A+ - Computer Technician
A+ - Computer Technician
CompTIA A+
Certification
A Comprehensive
Approach for all 2006 Exam
Objectives
Student Manual
Volume 1
CompTIA® A+® Certification: A
Comprehensive Approach for all 2006
Exam Objectives
Part Number: NH85820 (CWEE)
Course Edition: 1.1
NOTICES
DISCLAIMER: While Element K Content LLC takes care to ensure the accuracy and quality of these materials, we cannot guarantee their accuracy, and all materials are
provided without any warranty whatsoever, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. The name used in the data
files for this course is that of a fictitious company. Any resemblance to current or future companies is purely coincidental. We do not believe we have used anyone’s name in
creating this course, but if we have, please notify us and we will change the name in the next revision of the course. Element K is an independent provider of integrated
training solutions for individuals, businesses, educational institutions, and government agencies. Use of screenshots, photographs of another entity’s products, or another
entity’s product name or service in this book is for editorial purposes only. No such use should be construed to imply sponsorship or endorsement of the book by, nor any
affiliation of such entity with Element K. This courseware may contain links to sites on the Internet that are owned and operated by third parties (the ″External Sites″). Element
K is not responsible for the availability of, or the content located on or through, any External Site. Please contact Element K if you have any concerns regarding such links or
External Sites.
TRADEMARK NOTICES Element K and the Element K logo are trademarks of Element K LLC and its affiliates.
Microsoft and Windows are registered trademarks of Microsoft Corporation in the U.S. and other countries. Novell and NetWare are registered trademarks of Novell, Inc. in the
U.S. and other countries. Sun, Solaris, and Sun Microsystems are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. Apple and
Macintosh are trademarks or registered trademarks of Apple Computer, Inc. in the U.S. and other countries. All other product names and services used throughout this course
may be common law or registered trademarks of their respective proprietors.
Copyright © 2007 Element K Content LLC. All rights reserved. Screenshots used for illustrative purposes are the property of the software proprietor. This publication, or any part
thereof, may not be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, storage in an information retrieval
system, or otherwise, without express written permission of Element K, 500 Canal View Boulevard, Rochester, NY 14623, (585) 240-7500, (800) 434-3466. Element K
Courseware LLC’s World Wide website is located at www.elementkcourseware.com.
This book conveys no rights in the software or other products about which it was written; all use or licensing of such software or other products is the responsibility of the user
according to terms and conditions of the owner. Do not make illegal copies of books or software. If you believe that this book, related materials, or any other Element K
materials are being reproduced or transmitted without permission, please call 1-800-478-7788.
The logo of the CompTIA Authorized Quality Curriculum (CAQC) Program and the status of this or other training material as “Authorized” under the CompTIA Authorized Quality
Curriculum Program signifies that, in CompTIA’s opinion, such training material covers the content of CompTIA’s related certification exam. CompTIA has not reviewed or
approved the accuracy of the contents of this training material and specifically disclaims any warranties of merchantability or fitness for a particular purpose. CompTIA makes no
guarantee concerning the success of persons using any such “Authorized” or other training material in order to prepare for any CompTIA certification exam.
The contents of this training material were created for the CompTIA A+ certification exam numbers 220-601, 220-602, 220-603, and 220-604, covering CompTIA certification
exam objectives that were current as of 2006.
How to Become CompTIA Certified: This training material can help you prepare for and pass a related CompTIA certification exam or exams. In order to achieve CompTIA
certification, you must register for and pass a CompTIA certification exam or exams. In order to become CompTIA certified, you must:
1. Select a certification exam provider. For more information, please visit www.comptia.org/certification/general_information/test_locations.aspx.
2. Register for and schedule a time to take the CompTIA certification exam(s) at a convenient location.
3. Read and sign the Candidate Agreement, which will be presented at the time of the exam(s). The text of the Candidate Agreement can be found at www.comptia.org/certification/general_information/
candidate_agreement.aspx.
ii
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
For more information about CompTIA’s certifications, such as its industry acceptance, benefits, or program news, please visit www.comptia.org/certification.
CompTIA is a not-for-profit Information Technology (IT) trade association. CompTIA’s certifications are designed by subject matter experts across the IT industry.
Each CompTIA certification is vendor-neutral, covers multiple technologies, and requires demonstrations of skills and knowledge widely sought after by the IT
industry. To contact CompTIA with any questions or comments, please call 1-630–678–8300 or email [email protected].
iii
Your Classroom Learning experience is just one part of the New Horizons learning solution; an enriching, dynamic
and valuable experience that includes Web-based resources during and after class.
The New Horizons learning solution includes online resources such as assessments, eCourseware and self-study
tutorials, making it the finest and most robust learning environment available.
A full electronic version of the user manual - eCourseware - is available for reference and use post-class. Updates to
the content within the eCourseware manual are automatic, providing you with access to the latest version of the
course material at all times.
To access eCourseware and other online resources for this class, visit www.newhorizons.com and select Student
Resources. New Horizons Learning Port a hosted, Web-based platform supports the delivery and management of
your post-class resources. For more information about other available learning options, contact your local New
Horizons Computer Learning Center.
(Note: Access keys are case-sensitive and must be entered exactly as displayed.)
Username:
Password:
This login provides access to class resources only. When creating your “Username” enter something unique such as adding the
letters ILT (Instructor Led Training) to the end of the name. This will set it apart from logins that you may use for other types of
online training.
CompTIA® A+®
Certification: A
Comprehensive Approach
for all 2006 Exam Objectives
VOLUME 1
Lesson 1: Personal Computer Components
A. Personal Computer Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Categories of Personal Computer Components . . . . . . . . . . . . . . . . . . 3
The System Unit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Display Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
Input Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
External Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
B. System Unit Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
The System Board . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
The Central Processing Unit (CPU) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
The System Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Power Supplies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Cooling Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Adapter Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Riser Cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
System Board Form Factors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
v
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
C. Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Floppy Disk Drives (FDD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Hard Disk Drives (HDD) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Optical Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Types of Optical Disks and Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Tape Drives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Solid State Storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
D. Personal Computer Connection Methods . . . . . . . . . . . . . . . . . . . . . . 33
Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Personal Computer Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Serial Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Parallel Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
Universal Serial Bus (USB) Connections . . . . . . . . . . . . . . . . . . . . . . . . 37
IEEE 1394 and FireWire Connections . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Small Computer Systems Interface (SCSI) Connections . . . . . . . . . . . . 39
Parallel ATA (PATA) Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Serial ATA (SATA) Connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
vi CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Contents vii
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
viii CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Contents ix
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
x CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Contents xi
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
xii CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Contents xiii
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
xiv CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
VOLUME 2
Lesson 10: Network Technologies
A. Network Concepts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 535
Network Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536
Network Interface Card Characteristics . . . . . . . . . . . . . . . . . . . . . . . . . 539
Twisted Pair Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 540
RJ-45 Twisted Pair Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541
Coaxial Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 542
Coaxial Cable and Connector Types . . . . . . . . . . . . . . . . . . . . . . . . . . . 543
Fiber Optic Cables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
Fiber Optic Connectors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545
Other Network Connection Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 547
B. Network Communications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Network Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555
Network Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
The TCP/IP Protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 556
IP Addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 557
Subnet Masks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 558
IP Address Classes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559
The IPX/SPX and NWLink Protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . 561
NetBIOS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563
NetBEUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564
Network Bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565
Full and Half Duplex Communications . . . . . . . . . . . . . . . . . . . . . . . . . . 566
Contents xv
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
xvi CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Contents xvii
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
xviii CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Contents xix
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
xx CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Contents xxi
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Solutions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 969
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1045
xxii CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
About This Course
If you are getting ready for a career as an entry-level information technology (IT) pro-
fessional or personal computer (PC) service technician, the CompTIA® A+®
Certification course is the first step in your preparation. The course will build on your
existing user-level knowledge and experience with personal computer software and
hardware to present fundamental skills and concepts that you will use on the job. In
this course, you will acquire the essential skills and information you will need to
install, upgrade, repair, configure, troubleshoot, optimize, and perform preventative
maintenance of basic personal computer hardware and operating systems.
The CompTIA® A+® Certification course can benefit you in two ways. Whether you
work or plan to work in a mobile or corporate environment where you have a high
level of face-to-face customer interaction, a remote-based environment where client
interaction, client training, operating systems and connectivity issues are emphasized,
or in an environment with limited customer interaction and an emphasis on hardware
activities, this course provides the background knowledge and skills you will require to
be successful. It can also assist you if you are preparing to take the CompTIA A+ cer-
tification examinations, 2006 objectives (exam numbers 220-601, 220-602, 220-603,
and 220-604), in order to become a CompTIA A+ Certified Professional.
Course Description
Target Student
The target student is anyone with basic computer user skills who is interested in
obtaining a job as an IT professional or PC technician. Possible job environments
include mobile or corporate settings with a high level of face-to-face client interaction,
remote-based work environments where client interaction, client training, operating
systems, and connectivity issues are emphasized, or settings with limited customer
interaction where hardware activities are emphasized. In addition, this course will help
prepare students to achieve a CompTIA A+ Certification.
Course Prerequisites
Students taking this course should have the following skills:
● End-user skills with Windows-based personal computers, including the ability to:
■ Browse and search for information on the Internet.
■ Start up, shut down, and log on to a computer and network.
■ Run programs.
xxiii
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
As a Review Tool
Any method of instruction is only as effective as the time and effort you are willing to invest
in it. In addition, some of the information that you learn in class may not be important to you
immediately, but it may become important later on. For this reason, we encourage you to
spend some time reviewing the topics and activities after the course. For additional challenge
when reviewing activities, try the “What You Do” column before looking at the “How You Do
It” column.
As a Reference
The organization and layout of the book make it easy to use as a learning tool and as an after-
class reference. You can use this book as a first source for definitions of terms, background
information on given topics, and summaries of procedures.
xxiv Introduction
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Course Icons
Icon Description
A Caution Note makes students aware of potential negative consequences of
an action, setting, or decision that are not easily known.
Notes Page indicates a page that has been left intentionally blank for stu-
dents to write on.
Certification
This course is designed to help you prepare for the following certification.
Certification Path: A+ Certification
● Exam: Essentials 220-601
● Exam: IT Technician 220-602
● Exam: Remote Technician 220-603
● Exam: Depot Technician 220-604
Course Objectives
In this course, you will install, upgrade, repair, configure, optimize, troubleshoot, and perform
preventative maintenance on basic personal computer hardware and operating systems.
You will:
● identify the components of standard desktop personal computers.
Introduction xxv
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Course Requirements
Hardware
Each student and the instructor will require one computer. The class is designed for each pair
of students to work at a student lab station that should consist of one desktop computer, one
laptop/portable computer, and one printer. If you do not have enough laptop computers to have
one per lab station, provide as many as you can and provide the remaining students with desk-
top computers. If you do not have enough physical printers to have one per lab station, provide
sufficient printers so that students can have adequate hands-on access to the printer mecha-
nisms and components. You will also need to provide other hardware items for students to
install; wherever possible provide enough components so that each lab station can install each
device. The specifications for the desktop and laptop computers, as well as a list of other hard-
ware items you will need to provide, follow.
● Desktop computers should be ATX-based systems with PCI slots. Additional bus types,
such as ISA slots, are a plus. The system should also include the following ports: parallel,
VGA, PS/2 keyboard port, PS/2 mouse port, serial, USB, and, if possible, sound ports
including Line In, Line Out, Mic, and Game. Any additional ports are a plus. Desktop
systems should have bootable CD-ROM drives and floppy drives.
