIGURE 30—Pressingand releasing the Esckey switches from thelogo to the POST/boot information.

Page 63: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 59

Microsoft wanted to really enhance XP, but enhancements

didn’t help with speeding up the boot process. To achieve

more speed, they decided to boost XP’s minimum hardware

requirements to twice the RAM of Windows 2000, and added

a quicker processor. Microsoft also wanted the OS to run

quicker than earlier versions on the same PC. So when

adding new features, designers were required to figure out

the effect new features would have on performance, and

figure out how to make up for the loss in another part of

the OS. From all this, Microsoft’s Fastboot feature was born.

Fastboot intended to make a workstation do a cold boot in

under thirty seconds, resume operation from sleep mode in

less than twenty seconds, and come up from standby in less

than five. Fastboot meant reconfiguring the entire boot pro-

cedure, deleting anything that absolutely didn’t need to be

done at that time, and finding more efficient ways to perform

only the basic functions. Fastboot addresses nine different

parts of the boot process, from new BIOS features to loading

the shell. Device drivers are stripped back to only initialize

the devices during boot up, leaving the rest as a post-boot

activity. The three items that produced the biggest improve-

ment are simultaneous processing, prefetching, and layout

optimization, which we’ll discuss next.

In previous OSs the boot process was slow because it was

a serial activity, meaning that one step had to be completed

before another step began. But a 233MHz processor with

128MB RAM, the minimum required for XP, is more than

capable of performing several functions at one time. So

Microsoft decided to run the boot functions in parallel, pro-

cessing these items simultaneously. Because the slowest

device affects the boot process the most, XP loads these

devices in parallel, including serial plug-and-play devices.

It also overlaps device startup with disk I/Os. To further

speed up the boot process, XP also performs functions such

as network startup, winlogon, and protocol binding parallel

to the boot process. This parallel processing not only speeds

up the boot process, it also makes it faster for the OS to

carry out other functions during regular operations.

Page 64: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software60

To speed up the boot, Windows XP uses two technologies:

prefetching and layout optimization. When an XP system is

booted for the first time, it saves information on all logical

disk-read operations in a prefetch file (.pf), also called a

scenario file, which is stored in the C:\Windows\prefetch

folder. The next time the computer boots, it reads that data

file and preloads these boot files into memory in parallel with

the boot process so that all the files are available the instant

they’re needed. This way, if a certain executable file requires

a set of DLLs to accompany it, those files will already be

loaded into memory.

Along with prefetching, helping to speed things up is layout

optimization, which is a process of defragmenting the boot

files and placing them together in a certain order on the disk

for quick retrieval. The XP boot loader (ntldr) caches file and

directory metadata in large pieces on the disk allowing each

system file to be read with a single I/O. This results in the

Windows XP boot loader operating four to five times faster

than in Windows 2000. Prefetching is responsible for 90

percent of these gains, whereas layout optimization gives

only a small gain of 10 percent.

Fastboot layout optimization is unique in that XP knows

exactly what files are needed for the boot process and can set

them out in the exact order needed for speedier boots. When

the boot process is finished, XP won’t waste any resources

trying to optimize beyond the boot process.

With Fastboot, the boot process is now faster and easier.

By using a streamlined procedure, parallel processing,

prefetching, and layout optimization, Windows XP meets

the challenge of speeding up the boot process.

The Windows 7/Vista Boot Process

The Windows 7/Vista boot process differs from XP in the way

the operating system is located and initialized. In a Vista envi-

ronment, the Partition Boot Record (PBR) code uses BOOTMGR

rather than NTDLR to find any operating systems located on

the disk and then to start them up. Bootmgr loads the Boot

Configuration Database (BCD), which starts Winload.exe

and this program in turn initializes the kernel. The boot

Page 65: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 61

configuration stored by Boot.ini in previous Windows versions

is now stored in the BCD. Thus, the many components of the

boot process are clearly segregated from one another. This

arrangement allows for support of other operating systems,

dual-boot capability, and makes problems with startup easier

to diagnose and repair.

Protecting Data, Software, andHardwareYou’ll need to understand how to maintain a functioning

system by protecting the data, software applications, and

hardware from damage. There’s no guarantee that a PC

will perform as expected and not have a failure. You can,

however, avoid some common causes of loss or damage by

taking a few precautions. Some of these are as follows.

Saving setup information in CMOS. The setup information

in CMOS is so important that a backup copy should be made

in case the data is lost. There are commercial PC utilities that

will back this information up. The data can be lost if the bat-

tery fails or is replaced, if there are errors on the system board,

or if the user accidently changes setup without realizing it.

Keeping OS rescue disks. An OS rescue disk will allow you

to boot the computer and start the operating system if that

valuable data is lost.

Backing up your hard drive. In most cases, the most

valuable component of a computer isn’t the hardware

or the software, it’s the data contained in it. Hard drives

do fail, so make a backup to be prepared for that possibility.

A backup is a copy of the file saved in another location or

storage media.