● Portable computers should have a floppy drive and a CD/DVD drive (these can be
swappable in a single drive bay, or separate components); at least one PC card slot; a
mini-PCI card bay; and an empty memory slot.
● All computers should be 300 Mhz Pentium systems or higher.
● All computers should have 8 GB hard disks or larger.
xxvi Introduction
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Software
The following software is required for this course:
Introduction xxvii
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
● Windows XP Professional with appropriate licenses. This will be installed during initial
classroom setup, and students will install it again during class. Provide as many copies of
the installation CD-ROM as possible. You might also wish to provide a separate class-
room server computer, and copy the installation source files to a shared folder on the
server.
● Windows XP Home with appropriate licenses. (If you prefer, you may substitute Windows
2000 Professional.) Students will install this operating system in class, so you should pro-
vide as many copies of the installation CD-ROM as possible. You might also wish to
provide a separate classroom server computer, and copy the installation source files to a
shared folder on the server.
● Classroom Internet access. Please configure Internet access and TCP/IP settings as appro-
priate for your classroom environment.
● Windows XP Professional Service Pack 2 or later and all current security patches. The
setup instructions and classroom activities assume that you will obtain these through an
Internet connection. Otherwise, you must download all current Windows XP Professional
critical updates to installation CD-ROMs and have those available to the students to com-
plete operating system setup.
● Device drivers and software manuals for each device the students will install. You should
be able to obtain this live from the Internet during class; if not, you can download the
drivers and burn them to a CD-ROM or place them on a network share, or provide the
manufacturers’ original disks.
Class Setup
For Instructor and Student Desktop and Laptop Operating System
Installation:
1. Make sure that all computer components are properly installed and working.
2. Perform a fresh installation of Windows XP Professional. You can boot the computer from
the installation CD-ROM, or create a network boot disk and install from a network share.
After you configure the first computer of each type, you might wish to create a ghost
image and install that to the remaining classroom computers. Regardless of your installa-
tion method, use the following installation parameters:
■ Accept the license agreement.
■ Delete existing partitions.
■ Create a 6 GB NTFS C partition. When you do this, make sure that you leave at
least 2 GB of free space.
■ Select the appropriate regional settings for your location.
■ Enter the appropriate user name and organization for your environment.
■ Enter the product key.
■ For the instructor’s computer, use a computer name of INST. For each of the student
computers, use a computer name of CLIENT##, where ## is a unique two-digit num-
ber assigned to each student.
■ Set the default administrator account password to !Pass1234.
■ Configure the appropriate date and time for your location.
xxviii Introduction
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
■ Accept the Typical network settings; or, if necessary, configure Custom settings as
appropriate to support Internet access or to conform to the network configuration of
your classroom environment.
■ Install the computer into the default workgroup.
■ After the computer restarts, if prompted to turn on Automatic Updates, select Not
Right Now. Then, complete the Internet connection portion as appropriate for your
environment. If the computer will connect via a LAN connection, you should be able
to skip this portion.
■ Complete the system activation portion as appropriate for your environment. Training
centers are responsible for complying with all relevant Microsoft licensing and acti-
vation requirements.
■ On the Who Will Use This Computer screen, in the Your Name text box, enter a user
account named Admin##, where ## matches the number in the computer name. At
the instructor computer, name the account simply Admin. This account will become a
member of the local Administrators group by default.
When setup is complete, the system will automatically log you on as Admin## with a
blank password.
3. Set the Admin## account password.
a. From the Start menu, click Control Panel, click User Accounts, and then click the
Admin## account.
b. Click Create a Password.
c. Enter and confirm !Pass1234 as the password, and then click Create Password.
d. Click Yes, Make Private and close all open windows.
4. If Service Pack 2 is not slipstreamed into your Windows XP Professional installation
media, and you have a Service Pack 2 installation CD-ROM, install Service Pack 2
manually.
5. Choose Start→All Programs→Windows Update. From the Windows Update website,
download and install all High Priority updates, including any current service packs and
recommended security patches.
6. Configure workgroup networking so that all classroom computers can connect to each
other.
a. From the Start menu, open My Computer→My Network Places.
b. Click Set Up A Home Or Small Office Network.
c. In the Network Setup Wizard, click Next twice.
d. On the Select a Connection Method screen, select Other and click Next.
e. On the Other Internet Connection Methods screen, select This Computer Belongs To
A Network That Does Not Have An Internet Connection and click Next.
f. Accept the computer name by clicking Next.
g. On the Name Your Network screen, enter WORKGROUP as the workgroup name
and click Next twice.
h. If prompted, turn on File And Printer Sharing and click Next. Review the parameters
and click Next.
i. On the You’re Almost Done screen, select Just Finish The Wizard, click Next, and
then click Finish.
Introduction xxix
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
7. Use the Start→Run command or My Network Places to verify that all classroom comput-
ers can connect without entering a user name or password.
8. To install the course data files, insert the course CD-ROM and click the Data Files button.
This will install a folder named 085820Data on your C drive. This folder contains all the
data files that you will use to complete this course. It also includes several simulated
activities that can be used in lieu of the hands-on activities in the course.
9. Close all open windows and log out.
xxx Introduction
Personal Computer
1 Components
Lesson Time: 2 hour(s)
Lesson Objectives:
In this lesson, you will identify the components of standard desktop personal
computers.
You will:
● Identify the major components of personal computers.
● Identify the major components of the system unit.
● Identify the various types of storage devices used in personal computers.
● Identify personal computer connection methods.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
Before you begin to learn how to install and configure computer hardware and software, you
need to know the basic components that constitute most personal computers. In this lesson, we
will introduce you to computers by showing you some of the hardware components that make
them work.
As you prepare for a career in computer support and maintenance, a good place to start is with
some basics, such as a description of some common components, and an explanation of the
types of connections that are used to join the components together. With the proper foundation,
you’ll be ready to tackle the more complex aspects of a computer support professional’s job.
This lesson covers all or part of the following CompTIA A+ (2006) certification objectives:
● Topic A:
■ Exam 220–601 (Essentials): Objective 1.1
● Topic B:
■ Exam 220–601 (Essentials): Objective 1.1, Objective 2.1
■ Exam 220–602 (IT Technician): Objective 1.1
● Topic C:
■ Exam 220–601 (Essentials): Objective 1.1
● Topic D:
■ Exam 220–601 (Essentials): Objective 1.1, Objective 4.1, Objective 5.1
TOPIC A
Personal Computer Components
In this lesson, you will investigate many types of hardware components. The first step is to
identify the main elements that are used in virtually all computer systems. In this topic, you
will identify the major components of personal computers.
If you don’t understand the main components of a computer, it can seem like the most elabo-
rate jigsaw puzzle you have ever seen. Like most puzzles, the parts of a computer each have a
specific place they need to be, but generally, you will find that the pieces fit together almost
exactly the same way. To help you put the puzzle together, you need to understand what the
pieces look like and what they do.
System units are often referred to as boxes, main units, or base units.
Example:
Figure 1-2: A system unit, opened to show the components housed within the chassis.
Display Devices
Definition:
A display device is a personal computer component that enables users to view the text and
graphical data associated with a computer program. Display devices commonly connect to the
system unit via a cable, and they have controls to adjust the settings for the device. They vary
in size and shape, as well as the technologies used.
Common terms for various types of display devices include display, monitor, screen, CRT,
LCD, and flat-panel, to name a few.
Example:
Input Devices
Definition:
An input device is a personal computer component that enables users to enter data or instruc-
tions into a computer. The most common input devices are keyboards and computer mice.
Input devices can connect to the system unit via a cable or a wireless connection.
Example:
External Devices
A personal computer’s functionality can be enhanced by connecting different types of external
devices to the system unit. Often called peripheral devices, external devices typically provide
alternative input or output methods or additional data storage. External devices are connected
to the system unit via a cable or a wireless connection. Some have their own power source and
some draw power from the system.
There are several categories of external devices.
ACTIVITY 1-1
Identifying Personal Computer Components
Scenario:
In this activity, you will identify personal computer components.
A a. Display device
B b. External device
C c. Input device
D d. System unit
TOPIC B
System Unit Components
In the last topic, you identified the main components of personal computers, one of which is
the system unit. The system unit itself has several important sub-components. In this topic, you
will identify the major components of the system unit.
Being able to recognize a system unit is a good start, but it is not enough for a computer
technician. If you need to replace a part within a system unit, you want to be sure that you
replace the right one. The ability to identify system unit components is an integral part of the
background knowledge that every computer technician should have.
Example:
On larger or more powerful computers, there may be two or more individual CPU chips that
work together as a unit.
Example:
Memory
Definition:
Memory is the component that provides the electronic storage for the computer. Memory most
commonly refers to actual chips that typically store and retrieve information faster than tape or
hard drives can. Memory chips contain millions of transistors etched on one sliver of a
semiconductor. When a transistor conducts electricity, it represents the binary number 1. When
it does not, it represents the binary number 0.
Example:
Example:
Storage Devices
Definition:
A personal computer storage device is a component, such as a hard drive, that enables users to
save data for reuse at a later time, even after the personal computer is shut down and restarted.
Storage devices can save data magnetically, optically, or electrically, depending on the medium
on which the data is stored.
Example:
Power Supplies
Definition:
A power supply is an internal computer component that converts AC power from an electrical
outlet to the DC power needed by system components. The power supply is a metal box in the
rear of the system that is attached to the computer chassis and to the system board. While the
power supply is not itself a component of the system board, it is required in order for system
components to receive power. The power supply contains the power cord plug and a fan for
cooling, because it generates a lot of heat. Some power supplies have a voltage switch that
enables you to set the voltage to that used in different countries.
Another commonly used term for the power supply is the Power Supply Unit, or PSU.
Example:
Cooling Systems
Definition:
A cooling system is a system unit component that prevents damage to computer parts by dissi-
pating the heat generated inside a computer chassis. The cooling system can contain fans and
other devices such as a heat sink that service the entire computer as well as individual compo-
nents such as the power supply and CPU.
Example:
Although it might seem to be a good idea to remove the chassis cover to provide
additional cooling, it is not recommended. Most PC cases have been designed to
provide an airflow path, with fans positioned to keep the air moving and blow hot air
away from heat-sensitive components. The PC case must be closed for this airflow
path to work properly. If the case cover is removed, the fans will blow air around at
random. Opening the PC case also allows more dust to accumulate on internal com-
ponents, causing additional cooling problems.
Adapter Cards
Definition:
An adapter card is a printed circuit board that you install into a slot on the computer’s system
board to expand the functionality of the computer. Each card has a connector that fits into a
slot on a system board and circuitry to connect a specific device to the computer. Some
adapter cards connect to the system bus instead of a peripheral bus, use different slot types, or
are built into the system circuitry instead of being separate physical boards.
An adapter card is also known as an expansion card, add-in, add-on, or simply a board.
Example:
Riser Cards
Definition:
A riser card is a board that plugs into the system board and provides additional slots for
adapter cards. Because it rises above the system board, it enables you to connect additional
adapters to the system in an orientation that is parallel to the system board and save space
within the system case.
Example:
Daughter Boards
Daughter board is a general computing and electronics term for any circuit board that plugs
into another. For example, in personal computing, daughter board can be used as a more gen-
eral term for adapter cards. Sometimes in casual usage the term daughter board is used
interchangeably with the term riser card, but technically they are not the same.
This form factor is usually used in older tower systems. Originally, it was
designed from an even older system, the original XT motherboard, which
itself was designed for use in the second version of the IBM PC, released
in 1983. These original full-size systems took up a large amount of desk-
top space. Vertically-oriented tower systems using the AT board can stand
on the floor and not take up desktop space, and they can still use the full-
size system board. The board is 12 inches by 13.8 inches. A transfer bus
of 16-bit or better is required. It uses CMOS to retain configuration
settings. It has a 5-pin DIN keyboard connection.
Compared to AT system boards, the ATX form factor boards provide bet-
ter I/O support, lower cost, easier use, and better processor support. Some
of the features of the ATX board are:
● Power supply with a single, keyed 20-pin connector. Rather than
requiring Voltage Regulator Modules (VRMs) to reduce voltage down
from 5 volts to 3, 3v DC is available directly from the power supply.
● The CPU is closer to the cooling fan on the power supply. Also, the
cooling circulation blows air into the case instead of blowing air out of
the case.
● I/O ports are integrated into the board along with PS/2 connectors
(instead of 5-pin DIN connectors).
● You can access the entire motherboard without reaching around drives.
This was accomplished by rotating the board 90 degrees.
● This board cannot be used in Baby AT or LPX cases.
With a maximum size of 9.6 inches x 9.6 inches (244 mm x 244 mm),
microATX boards with integrated graphics are often used by system
board manufacturers as a basis for small form factor and home entertain-
ment PCs. MicroATX boards can often use the same components as ATX
system boards. There are fewer I/O ports available than in ATX systems,
so it might be necessary to use external USB hard drives, expansion
cards, CD burners, and so forth.
Slimline and low-profile cases, which are today’s typical desktop cases,
were being developed about the same time as the Baby AT motherboard
was introduced. However, these smaller cases could not use even the
Baby AT board. The LPX and Mini-LPX motherboards were developed
for these cases. A riser card is used to plug expansion cards into the
motherboard. This riser card enables the expansion cards to lie sideways,
in the same orientation as the system board. Thus, the case does not have
to be as high as the card. Another difference in this board is that it uses a
PS/2-style keyboard connector rather than the 5-pin DIN connector used
on the AT boards. Video, parallel, and two serial ports were placed at the
rear of the board in standard locations. This board is 9 inches by 11 to 13
inches. A mini-LPX board was also designed, which was 8 to 9 inches by
10 to 11 inches.
The NLX system board replaces the LPX system board. It is a small form
factor designed around the Pentium II processor. It supports advances in
memory and graphics technology such as DIMMs and AGP. It is used in
newer slimline design systems. The board is 8 to 9 inches by 10 to 13.6
inches.
Intended to be the replacement for the ATX system board form factor, the
BTX form factor was designed to alleviate some of the issues that arose
from using newer technologies (which often demand more power and
create more heat) on system boards compliant with the circa-1996 ATX
specification. BTX features include:
● Low profile: The backplane is inches lower than the ATX.
ACTIVITY 1-2
Identifying System Unit Components
Scenario:
In this activity, you will identify system unit components.
A a. Storage device
B b. Power supply
C c. System board
D d. Adapter card
A a. Memory
B b. CPU
4. True or False? There is at least one cooling system inside almost every personal
computer.
True
False
TOPIC C
Storage Devices
In the last topic, you identified the main components of the system unit. The next group of
major internal computer components are the computer storage devices. In this topic, you will
identify the various types of storage devices used in personal computers.
As a computer technician, your responsibilities are likely to include installing and maintaining
different types of internal and external computer components, including storage devices. Identi-
fying the types of storage devices found in most personal computers will help when you are
asked to work on a personal computer.
Example:
Example:
Optical Disks
Definition:
An optical disk is a personal computer storage device that stores data optically, rather than
magnetically. The removable plastic disks have a reflective coating and require an optical drive
to be read. In optical storage, data is written by either pressing or burning with a laser to cre-
ate pits (recessed areas) or lands (raised areas) in the reflective surface of the disc. A laser in
the optical drive then reads the data off the disc. Optical drives can be internal or external, and
they generally have a 5.25-inch form factor.
Example:
Optical Disk
Type Description
CD-ROM Compact Disc-Read Only Memory. Data is permanently burned onto the disk
during its manufacture.
CD-R CD-Recordable. Data can be written to the disk only once.
CD-RW CD-Rewritable. Data can be written to the disk multiple times.
DVD-ROM Digital Video Disc-Read Only Memory, or Digital Versatile Disc-Read Only
Memory. Data is permanently burned onto the disk during its manufacture.
DVD-R DVD-Recordable. Data can be written to the disk only once.
DVD+R DVD Plus Recordable. Data can be written to the disk only once.
DVD+R DL DVD Plus Recordable Double Layer. Data can be written to the disk only once.
DVD-RW DVD-Rewritable. Data can be written to the disk multiple times.
DVD+RW DVD Plus Rewritable. Data can be written to the disk multiple times.
DVD-RAM DVD-Random Access Memory. Data can be written to the disk multiple times.
Tape Drives
Definition:
A tape drive is a personal computer storage device that stores data magnetically on a tape that
is enclosed in a removable tape cartridge. Data on the tape must be read sequentially. The size
of external tape drives varies, but internal drives have a 5.25-inch form factor. Tape drives are
most commonly used to store backup copies of data.
Example:
Example:
ACTIVITY 1-3
Identifying Storage Devices
Scenario:
In this activity, you will identify storage devices.
2. Which optical drive media types enable you to write to an optical disk only once?
a) CD-ROM
b) CD-R
c) CD-RW
d) DVD-R
e) DVD-RW
TOPIC D
Personal Computer Connection Methods
You have now identified the primary components inside the system case. The next thing to do
is investigate the means by which those components, and other components, are connected
together to form a complete personal computer system. In this topic, you will identify personal
computer connection methods.
A personal computer is made up of many different components. To be able to work together
effectively to provide users with the computing power they need, these components need to be
able to communicate with each other. As personal computers have evolved over the years, dif-
ferent connection technologies have been implemented to provide communication among
computer components. As a computer technician, identifying the different connection technolo-
gies will enable you to install personal computer components quickly and effectively.
Ports
Definition:
A port is a hardware interface where you can connect devices to the computer. The port trans-
fers electronic signals between the device and the system unit. The port is either an electrically
wired socket or plug or a wireless transmission device. Ports can vary by shape, the number
and layout of the pins or connectors contained within the port, the signals the port carries, and
the port’s location. There are ports for both internal and external devices.
Example:
Genders
Ports and the cables that connect to them have genders. For example, if a computer port con-
sists of a plug, the matching cable connection will have a socket. The port in this case would
be the male connector and the cable would be the female connector.
Port Shapes
Ports can have different physical shapes such as male, female, round, rectangular, square, and
oblong. There is some standardization of physical properties and functions, though. For
example, most computers have a keyboard port (currently round, or telephone type), into
which the keyboard is connected.
PS/2 Ports
The round 6-pin ports that many keyboards and mice connect to are called PS/2 ports, after the
early IBM Personal System/2 personal computer. To avoid confusion between the identical-
looking keyboard and mouse ports, PS/2 ports are often color-coded to match the end of the
cable on the device: purple for the keyboard and green for the mouse. Or, there will be a
sticker with a picture of a mouse and keyboard near the connectors.
PS/2 ports are also called mini-DIN ports. DIN is the abbreviation for a German standards
organization. There is an older, larger DIN port with only 5 pins.
Example:
Serial Connections
Definition:
A serial connection is a personal computer connection that transfers data one bit at a time over
a single wire. Serial connections support two-way communications and are typically used for
devices such as fax machines or external modems. Serial ports have either 9-pin (DB-9) or
25-pin (DB-25) male connectors. A serial cable ends with a female connector to plug in to the
male connector on the system unit. On system units that have color-coded ports, the serial port
is teal-colored.
Example:
Serial Transmissions
In a serial transmission, data is sent and received one bit at a time over a single wire. To
accomplish this, the serial communication process:
1. Disassembles bytes into bits on the sending end of the communication.
2. Sends the bits across the communication wires.
3. Reassembles the bits into bytes at the receiving end.
Serial Ports
Serial ports are typically called COM1, COM2, COM3, and COM4, where COM is short for
communications port. In modern systems, only one or two serial ports will be present. This
port is being phased out in favor of other standards, so you might find some systems with no
serial ports at all.
Parallel Connections
Definition:
A parallel connection is a personal computer connection that transfers data eight bits at a time
over eight wires and is typically used to connect a printer to a system unit. Parallel connec-
tions in older personal computers support only one-way or unidirectional communications.
Most computers now have parallel ports that support bidirectional communications. Standard
parallel ports have 25-pin female connectors. A parallel cable has a 25-pin male connector to
plug into the system unit and a 36-pin male Centronics connector at the other end to attach to
the external device. On system units that have color-coded ports, the parallel port is burgundy
or dark pink.
Example:
Parallel Ports
A PC can have up to three parallel ports, referred to as LPT1, LPT2, and LPT3. LPT is short
for line printer.
Example:
USB Standards
USB 2.0 is the current standard. It can communicate at up to 480 Mbps. The original USB 1.1
standard is still commonly found in devices and systems. It can communicate at up to 12
Mbps. A USB 2.0 device connected to a USB 1.1 hub or port will only communicate at USB
1.1 speeds, even though it might be capable of faster speeds. Windows XP will inform you of
this when you connect the device.
Example:
FireWire Terminology
Apple Computer was the primary vendor to promote the IEEE 1394 standard, and used the
FireWire name as a trademark for the IEEE 1394 implementation included in its Macintosh
systems. FireWire has since become the common name for all IEEE 1394 devices.
Example:
You might hear PATA pronounced “Parallel ay-tee-ay,” “PEE-ay-tee-ay,” “PAY-tuh,” or “PAT-uh.”
Example:
You might hear SATA pronounced “Serial ay-tee-ay,” “ESS-ay-tee-ay,” “SAY-tuh,” or “SAT-uh.”
Although current practice is to use the terms IDE and PATA interchangeably, you should be
aware that SATA is also a type of IDE drive.
Example:
ACTIVITY 1-4
Identifying Personal Computer Connection Methods
Scenario:
In this activity, you will identify personal computer connection methods.
A a. Parallel
B b. Serial
C c. USB
Lesson 1 Follow-up
In this lesson, you have identified the components that make up most standard desktop per-
sonal computers. The ability to identify the various parts of personal computers is essential
foundational knowledge for every computer technician.
1. How many of the personal computer components described are familiar to you?
Lesson Objectives:
In this lesson, you will identify fundamental components and functions of personal
computer operating systems.
You will:
● Identify the major personal computer operating systems.
● Identify the primary components of the Windows user interface.
● Identify the primary tools and functions used in Windows file system
management.
● Identify Windows system management tools.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
In the previous lesson, you identified the hardware components of standard desktop personal
computers. The other major element of a personal computer is its operating system software.
In this lesson, you will identify the fundamental components and functions of personal com-
puter operating systems.
As a professional IT support representative or PC service technician, your job will entail
installing, upgrading, configuring, troubleshooting, and optimizing personal computer operating
systems. Before you can perform any of those important functions, you need to understand the
basics of what operating systems are, including their various versions, features, components,
and technical capabilities. With this knowledge, you can build a career in which you can pro-
vide effective support in all types of system environments.