Saving documentation. Make sure you keep and safely

file all documentation that comes with a PC. The information

contained in the documentation can be invaluable when

troubleshooting problems with a computer. It’s also important

to keep the system recovery disks that are supplied by the

manufacturer. In proprietary systems, these CDs allow you

to restore your computer to its original condition should the

hard drive crash or some software problem corrupt the OS.

Page 66: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software62

Protecting from electricity. There are two types of electric-

ity that can damage a computer or its data. The first type is

static electricity, also known as electrostatic discharge (ESD).

Never touch the inside of a computer without wearing a

grounding wrist strap or working on a grounded pad.

The second type of electricity that can cause damage or loss

of data is voltage surges in the AC power that runs the PC.

These surges have several causes, including lightning. There

are products that can be purchased to temper or eliminate

these surges. Surge arresters, line conditioners and uninter-

ruptible power supplies (UPS) are some of the products

available. A surge arrester, or surge protector, keeps voltage

spikes in your 120 V alternating current line from damaging

your computer by grounding, or dissipating, voltage over a

certain limit (such as 200 volts). Line conditioners filter out

noise on the power lines and keep voltages within a certain

range. A UPS utilizes a battery and provides power for a

limited time when primary electricity to the computer is

lost. This starts automatically on power loss and gives you

time to save and back up files or data resident in RAM.

Practical Exercise

Observing the Boot Process Using DOS/Windows

• The goal of this exercise is to make you familiar with

the boot process for Windows XP by demonstrating the

interaction between your hardware and the startup of

the operating system.

• You’ll follow along with the sequence of steps, typing or

selecting options as instructed. The outcome of your

activities should match the description.

Page 67: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 63

• Requirements: Windows XP installed on a PC with

separate monitor, keyboard and mouse.

Sequence of steps for a successful boot process—no intervention:

Action or event Indicator Y/N?

1 Confirm PC is powered off PC power indicator light is OFF

2 Confirm Monitor has itspower Power indicator light is ON

3 Turn on the power to the PC

PC power indicator lightgoes to ON

4 Windows XP splash screendisplays Status bar shows activity

5User security logon screendisplays to check user IDand password

Select user correct usericon and enter password

6 Welcome screen displays Shows message: “Loadingpersonal settings”

7 Your desktop appears andboot process ends

Any programs in theStartup folder will load

Page 68: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software64

If your PC booted properly, you can move to the next

sequence. If not, double-check your work and repeat.

Windows 7/Vista Boot Process

Windows Vista boot-up process is slightly different from

Windows XP’s. Most of the differences take place in the

background and don’t show up on the user interface. The

user still must provide security logon id and password.

There is no splash screen as such. Rather, it is integrated

into the routine that loads the main desktop screen.

Sequence of steps for a successful boot process: with user intervention:

Action or event Indicator Y/N?

1 Confirm PC is powered off PC power indicator light is OFF

2 Confirm Monitor has itspower Power indicator light is ON

3 Turn on the power to the PC

PC power indicator lightgoes to ON

4 Immediately press the F8 key

A text screen will displayindicating that Windowsdid not start normally*

5Using arrow keys, highlight“Last known good configuration”

This is the most recentsettings for startup thatworked successfully

6 Press the Return key

Windows will run throughthe standard successfulboot process as shownabove (steps 4–7)

*

This screen displays the option “Allow Windows to start normally”.This option is running on a timer, and if you don’t select one ofthe other choices, this one will automatically run and Windows XPwill boot successfully.

Page 69: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software 65

Self-Check 3

1. Name four system resources that software uses to manage hardware.

__________________________________________________________

__________________________________________________________

2. The partition table is a map of what?

__________________________________________________________

3. What is a backup?

__________________________________________________________

4. Where can you find the option on whether to display the manufacturer’s logo or show theboot progress?

__________________________________________________________

5. The Windows 7/Vista boot process continues to rely on which file to locate and launch theoperating system?

__________________________________________________________

Check your answers against those on page 67.

Page 70: Study Unit-Introduction to Hardware and Software

Introduction to Hardware and Software66

NOTES

Page 71: Study Unit-Introduction to Hardware and Software

67

Self-Check 1

1. Binary, using the digits 0 and 1, similar to microswitches

that exist in either the “on” or “off” position

2. Input, output, processing, and storage

3. A method for the CPU to communicate with the device,

software to instruct and control the device, and electric-

ity to power the device

4. Any two of the following: mouse, keyboard, scanner,

joystick, digital camera, trackball

5. TCP/IP

Self-Check 2

1. Programs stored on firmware can’t be easily erased or

overwritten.

2. Word processing

3. BIOS stands for “basic input-output system” and is used

to manage the startup of the computer and ongoing

input and output operations of basic components such

as a floppy disk or hard drive.

4. Windows XP, Windows Vista, Windows 7, or UNIX

5. Windows XP, Windows Vista, Windows 7, or MacIntosh

OS X

Self-Check 3

1. I/O address, IRQ, memory addresses, and DMA channels

2. The hard drive of your PC

3. A copy of the file(s) saved in another location or on

storage media

4. You can find this option in one of your CMOS configuration

screens.

5. BOOTMGR

An

sw

er

sA

ns

we

rs