This lesson covers all or part of the following CompTIA A+ (2006) certification objectives:
● Topic A:
■ Exam 220–601 (Essentials): Objective 3.1
■ Exam 220–603 (Remote Technician): Objective 2.1
● Topic B:
■ Exam 220–601 (Essentials): Objective 3.1, Objective 3.3
■ Exam 220–602 (IT Technician): Objective 3.1
■ Exam 220–603 (Remote Technician): Objective 2.1
● Topic C:
■ Exam 220–601 (Essentials): Objective 1.2, Objective 3.1, Objective 3.3
■ Exam 220–602 (IT Technician): Objective 3.1, Objective 5.2., Objective 6.1
■ Exam 220–603 (Remote Technician): Objective 2.1, Objective 4.2, Objective 5.2
● Topic D:
■ Exam 220–601 (Essentials): Objective 3.1, Objective 3.3
■ Exam 220–602 (IT Technician): Objective 1.3, Objective 3.1
■ Exam 220–603 (Remote Technician): Objective 1.3, Objective 2.1
TOPIC A
Personal Computer Operating Systems
In this lesson, you will identify the fundamental components and functions of personal com-
puter operating systems. The first step is to learn about the various operating systems available
today, and to identify those that are commonly used on personal computers. In this topic, you
will identify the major personal computer operating systems.
Although Microsoft® Windows® is the dominant operating system in the personal computer
market today, there are other operating systems that can run on various desktop and laptop
computers. These operating systems vary in their popularity, system requirements, and features.
As a support professional, you should be familiar with the operating systems that can be
installed on personal computers so that you can support a variety of computer environments.
Microsoft Windows
Microsoft Windows is the single most popular and widely deployed operating system on both
desktop computers and server systems in the world today. The various versions of Windows all
feature a graphical user interface, support for a wide range of applications and devices, a mini-
mum of 32-bit processing, native networking support, and a large suite of built-in applications
and accessories such as the Internet Explorer web browser. Windows currently comes pre-
installed on many personal computers sold commercially.
Version Description
Windows XP Windows XP is Microsoft’s primary operating system for
desktop and laptop computers for both home and office
use. It comes in several distinct editions.
● Windows XP Professional, the flagship Windows XP
edition, intended for office use in networked corporate
environments. It supports individual file-level security
and encryption, policy-based configuration manage-
ment, and domain as well as workgroup membership.
● Windows XP Home Edition, intended for private home
users. Windows XP Home is very similar in look and
feel to Windows XP Professional, but does not support
some of the Windows XP Professional security and
management features.
● Windows XP Media Center Edition, optimized for
media-based activities such as recording live TV, orga-
nizing and playing music, and managing digital
photographs.
● Windows XP Tablet PC edition, for tablet-type PCs.
Version Description
Windows 9x and Windows Me Prior to Windows XP, the Windows 9x group of operating
systems were Microsoft’s primary products for end-user
and home PCs. They were complete operating systems
with built-in networking, but used a different code base
and a different graphical interface design from the Win-
dows Server computers available at that time, as well as
from the later Windows XP operating system family. This
group of operating systems is no longer supported.
● Windows 95 was Microsoft’s first release of a com-
plete desktop operating system, as opposed to a
system shell for lower-level system software. It was
the first to provide a graphical interface based around
the Start menu and taskbar.
● Windows 98 was a popular and widely adopted ver-
sion within the Windows 9x product line. It was also
released as Windows 98 SE (Service Edition).
● Windows Me (Millennium Edition) was the final
release in the Windows 9x code base family. It was
released in 2000.
Windows NT versions There were several prior versions of Windows Server
software, all released under the Windows NT (aka New
Technology) brand. As a group, they employed the Win-
dows 3.1 graphical interface and implemented network
domain configurations on a proprietary Microsoft model.
● Windows NT 3.1 Advanced Server and its client ver-
sion, Windows NT 3.1, were the first 32-bit versions
of Windows. They were released in 1993.
● Windows NT 3.5x and its client version, Windows NT
Workstation 3.5x, were the first Windows versions
considered to be robust enough for enterprise network
support. They were released in 1995.
● Windows NT 4.0 and its client version, Windows NT
Workstation 4.0, were the first versions to use TCP/IP
as the preferred protocol. They were released in 1996.
Version Description
Older Windows desktop operating systems The first Windows desktop operating systems were
“shell” programs that ran on top of the underlying DOS
command-line-based operating system. They extended
DOS by providing a graphical interface, extended
memory support, mouse support, and the ability to have
multiple programs open at once.
● Windows 1.0 (released in 1985), Windows 2.0
(released in 1987), Windows/286, and Windows/386
were earlier releases but were not that popular.
● Windows 3.0 was the first commercially successful
version of Windows. It was released in 1990.
● Windows 3.1 was the primary end-user desktop ver-
sion of Windows until the advent of Windows 95. It
was released in 1992.
● Windows for Workgroups was an extension of Win-
dows 3.1 that incorporated workgroup networking
support using the NetBEUI protocol. It was released in
1992.
Microsoft is always developing new versions of both its desktop and server editions of
Windows. The company released Windows Vista for the desktop in early 2007. It also plans a
new version of Windows Server, code-named “Longhorn,” for server systems. For more infor-
mation, see http://www.microsoft.com/windowsvista/default.aspx and http://
www.microsoft.com/windowsserver/longhorn/default.mspx.
DOS, short for Disk Operating System, was the major operating system for the majority of
IBM-style personal computers until the release of Windows 95. DOS supported only 1 MB of
memory without additional software enhancements, and did not support running multiple pro-
grams simultaneously. Windows has maintained support for running legacy DOS programs
and provides a command-line interface at which you can issue standard DOS commands.
UNIX
UNIX® is a trademark for a family of operating systems originally developed at Bell Laborato-
ries beginning in the late 1960s. All UNIX systems share a kernel/shell architecture, with the
kernel providing the core functionality and the interchangeable shells providing the user
interface. Unlike many operating systems, UNIX is portable to different hardware platforms;
versions of UNIX can run on everything from personal computers to mainframes and on many
types of computer processors. UNIX also incorporates built-in multitasking, multiuser support,
networking functions, and a robust platform for software development.
UNIX Versions
Many different companies and organizations have licensed the UNIX name and technology,
and marketed their own UNIX versions, leading to a proliferation of different UNIX families,
system names, and interfaces. Different hardware manufacturers tend to favor particular ver-
sions, or “flavors,” of UNIX. The following table lists some of the most important UNIX
categories you will encounter.
Linux
Linux® is an open-standards UNIX derivative originally developed and released by a Finnish
computer science student named Linus Torvalds. The Linux source code was posted publicly
on a computing newsgroup, and the code was developed and tested cooperatively all over the
world. Because the source code is open, it can be downloaded, modified, and installed freely.
However, many organizations prefer to purchase and implement a Linux distribution, which is
a complete Linux implementation, including kernel, shell, applications, utilities, and installation
media, that is packaged, distributed, and supported by a software vendor.
Linux is usually pronounced “LINN-ux.” It is a combination of Linus Torvalds’s first name (pro-
nounced LEEN-us TOUR-valds in Swedish) and UNIX.
The official symbol of the Linux operating system is “Tux” the penguin, which serves as a mas-
cot for the Linux community and as a Linux logo. For information about the Linux penguin, see
www.linux.org/info/logos.html.
Vendor Description
® ®
Red Hat Linux A popular USA distribution designed to be easy for new users to install
and use.
SuSE® A popular European distribution, now owned by Novell.
® ®
Mandriva Linux A Red Hat variant optimized for Pentium processors. Formerly known
as Mandrake Linux.
Debian® A free distribution assembled by volunteers that contains many utilities
and supports many hardware platforms.
Gentoo® A source-code distribution designed for professional developers and
computer hobbyists.
SuSE is properly pronounced ZOO-zuh, but is often pronounced to rhyme with Suzie.
Mac OS Versions
There have been several versions of the Macintosh operating system.
Version Description
® ™
Mac OS X Tiger A version of the Mac OS operating system that can run on both Intel
and PowerPC processors. It features various enhancements to OS X,
including Spotlight™ search technology.
Mac OS X The first Mac operating system to be developed as a UNIX derivative.
It is based on an open-source UNIX implementation called Darwin and
features a user interface called Expose.
Prior Mac OS ver- Older versions of the Macintosh operating system were based on a
sions proprietary system architecture and utilized the proprietary AppleTalk®
file and print services and LocalTalk® network topology. Security was
based on user roles, including administrative user accounts, normal
user accounts, limited user accounts, and panel user accounts.
The next release of the Mac OS X operating system will be named Mac OS X
Leopard. For more information on Leopard, see http://www.apple.com/macosx/
leopard/.
ACTIVITY 2-1
Discussing Operating Systems
Scenario:
In this activity, you will discuss various personal computer operating systems.
4. Mac OS X can:
a) Be downloaded and modified freely.
b) Integrate browsing for files created in other operating systems.
c) Support many hardware devices.
d) Run the Windows XP user interface.
TOPIC B
Windows User Interface Components
In the previous topic, you identified the major personal computer operating systems and
learned that Microsoft Windows is the most common of those operating systems in use today.
Your next step in preparing to support the Microsoft Windows operating system is to identify
the elements of Windows that users interact with most often. In this topic, you will identify the
primary components of the Windows user interface.
The Windows user interface is the starting point for interacting with the Windows operating
system for systems professionals and end users alike. As a professional support technician,
you’ll need to understand the user interface both so that you can utilize it to interact with Win-
dows efficiently in your own work, and so that you can help users who want to understand the
system and use it effectively.
The Taskbar
The taskbar is located at the bottom of the Windows XP screen. It contains:
● The Start button.
● The optional Quick Launch toolbar, which provides one-click access to frequently used
programs.
● Buttons for any open programs.
● And, the notification area, which includes the clock icon plus icons for various system
tools. You can access the properties of these programs by clicking or right-clicking the
icons.
The notification area of the taskbar is also called the System Tray.
In Windows XP, users can modify the contents of white areas of the Start menu. The system
controls the contents of the blue areas of the Start menu.
If you prefer the Windows 2000-style arrangement of the Start menu, Windows XP offers a
similar configuration, called the Classic Start Menu. To use the Classic Start Menu in Windows
XP, right-click the taskbar and choose Properties. Click the Start Menu tab, select Classic Start
Menu, and then click OK.
ACTIVITY 2-2
Examining the Taskbar and Start Menu
Scenario:
In this activity, you will examine the Windows XP taskbar and Start menu.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
3. Identify the areas of the taskbar. a. Buttons on the taskbar enable you to
access running programs and open
documents. To minimize Notepad, click
the Notepad button on the taskbar.
4. Examine the Start menu and a. Right-click an open area of the taskbar
taskbar configuration settings. and choose Properties.
Windows Explorer
Windows Explorer is a graphical tool that enables users to manage files and folders on a com-
puter, including the contents of hard disks, floppy drives, CD and DVD drives, and any other
storage devices attached to the computer. The left side of Windows Explorer holds the
Explorer bar, which by default displays the folder hierarchy; the right pane displays the con-
tents of the selected item.
You can run Windows Explorer in Windows 2000 and Windows XP from the Accessories
group on the Start menu.
You can also open Windows Explorer by right-clicking an object and choosing Explore. Win-
dows Explorer will open with the object you right-clicked selected in the folder hierarchy. For
example, if you right-click the Start menu and choose Explore, Windows Explorer opens and
displays the contents of the Start Menu folder on the disk.
You can choose to display other contents in the Explorer Bar. In Windows Explorer, choose
View→Explorer Bar and then choose Search, Favorites, History, Research, or Folders.
My Computer
Like Windows Explorer, My Computer is used to manage files and folders on a computer and
on any storage devices attached to the computer. My Computer is simply a single-pane view of
Windows Explorer, with a context-sensitive Task Pane on the left instead of the Explorer Bar.
The Task Pane contains links to common tasks and resources that relate to the selected item.
My Computer can be available as an icon on the Windows desktop and also from the Start
menu in Windows XP.
You can switch at any time between the My Computer single-pane view and the Windows
Explorer two-pane view by turning the Explorer Bar on or off. To turn the Explorer Bar off,
choose View→Explorer Bar and then click whichever Explorer Bar view has a check mark by
it.
You can configure options for how you view and interact with My Computer or Windows
Explorer windows by choosing Tools→Folder Options.
Each user’s profile can be found on the disk in the path C:\Documents and Settings\user
name. The My Documents folder is a subfolder within each user’s profile folder.
ACTIVITY 2-3
Examining Folder Management Tools
Scenario:
In this activity, you will examine the My Documents folder and other contents of My Com-
puter and Windows Explorer.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
Control Panel is available from the Start menu, and as a link in various My Computer views.
Utility Use To
Add Hardware Install or remove hardware devices from the
computer.
Utility Use To
User Accounts Manage local user accounts on Windows XP.
In Windows XP, by default, the Control Panel utilities are grouped together in related catego-
ries, such as Performance and Maintenance. You can display the utilities as a list by clicking
Switch To Classic View in the Task Pane of Control Panel. To switch back to the default, click
Switch To Category View.
The names of the Control Panel utilities vary slightly between Windows 2000 and Windows
XP. For example, Windows XP has a utility called Add Hardware; the corresponding utility in
Windows 2000 is called Add/Remove Hardware. Some third-party or computer manufacturer’s
utilities might also add their own icons to Control Panel.
ACTIVITY 2-4
Exploring the Control Panel
Scenario:
In this activity, you will explore the components of the Control Panel.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. Change the Control Panel view. a. In the Task Pane, click Switch To Clas-
sic View.
Because you can run DOS-type commands at the Command Prompt, it is sometimes casually
called the “DOS prompt.”
Command Interpreters
Windows provides two different command interpreters. The typical Command Prompt interface
is the Windows XP command interpreter. To access the Command Prompt interface, you can
either run cmd.exe or choose the Command Prompt item from the Accessories menu. Win-
dows XP also includes the DOS command interpreter, command.com, to support running
DOS-based applications with an MS-DOS subsystem.
ACTIVITY 2-5
Running the Command Prompt
Scenario:
In this activity, you will run the Command Prompt interface and enter basic commands.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
My Network Places
My Network Places is a view of My Computer that enables you to connect to other computers
and to manage files and folders elsewhere on the network. You can use My Network Places to:
● Display or add shortcuts to network locations or network service providers.
● View and connect to other computers on the network.
● Manage files and folders on a remote computer.
● View the network connections on your local system.
● And, transfer files and folders between your computer and a remote computer.
You must have the necessary permissions and access rights to connect to another computer
and manage files and folders on that computer.
Windows will automatically create Network Places for you as you access various resources on
your local network. You can use the Add A Network Place wizard to create Network Places
manually for network resources you expect to access often.
ACTIVITY 2-6
Exploring My Network Places
Scenario:
In this activity, you will explore the My Network Places interface.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. Examine the Add A Network Place a. In the Task Pane, click Add A Network
function. Place.
b. Click Next.
f. Click Cancel.
TOPIC C
Windows File System Management
In the previous topic, you identified the primary components of the Windows user interface.
Another important Windows system component that users frequently access is the file system.
In this topic, you will identify the primary tools and functions used in Windows file system
management.
File and folder management is important in users’ daily work, because all user data documents
are stored on the disk as files. It is also important in system support tasks, as all the compo-
nents of the operating system and its utilities are also stored as files on the disk. For both of
these reasons, you as a support professional will need an understanding of the Windows file
system and its structure, as well as the skills to manage Windows files and folders properly
and efficiently.
In Windows, the maximum depth of a folder structure is restricted by the 255-character limit in
the overall file path, including the character representing the drive and any file name and
extension. Otherwise, there is no set limit on the length of a particular file or folder name.
Example:
File Extensions
Standard file extensions following the names of files can indicate whether a particular file is a
system, program, or data file. If it is a data file, the extension can indicate the category of
application that might be used to edit the file. Many common file extensions are three charac-
ters long, although there is no longer a strict character limit for the file name or extension in
most modern operating systems. A period separates the extension from the file name itself.
By default, the folder view options in My Computer and Windows Explorer are set so that
common file extensions do not display. You can display the extensions by unchecking Hide
Extensions For Known File Types on the View page in the Folder Options dialog box.
ACTIVITY 2-7
Viewing File Extensions
Scenario:
In this activity, you will view the file extensions of default files on your Windows system.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
3. Examine the file extensions. a. The first few files in the window have a
number of different extensions. To see all
the files in a list, choose View→List.
4. Match the Windows file name with its file type, based on its extension.
Notepad.exe a. Configuration settings.
Setuplog.txt b. A graphics file.
Coffee Bean.bmp c. An application file.
System.ini d. A document containing text but no
formatting.
Twain.dll e. A file that contains supporting func-
tionality for applications.
File Attributes
There are several standard attributes you can set or clear on files and folders on Windows
systems.
ACTIVITY 2-8
Exploring File Attributes
Setup:
The C:\Windows folder is open in My Computer. There is a C:\LocalData folder on the
system.
Scenario:
In this activity, you will explore the attribute settings on a data file.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. View the basic attributes of a text a. In the Windows Explorer window, with the
file. New Text Document.txt file selected,
choose File→Properties.
Permissions
Definition:
Permissions are security settings that control access to individual objects, such as files or
folders. Permissions determine which specific actions users can perform on a given object. You
assign permissions by modifying an object’s properties.
Example:
Special Permissions
Each of the standard NTFS permissions is made up of several more granular permissions
called special permissions. Standard permissions are the most frequently assigned groups of
permissions; special permissions provide you with a finer degree of control.
For example, the standard Read permission is made up of the following special permissions:
● List Folder/Read Data
● Read Attributes
● Read Extended Attributes
● Read Permissions
Permissions you assign to a folder are inherited by files and folders within that folder. It is gen-
erally most efficient to group similar files together in a folder and assign permissions to the
folder rather than to the individual files. Inherited permissions are indicated by gray check
marks in the file or folder’s Security properties.
Shares
Definition:
A share is any network resource that is available to other computer users on the network.
Typical shares include folders, printers, and drives. Because shares enable users to access a
computer system from a remote location, you should secure all shared resources against unau-
thorized access.
Example:
For more information about file sharing in Mac OS X, including information on how to make
other folders public, share files with remote users on the Internet, and share with computers
running different operating systems, see the technical document “Mac OS X: About File Shar-
ing” on the Apple Computer website at http://docs.info.apple.com/article.html?artnum=
106461.
ACTIVITY 2-9
Exploring NTFS Permissions
Setup:
The C:\LocalData folder is open in a My Computer window.
Scenario:
In this activity, you will examine NTFS file and folder permissions.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
6. How were the permissions on the LocalData folder different from the permissions on
the C drive?
a) Administrators did not have Full Control to the LocalData folder.
b) Users could not read files in the LocalData folder.
c) The permissions on the C drive were set explicitly; the permissions on the LocalData
folder were inherited from the C drive.
d) The available permissions were different.
8. True or False? The permissions on the New Text Document.txt file were inherited
from the LocalData folder permissions.
True
False
TOPIC D
Windows System Management Tools
In the previous topic, you identified the primary tools and functions used in Windows file sys-
tem management. As a final step in understanding the structure and function of the operating
system, you should examine some of the key utilities used for general Windows system
management. In this topic, you will identify some of the important Windows system manage-
ment tools.
You should have a good understanding of the tools involved in managing files and folders on a
Windows system. Sometimes, however, supporting a Windows system goes beyond file man-
agement to more general, comprehensive system management tasks. In addition to your file-
management skills, you should also be familiar the most basic Windows system management
tools and understand how they reflect the underlying structure of Windows itself.
ACTIVITY 2-10
Examining Computer Management
Scenario:
In this activity, you will explore the Computer Management utility.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. Examine the System Tools. a. To view the categories of log files Win-
dows maintains, select Event Viewer.
d. Click Cancel.
The Registry
The registry is the central configuration database where Windows stores and retrieves startup
settings, hardware and software configuration information, and information for local user
accounts. Logically, the registry is divided into five sections called subtrees; each subtree is
further subdivided into keys that contain individual data items called value entries. The registry
is stored on the disk as a group of files.
Registry Files
The registry consists of five files stored in the \Windows\System32\Config folder: Default,
SAM, Security, Software, and System. Plus, there is a registry file named Ntuser.dat, which is
unique for each user who logs on to the computer. This file is stored in each user’s profile
folder.
Registry Subtrees
The registry consists of five subtrees, sometimes also called “hives.” Some of the subtrees are
temporary pointers to information stored permanently in another registry location. The follow-
ing table lists and describes the subtrees.
Subtree Contains
HKEY_CLASSES_ROOT All the file association information. Windows uses this information
to determine which application it should open whenever you
double-click a file with a specific extension. For example, Win-
dows automatically opens Notepad whenever you double-click a
file with the extension .txt.
HKEY_CURRENT_ The user-specific configuration information for the user currently
USER logged on to the computer. For example, information about the
user’s selected color scheme and wallpaper is stored in this subtree.
HKEY_LOCAL_ All the configuration information for the computer’s hardware. For
MACHINE example, this subtree contains information about any modems
installed in the computer, any defined hardware profiles, and the
networking configuration.
HKEY_USERS User-specific configuration information for all users who have ever
logged on at the computer.
HKEY_CURRENT_ Information about the current configuration of the computer’s
CONFIG hardware. Because Windows supports Plug and Play, the configura-
tion of the hardware can vary even while the computer is running.
ACTIVITY 2-11
Examining the Structure of the Registry
Scenario:
In this activity, you will examine the structure of the Windows registry.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. Examine trees, keys, and value a. Click the plus sign to expand HKEY_
entries. CURRENT_USER.
Do not make any changes to b. This tree contains all the settings that
Registry settings. related to the currently-logged-on user.
Expand the Control Panel key.
Lesson 2 Follow-up
In this lesson, you have identified the fundamental components and functions of personal com-
puter operating systems. Understanding the basics of what operating systems are, including
their various versions, features, components, and technical capabilities is knowledge you can
use to build a successful career as an IT support representative or PC service technician, inter-
act confidently with other professionals, and perform your job duties properly and efficiently.
1. What operating systems do you have personal experience with? What operating sys-
tems would you like to learn more about, and why?
2. Which of the Windows system components and tools discussed in this lesson were
familiar to you? Which ones were new?
Lesson Objectives:
In this lesson, you will identify best practices followed by professional personal com-
puter technicians.
You will:
● Identify common hardware and software tools used by professional personal com-
puter technicians.
● Identify the best practices for PC technicians to follow to promote electrical
safety.
● Identify the best practices for PC technicians to follow to promote environmental
safety and proper handling of materials.
● Identify and apply the general preventative maintenance best practices that PC
technicians should employ.
● Identify the general diagnostics and troubleshooting best practices that PC techni-
cians should employ.
● Identify best practices for PC technicians to use to communicate appropriately
with clients and colleagues and conduct business in a professional manner.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
In the previous lessons, you gained fundamental knowledge about personal computer compo-
nents and operating systems. The foundational knowledge that every personal computer
technician needs also includes a working knowledge of tools, safety and environmental precau-
tions, general preventative maintenance techniques, and basic diagnostic and troubleshooting
techniques. In this lesson, you will identify best practices followed by personal computer
technicians.
As an A+ technician, you’ll be asked to install, configure, maintain, and correct problems with
a variety of PC components. To work with each of these components without damaging it or
causing yourself or others physical injury, you’ll need the appropriate tools—hardware, soft-
ware, and a plan to get the job done quickly, safely, and correctly.
This lesson covers all or part of the following CompTIA A+ (2006) certification objectives:
● Topic A:
■ Exam 220–601 (Essentials): Objective 1.1, Objective 1.3, Objective 7.1
■ Exam 220–602 (IT Technician): Objective 1.2
■ Exam 220–604 (Depot Technician): Objective 1.1, Objective 1.2
● Topic B:
■ Exam 220–601 (Essentials): Objective 7.2
■ Exam 220–602 (IT Technician): Objective 1.2, Objective 7.1
■ Exam 220–604 (Depot Technician): Objective 5.1
● Topic C:
■ Exam 220–601 (Essentials): Objective 1.4, Objective 7.1, Objective 7.3
■ Exam 220–602 (IT Technician): Objective 7.1
■ Exam 220–604 (Depot Technician): Objective 1.2, Objective 5.1
● Topic D:
■ Exam 220–601 (Essentials): Objective 1.4, Objective 2.4, and Objective 7.1
■ Exam 220–602 (IT Technician): Objective 1.2, Objective 1.3
■ Exam 220–603 (Remote Technician): Objective 1.3
■ Exam 220–604 (Depot Technician): Objective 1.2, Objective 1.3
● Topic E:
■ Exam 220–601 (Essentials): Objective 1.3, Objective 3.3, Objective 4.3
■ Exam 220–602 (IT Technician): Objective 1.2
■ Exam 220–603 (Remote Technician): Objective 1.2
■ Exam 220–604 (Depot Technician): Objective 1.2
● Topic F:
■ Exam 220–601 (Essentials): Objective 1.3, Objective 8.1, Objective 8.2
■ Exam 220–602 (IT Technician): Objective 1.2, Objective 8.1, Objective 8.2
■ Exam 220–603 (Remote Technician): Objective 6.1, Objective 6.2
TOPIC A
Tools of the Trade
In the last lesson, you learned the basics of operating systems. Knowing what tools are
required for certain activities is another important part of an A+ technician’s knowledge base.
In this topic, you will identify common hardware and software tools used by professional per-
sonal computer technicians.
Having the right tool will save you time, trouble, and expense, but you won’t usually know
what you need until you get to the site. A good collection of software and hardware tools (kept
ready to use) will make your life much easier. In this topic, you’ll learn what tools you should
assemble in toolkits for specific types of jobs.
Multimeters
Definition:
A multimeter is an electronic instrument used to measure voltage, current, and resistance. It
usually has two wires, one red and one black, that are plugged into two sockets on the meter.
The socket you use might depend on what you want to measure. Digital meters have a screen
that displays the numeric value of what you are measuring. Analog meters have a thin needle
that swings in an arc and indicates the value of what you are measuring.
Use a digital multimeter whenever possible. It is much more difficult to read and interpret an
analog multimeter accurately.
Example:
Loopback Plugs
Definition:
A loopback plug is a special connector used for diagnosing transmission problems that redi-
rects electrical signals back to the transmitting system. It plugs into a port and crosses over the
transmit line to the receive line. Loopback plugs are commonly used to test Ethernet NICs.
Example:
● Tweezers
● Nut driver
● Three-prong retriever
Basic toolkits can also include:
● Additional sizes of drivers and screwdrivers
● Ratchets
● Allen wrenches
● Cotton swabs
● Batteries
● Flashlight
● Mini vacuum
● Pen knife
● Clamp
● Chip extractor
● Chip inserter
● Multimeter
● Soldering iron and related supplies
● Spare parts container
● Pen and/or pencil
● Notepaper or sticky notes
● Curved forceps
● Digital multimeter
Circuit board Usually circuit boards are replaced, not repaired. However, sometimes an
obviously loose connection can be fixed or a jack with a broken pin can
be replaced.
A circuit board toolkit typically includes:
● 30w ceramic soldering iron
● Desoldering braid
● Desoldering pump
● Solder iron stand with sponge
● Solder
● Miniature pliers and wire cutters
● Heat sink
Example:
Firmware
Definition:
Firmware is software stored in memory chips that retains data whether or not power to the
computer is on. It is most often written on an electronically reprogrammable chip so it can be
updated with a special program to fix any errors that might be discovered after a computer is
purchased, or to support updated hardware components.
Example:
Example:
Figure 3-6: The system BIOS resides on a Read Only Memory chip, and sets the
computer’s configuration and environment at startup.
BIOS or Computer
Manufacturer Key Combination for Accessing System Settings
Acer F1, F2, or Ctrl+Alt+Esc
ALR F2 or Ctrl+Alt+Esc
AMD F1
AMI Delete
BIOS or Computer
Manufacturer Key Combination for Accessing System Settings
ARI Ctrl+Alt+Esc or Ctrl+Alt+Delete
AST Ctrl+Alt+Esc or Ctrl+Alt+Delete
Award Delete or Ctrl+Alt+Esc
Compaq F10 or F12
CompUSA Delete
Cybermax Esc
Dell Varies according to model. Common keys are F1, F2, F3, F12,
Delete
DTK Esc
Gateway F1 or F2
HP F1 or F2
IBM F1, F2, Delete, or Ctrl+Alt+Insert after Ctrl+Alt+Delete
Micron F1, F2, or Delete
Packard Bell F1, F2, or Delete
Phoenix Ctrl+Alt+Esc, Ctrl+Alt+S, or Ctrl+Alt+Insert
Sony VAIO F2 or F3
Tiger Delete
Toshiba Esc or F1
CMOS RAM
Definition:
Complementary Metal Oxide Semiconductor RAM (CMOS RAM) is special memory that has its
own battery to help it keep track of its data even when the power is turned off. CMOS RAM
stores information about the computer setup that the system BIOS refers to each time the com-
puter starts. Because you can write new information to CMOS RAM, you can store
information about system changes, such as new disk drives that you add to your system. The
computer will look for the drive each time it is turned on.
Example:
Figure 3-7: CMOS RAM holds system information used by the system BIOS during
startup.
CMOS Settings
Prior to the use of CMOS, system settings were configured with jumpers and switches. CMOS
was introduced with the AT system boards. Newer computers have CMOSs that allow for more
configuration options than the switches and jumpers—or even earlier CMOSs—did, primarily
because they use an extended CMOS memory area called the Extended System Configuration
Data (ESCD) to hold information about specific hardware devices. Any time you change a
hardware component, you should check the CMOS settings to see if they also need to be
changed for the system BIOS to recognize the new hardware. Also, you can configure CMOS
without needing to open the chassis. The extent to which you can use CMOS to configure a
computer depends heavily on the manufacturer of the particular CMOS; however, in most
cases, you should be able to configure at least the following—and possibly much more—from
the keyboard by using the CMOS Setup program.
Setting Description
System date and You can use the CMOS Setup program to set the PC’s real-time clock.
time (Using DOS date and time commands won’t reset the real-time clock, but
setting the clock in Windows will.)
Password You can specify whether a password is required during system startup.
Boot sequence You can specify the order that drives are checked for the operating system.
Memory Some systems require you to specify in CMOS how much RAM is installed
on the system. You might also be able to specify the type of memory used.
Hard disk drive You can specify the type and size of the hard disk drives attached to the
system.
Floppy disk You can adjust the speed and density settings for the floppy disk drive. You
drive can also disable or enable a floppy disk drive.
Setting Description
Display You can specify the monitor type.
Parallel ports You can specify settings such as unidirectional or bidirectional printing,
Extended Capabilities Port (ECP) options, and Enhanced Parallel Port (EPP)
options. You can also disable or enable a parallel port. If you know that a
parallel or serial port will not be used, you can disable the port, thereby
freeing up the resources that would otherwise be unusable by other devices.
Conversely, if you connect a device to a port and the device won’t work at
all, you might want to check the CMOS to ensure that the port hasn’t been
disabled.
Serial/COM You can specify settings such as what memory addresses and interrupts are
ports used by a port. You can also disable or enable a serial port.
Power manage- In most modern computers, you can specify settings such as powering down
ment components (like the monitor, video card, and hard drives) when the compo-
nents haven’t been used for a specified time period, as well as options and
time limits for standby and suspend modes. You can also disable or enable
global power management.
The POST process can vary a great deal from manufacturer to manufacturer.
ACTIVITY 3-1
Identifying Hardware and Software Tools
Scenario:
In this activity, you will identify hardware and software tools commonly used by PC
technicians.
1. You’ve been asked to repair a system board in a customer’s PC. Which set of tools
would be best suited for the task?
a) Phillips screwdriver (#0), torx driver (size T15), tweezers, and a three-prong
retriever.
b) 30w ceramic solder iron, miniature pliers, wire cutters, and a solder iron stand with
sponge.
c) Wire strippers, precision wire cutters, digital multimeter, and cable crimper with dies.
d) Chip extractor, chip inserter, rachet, and allen wrench.
e) Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs.
2. You’ve been asked to correct a network cabling problem at a customer site. Which
set of tools would be best suited for the task?
a) Phillips screwdriver (#0), torx driver (size T15), tweezers, and a three-prong
retriever.
b) 30w ceramic solder iron, miniature pliers, wire cutters, and a solder iron stand with
sponge.
c) Wire strippers, precision wire cutters, digital multimeter, and cable crimper with dies.
d) Chip extractor, chip inserter, rachet, and allen wrench.
e) Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs.
3. You suspect that contaminants from the environment have prevented the fan on a
PC from working optimally. Which set of tools would be best suited to fix the prob-
lem?
a) Phillips screwdriver (#0), torx driver (size T15), tweezers, and a three-prong
retriever.
b) 30w ceramic solder iron, miniature pliers, wire cutters, and a solder iron stand with
sponge.
c) Wire strippers, precision wire cutters, digital multimeter, and cable crimper with dies.
d) Chip extractor, chip inserter, rachet, and allen wrench.
e) Anti-static cleaning wipes, anti-static wrist band, flashlight, and cotton swabs.
4. What device has a thin needle that swings in an arc and points to a number that
indicates the value of what you are measuring?
a) Analog multimeter
b) Digital multimeter
c) Loopback plug
7. True or False? Windows includes software diagnostic tests that help you find and
correct hardware problems.
True
False
TOPIC B
Electrical Safety
In the last topic, you identified hardware tools used by personal computer technicians. Some of
these tools are used to promote electrical safety. In this topic, you will identify the best prac-
tices for personal computer technicians to follow to promote electrical safety.
The most prevalent physical hazards that computer technicians face are electrical hazards.
Although it is necessary to run a computer, electricity can damage computer equipment, and in
some cases, pose a danger to humans. Observing best practices with regard to electrical safety
will protect both computer equipment and human lives.
Static Electricity
Definition:
Static electricity is a build-up of a stationary electrical charge on an object. It is called static
because the charge cannot escape the charged body, but it remains still.
Static charges can be as small as the sparks that come off a dry blanket in the wintertime or
as massive as a lightning strike, with its millions of volts.
Example:
Example:
EMI
While ESD is the primary electrical danger to computer equipment, electromagnetic interfer-
ence (EMI) can also cause problems with microcomputer circuitry. EMI occurs when a
magnetic field builds up around one electrical circuit and interferes with the signal being car-
ried on an adjacent circuit.
Anti-static bags that are used for shipping components actually conduct electricity, so keep
them away from equipment that is powered on.
● Using anti-static bags to store computer components that are particularly sensitive to ESD.
● Using an air ionizer, which releases negative ions into the air. They attract positively
charged particles and form neutrally charged particles.
● Humidifying the air to speed up static discharge from insulators. When the air is
extremely dry, more static is likely. A humidity rate of 50 to 60 percent is best.
● And, grounding yourself before touching electronic equipment. To avoid a static shock,
touch a grounded object made of a dissipative material. A dissipative material is a con-
ductor, but with high resistance. It loses its electrical charge slowly, so when you touch it,
the electron flow is spread over time and you do not feel a shock.
An ESD Toolkit
Some people who work on computer equipment never use a single piece of ESD safety
equipment. They discharge themselves by touching an unpainted metal part of the computer
case before touching any components. In other instances, the company policy might require
that you use a properly equipped ESD-free work area. The minimum equipment in this case
would be a grounded wrist strap. Other ESD-protection equipment includes leg straps,
grounded mats to cover the work surface, and grounded floor mats to stand on. The mats con-
tain a snap that you connect to the wrist or leg strap. Anti-static bags for storing components
can also be included in an ESD toolkit. If the technician’s clothing has the potential to produce
static charges, an ESD smock, which covers from the waist up, can be helpful.
To ensure that the ESD equipment remains effective, you should test it frequently. A minor
shock that you cannot feel can compromise the ESD safety equipment.
Electrical Hazards
Because personal computers are powered by electricity, there are several potential electrical
hazards you should be aware of when servicing them.
● Do not take the case off a monitor. The risk to your life is not worth any repairs you
might make.
● Don’t bang on the monitor screen with your tools; an implosion will propel shards of
glass in every direction.
● To clean the monitor, turn it off and unplug it; do not wear an anti-static wrist strap. Use
isopropyl alcohol rather than a general-purpose cleaner; it doesn’t create a safety hazard if
dripped inside the case. Use an anti-static cleaner to clean the glass on the monitor; never
wash the glass with the power on.
Following these precautions will help you avoid accidents and prevent personal injury. If you
see others working under potentially hazardous conditions, share your knowledge with them to
help prevent accidents and injury in your workplace.
ACTIVITY 3-2
Identifying Electrical Safety Issues
Scenario:
In this activity, you will identify electrical safety issues.
2. True or False? If you are using an anti-static floor mat, you do not need any other
ESD safety equipment.
True
False
3. Electrical injuries include electrocution, shock, and collateral injury. Can you be
injured if you are not part of the electrical ground current?
4. Which of these computer components present the most danger from electrical
shock?
a) System boards
b) Hard drives
c) Power supplies
d) Chassis
TOPIC C
Environmental Safety and Materials
Handling
In the last topic, you identified best practices for safely dealing with electricity. Environmental
factors other than ESD must also be considered to ensure a safe work area. In this topic, you
will identify best practices for promoting environmental safety and proper materials handling.
In addition to electrical issues, there are other environmental issues that computer technicians
must deal with on a regular basis. For instance, the health and safety of you and those around
you should be considered the highest priority—computer equipment can be replaced, but
human lives cannot. Recognizing potential environmental hazards and dealing with them safely
is an integral part of an A+ technician’s job.
Atmospheric Considerations
Atmospheric hazards can be extremely dangerous to you and those around you.
Hazard Description
Ozone gas Laser printers produce ozone gas, usually when the corona wire produces
an electrical discharge during printing. Depending on the levels, ozone
can be a mild-to-severe irritant. Regulatory agencies have established
limits regarding the amount of ozone that employees are exposed to. Be
sure the printer operates in a well-ventilated area. The laser printer may
have a filter to control ozone emissions.
Humidity Too much moisture can be problematic and cause physical damage to
equipment. On the other hand, low humidity can contribute to more elec-
trostatic charge into the air. High humidity levels can also have an effect
on tapes and paper media.
Dust Dust can be a more subtle hazard. Buildup of dust particles over time can
cause problems with different types of equipment. Excessive amounts of
metallically conducive particles in the air can cause power supplies and
other electronic components to shut down. Dusting equipment often can
prevent these types of issues. Make sure that printers and paper products
are kept in a separate area from computer equipment to prevent paper
dust from getting into the equipment.
Situational Hazards
Various workplace situations can be a hazard to you and your coworkers.
Hazard Description
Falling and tripping Within your work area alone a number of things
can cause you to fall or trip. While working with
computer equipment, you need to keep in mind the
location of hardware, cables, and devices. Loose
cables and cords on the floor can be problematic
when moving within your work area.
Equipment storage CPUs and other hardware should not be stacked on
top of one another. Make sure the equipment is
secure, whether it is on the floor or on a desk or
shelf.
Food and drink Eating and drinking around computer equipment
can be problematic. Food particles and liquids can
get inside and harm the inner mechanics of the
hardware. Your employer may have no eating or
drinking policies in place for these reasons.
Physical Hazards
Potential physical hazards are present in any workplace, including the environment you work
in as a computer technician.
Eye strain Many computer tasks are done at a close working distance, requiring the
eyes to maintain active focusing. This can cause stress and strain on the
eyes and the muscles that control them. A very common health problem
reported by users of computer monitors is eye strain—including the fol-
lowing symptoms:
● Blurred vision
● Difficulty focusing
● Double vision
● Tiredness
● Headaches
Dry eyes can also be a concern for computer operators. The eye surface
becomes dry because computer users tend to blink less and tears evapo-
rate faster during monitor use. Symptoms associated with dry eyes are
redness, burning, and excess tearing.
Radiation Radiation is a broad term used to describe energy in the form of waves or
particles. Electromagnetic radiation comes from both natural and manu-
factured sources, including computer monitors. Circuits within the
monitor are responsible for the horizontal and vertical movements of the
electron beam. This movement occurs tens of thousands of times each
second (Very Low Frequency, or VLF) for the horizontal scan, and 50 to
60 times each second (Extremely Low Frequency, or ELF) for the vertical
scan. The VLF and ELF field intensities have been extensively evaluated
in many different models of monitors for possible biological effects. Com-
puter monitor users have expressed concerns about the possible health
effects—including adverse pregnancy outcomes—from the electromag-
netic radiation that monitors produce. While the research continues,
current scientific information does not identify a health risk from expo-
sure to these electromagnetic fields.
Noise Noise levels produced by computers and printers are well below those
that cause adverse health effects. The equipment has minor noise sources
such as the hum of cooling fans and the clicking of keys. Excessive noise
from the computer may indicate an internal malfunction.
OSHA
Your employer is obligated to comply with the Occupational Safety and Health Administration
(OSHA) and/or state standards regarding employee safety. Employers must provide:
● A workplace that is free from recognized hazards that could cause serious physical harm.
● Personal protective equipment designed to protect employees from certain hazards.
● Communication—in the form of labeling, Material Safety Data Sheets (MSDS), and train-
ing about hazardous materials.
Your responsibility—to yourself, your employer, your coworkers, and your customers—is to be
informed of potential hazards and to always use safe practices.
● Plan ahead. While moving equipment from one area to another, be aware of narrow door-
ways or columns that you will encounter on the way. Also, make sure to prep the space
before delivering the equipment so that you are not trying to reconfigure the space with
all the equipment in the way.
Chemical Hazards
Working with personal computers can cause you to come in contact with some chemical
hazards.
Liquid Hazards
There are many different professional situations when you may come in contact with a hazard-
ous liquid. Some such compounds are used to clean or condition equipment, including the
computer’s case, contacts and connections of adapter cards, and glass surfaces. They may
present safety or environmental problems. Make sure you read the labels and follow instruc-
tions carefully when disposing of hazardous materials.
Example:
Incident Reports
An incident report is a record of any instance where a person is injured or computer equip-
ment is damaged due to environmental issues. The report is also used for accidents involving
hazardous materials, such as chemical spills, that could have an impact on the environment.
Any time an accident occurs at a work site, you should submit an incident report. Reporting
these occurrences is often part of company policy and can help provide protection against
liability.
ACTIVITY 3-3
Identifying Environmental Safety Issues
Scenario:
In this activity, you will identify the best practices for promoting environmental safety and
proper handling of materials.
2. You are on a service call, and you accidentally spill some liquid cleaner on the
user’s work surface. What actions should you take?
a) Refer to the MSDS for procedures to follow when the material is spilled.
b) Wipe it up with a paper towel, and dispose of the paper towel in the user’s trash
container.
c) Report the incident.
4. What substance reacts with heat and ammonia-based cleaners to present a work-
place hazard?
a) Capacitors
b) Lasers
c) Toner
d) Batteries
TOPIC D
Perform Preventative Maintenance
In the last topic, you identified best practices for promoting environmental safety and proper
handling of materials. Best practices for PC technicians also include using preventative mainte-
nance to avoid potential problems. In this topic, you will identify and apply general
preventative maintenance techniques.
It’s inevitable that computers and their components will require repair or replacement at some
point. However, there are a few relatively simple procedures a computer technician can per-
form to postpone the inevitable. Providing general preventative maintenance resolves problems
before they occur and helps to prolong the life of the computer and its components.
Task Description
Visual/audio inspection By looking at and listening to a computer in operation, you can some-
times tell if a problem is about to occur. During a visual inspection, look
for damaged or cracked components, verify that internal and external con-
nections are properly seated, and check cords and cables for fraying.
During an audio inspection, verify that the speakers are working properly
and that volume controls respond as expected, and listen for any unusual
noises coming from within the computer chassis.
Driver/firmware updates Driver and firmware manufacturers often develop updates to address
known functionality issues. By updating device drivers and firmware, you
can avoid many potential operational problems.
Scheduling preventative The most basic preventative maintenance technique for all components is
maintenance keeping them clean. Cleaning a personal computer on a regular basis pre-
vents overheating (and therefore damage to internal components) as well
as ESD problems. Obviously, this needs to be done on a regular basis to
be effective, so if your company does not have a policy that specifies a
maintenance interval, you should consider creating a schedule to inspect
and clean any computers that are your responsibility.
Using appropriate repair During preventative maintenance and other service calls, it is imperative
tools and cleaning materials that you use the proper tools and materials. Using the wrong tool or
material can cause additional problems to occur and can be dangerous.
Task Description
Ensuring proper environ- Computers operate best in environments with adequate ventilation, little
ment dust, and relatively humid air.
● Airflow around a computer and its external devices helps to dissipate
the heat generated, so make sure that the components have enough
room around them to prevent overheating problems.
● The fan that runs to cool the system pulls dust and debris into the inte-
rior of the computer. This can lead to shorts and other electrical
damage if it is allowed to accumulate.
● Computers function best in relative humidity of 50 to 60 percent. Drier
conditions are prone to ESD problems, and moister conditions can
affect performance. Use humidifiers, air conditioners, and dehumidifi-
ers when possible to control the air quality.
An online UPS supplies power to your systems from its batteries at all times. Power from the
normal electrical system is used to constantly charge the batteries. Online UPSes usually sup-
ply more clean battery power than standby UPSes. However, the batteries usually don’t last as
long as standby UPS batteries. Online UPSes generally filter power to reduce or remove power
spikes. Because online UPSes supply power from the battery at all times, they can prevent
power sags or brownouts.
A standby UPS (SUPS) uses a battery to supply power when a power problem occurs. At
times of normal power operation, power is supplied from the normal electrical system. This
method places minimal burden on the batteries and power inverters in the UPS, leading to
longer UPS life. These UPSes are rated on their switching time because their batteries are in
use only when the regular power is unavailable.
Surge Suppressor
A surge suppressor helps protect components from power spikes. It does not protect compo-
nents from power failures or sags, nor does it provide a steady supply of electricity. It also
doesn’t provide power to components in the case of a power failure.
LCD monitors are extremely delicate. Unlike glass monitors, LCDs are very sus-
ceptible to pressure and pressing hard while cleaning will likely either scratch
the plastic or, worse yet, crack the display, a very expensive mistake on some-
one else’s laptop or flat panel display.
5. Clean contacts and connections with a lint-free cloth or an artist’s paint brush.
7. Clean removable media drives using the cleaning kit that is compatible with the drive and
following the enclosed directions.
Older Iomega Zip and Jaz drives should not be cleaned. This will damage the drives.
Imation SuperDrives can be cleaned. If a removable drive is cleanable, the manufacturer
will sell an approved cleaning kit.
put it into hibernation, you can leave it unplugged until this occurs if you want to
test that feature as well. When you are done testing, plug the UPS back into the wall
outlet.
● Most models have a Test button. Press the Test button to verify that the UPS can
power the components plugged into the UPS.
ACTIVITY 3-4
Performing Preventative Maintenance
Setup:
To complete this activity, you will need a cleaning kit consisting of:
● Monitor cleaning wipes
● Keyboard cleaning wipes
● Lint-free cloths
● Rubbing alcohol
● A mild household cleaner
● Cotton swabs (tightly wound)
● Lens cloth
● Window cleaner
● Toothpicks
● Artist’s paint brush
● Compressed air canisters
● Computer vacuum
● CD-ROM cleaning kit
● Floppy drive cleaning kit
Scenario:
In an effort to cut down on the number of peripheral problems that have been occurring, your
company has decided to perform preventative maintenance on peripherals each month. To
help prevent other system problems, a yearly preventative maintenance plan has also been put
in place to clean the internal system components, including the system board, drives, and any
adapter cards. As one of the junior members of the support team, you have been assigned the
task of cleaning the department’s peripherals and internal system components.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. If you have a keyboard, clean the a. Shut down the system and unplug the
keyboard. keyboard.
2. If you have a mouse, clean the a. Shut down the system and unplug the
mouse. mouse.
3. If you have a monitor, clean the a. Shut down the system, turn off the
monitor. monitor, and unplug the monitor cable
and power cord.
4. If you have a complete PC to clean, a. Shut down the system, and then
clean the case. unplug the peripherals and the power
cord.
5. If you have a system board, clean a. Position the system so that you can
the system board. hold the compressed air canister
upright.
7. Clean the floppy disk drive. a. Insert the floppy disk cleaner disk in
the drive.
ACTIVITY 3-5
Using a UPS
Setup:
To complete this activity, you will need a UPS.
Scenario:
There are periodic power outages at your customer’s site due to old power lines and high
winds. They have had several corrupted files due to power loss. They have purchased a UPS
and have contracted with you to install and test it for them.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Set up the UPS to power a com- a. If necessary, connect the battery in the
puter system. UPS.
2. If the UPS comes with its own man- a. Insert the UPS software installation
agement software, install the CD-ROM.
software.
b. To install the software, follow the
prompts in the installation wizard.
3. Configure what happens when the a. From the Start menu, choose Control
UPS encounters a power failure. Panel.
TOPIC E
Diagnostics and Troubleshooting
In the last topic, you identified general preventative maintenance techniques. Best practices for
PC technicians also include using a methodical approach to solving problems. In this topic,
you will identify general diagnostic and troubleshooting techniques.
The most elaborate toolkit and expensive diagnostic software can be useless if you don’t have
a consistent plan of attack for solving problems. Even experienced technicians can sometimes
overlook obvious problems or solutions. Troubleshooting is seldom easy, but if you develop or
adopt a basic troubleshooting procedure, you will often be able to determine the specific cause
of a problem, as well as possible solutions to the problem.
Troubleshooting Theory
A logical, methodical approach to troubleshooting usually leads to quicker solutions, so there
are certain general factors that will apply in any troubleshooting situation.
Factor Description
Backups Perform backups before making any changes. If the solution you try does not
work or leads to additional problems, you can restore the backup and try again.
Assessment Assess a problem systematically, and divide large problems into smaller compo-
nents to be analyzed individually. This makes the problem less complex, and
helps you to try one solution at a time.
Simple solutions Verify the obvious, determine whether the problem is something simple, and
make no assumptions. Trying simple solutions first can save significant time. If a
user reports that his monitor does not work and assures you that it is plugged in,
connected, and powered on, check for yourself before beginning an exhaustive
diagnostic routine.
Research Research ideas and establish priorities. If the problem is not solved by a simple
solution, you might need to do some research, which could result in several pos-
sible approaches that need to be tried.
Documentation Sufficient and proper documentation of setups, configurations, and histories can
prove to be invaluable during the troubleshooting process. Document your find-
ings, actions, and the outcomes to help maintain a comprehensive history for
future reference.
Environment Assess the physical environment the equipment is in. Be aware of the location, air
flow, and temperature the equipment is operating in.
Stage Description
Stage 1: Identification In Stage 1, you will identify the problem, including questioning the user
and identifying any recent changes to the computer.
Ask the user a series of open-ended questions to help identify the issue
behind the symptoms. For instance, instead of asking if the user can start
the computer, try asking what happens when the user tries to start the
computer. You can also ask the user (and yourself) questions similar to the
following, to help identify the problem:
● Could you do this task before? If not, maybe the system is simply
unable to perform the task without additional hardware or software.
● If you could do the task before, when did you first notice that you
couldn’t do it anymore? If the computer suddenly stops doing what it
has always done seamlessly, that might not be the only change. Try to
discover what happened immediately before the problem arose, since
the source of the problem might be related to other changes.
● What has changed since the last time you were able to do this
task?Users might tell you that nothing has changed, so you should fol-
low up with leading questions such as “Did someone add something to
the computer?” or “Is the procedure you followed this time different in
any way from the way you normally do this?”
● Were error messages displayed? If you can get the exact text of any
error messages displayed, you can try searching the manufacturer’s
website to get an explanation of the message and to see if any problem
reports have been logged related to this message.
● Is the problem always the same, no matter what conditions apply?
Determining if the problem is consistent or intermittent can help you
narrow down possible causes. For instance, if a user can’t open a spe-
cific spreadsheet file stored on the hard drive, ask if he or she can open
a different spreadsheet stored on the hard drive, or even stored on a
network drive, if the computer is connected to a network. If the other
files open without any trouble, it’s fairly safe to assume that the prob-
lem lies with the file and not the application or the hard drive.
Stage Description
Stage 2: Analysis In Stage 2, you will analyze the problem, including potential causes, and
make an initial determination as to whether the problem is being caused
by software or hardware, or a combination of both.
1. Whenever possible, attempt to re-create the problem so that you can
determine exactly what actions were taken and what results were
received. If you can, watch the user to ensure that he or she is follow-
ing the correct procedures. If the problem occurs in the same place, the
problem will be easier to solve than if it’s an intermittent problem. You
can also try to re-create the problem by trying to perform the task your-
self, at the user’s computer and at a similarly configured computer or
by having another user try the task, at the user’s computer and at a
similarly configured computer.
2. After you reproduce the problem, try to determine what’s causing it.
Use a systematic approach to eliminate possible causes, starting with
the most obvious cause and working back through other potential
causes.
3. Depending on the cause you’ve isolated, determine at least one way to
correct the problem. For instance, if you’ve isolated the cause as a cor-
rupt spreadsheet file, one possible correction would be to restore the file
from a backup. Draw on your own experiences, review support
websites, and confer with your colleagues to come up with possible
corrections, and prioritize them according to their likelihood of success
and ease of implementation.
Stage 3: Testing In Stage 3, you will test related components, including inspection, connec-
tions, hardware and software configurations, Device Manager, and
consulting vendor documentation, to solve the problem or identify a likely
solution.
1. Examine and, if possible, listen to the component that appears to be
causing the problem to determine if the part needs to be reconfigured or
replaced altogether.
2. Check all connections to ensure that they are properly seated.
3. If possible, open Device Manager and review the configuration details
provided. Make sure that you check both hardware and software
configurations—what appears to be a hardware problem can be caused
by a software glitch, and vice versa. And, in some cases, a combination
of hardware and software can be causing the problem you are trying to
solve.
4. Review vendor documentation to determine if the issue is a known
problem with an identified solution. Manuals often contain troubleshoot-
ing sections, and vendor websites usually provide searchable databases
that can provide answers to many questions.
Stage 4: Implementation In Stage 4, you will implement your solution. When you do, you need to
ensure that productivity doesn’t suffer and that downtime is minimized.
For example, you might need to provide a loaner machine to a user whose
PC needs to be rebuilt.
Stage Description
Stage 5: Evaluation In Stage 5, you will evaluate results, and take additional steps if needed,
such as consultation with colleagues or vendor support and use of alterna-
tive resources and manuals.
Make sure that the solution you’ve implemented actually solved the prob-
lem and didn’t cause any new ones. Use several options and situations to
conduct your tests; for instance, try the task yourself, and then have the
user try the task while you observe the process, or test the computer both
before and after it’s connected to a network, if applicable. Sometimes,
you’ll need to conduct the testing over a period of time to ensure that the
solution you implemented is the right one. Remember to verify that the
user agrees that the problem is solved before you proceed.
Stage 6: Documentation Documenting your activities and their outcomes in Stage 6 is crucial,
because detailed descriptions of computer problems and their solutions can
be a helpful part of the overall documentation plan for your company’s
computers. Not only will this provide you with an ever-growing database
of information specific to the computers you’re responsible for, it also will
be valuable reference material for use in future troubleshooting instances.
Stage 7: Verification In Stage 7, you will verify that the user agrees that the problem is solved.
Don’t underestimate the importance of this stage. You should never con-
sider a problem to be resolved until the customer considers it to be solved.
You’ll probably also need to inform others of the outcome of the situation,
especially in cases where the person reporting the problem is not actually
the person experiencing the problem. When you can, provide a brief expla-
nation of the problem and how you fixed it, but make sure that you don’t
overwhelm the user with information, and never blame the user directly
for the problem. Your explanation should always be geared to the knowl-
edge and interest level of the person you’re addressing. What you tell the
user might differ substantially from what you tell another technician.
Troubleshooting Models
Several troubleshooting models have been developed for servicing computers and computer
networks. Following one of these models can be helpful because it gives you a basis for a sys-
tematic approach to troubleshooting. There is no surefire method that will work 100 percent of
the time, since troubleshooting often requires you to make intuitive guesses based on experi-
ence, but using a model can help you identify causes and solutions in areas where you don’t
have the required type of experience. Ultimately, the troubleshooting process that you follow
will be a mix of these models, plus methods that you find useful. If you get stuck on some-
thing you’ve never encountered before, ask your colleagues if they have seen similar problems.
Troubleshooting
Model Description
CompTIA Network+ Although this troubleshooting model is designed primarily for net-
Troubleshooting Model work troubleshooting, its basic tenets can be used for
troubleshooting PCs.
1. Identify the exact issue.
2. Re-create the problem.
3. Isolate the cause.
4. Formulate a correction.
5. Implement the correction.
6. Test the solution.
7. Document the problem and the solution.
8. Provide feedback.
Novell Troubleshooting Similar to the CompTIA Network+ troubleshooting model, this
Model model was also designed primarily for network troubleshooting,
although its basic tenets can also be used for troubleshooting PCs.
1. Try some quick fixes.
2. Gather basic information.
3. Develop a plan of attack to isolate the problem.
4. Execute the plan.
5. Verify user satisfaction.
6. Document the problem and the solution.
Troubleshooting
Model Description
Collect, Isolate, and Cor- Another popular troubleshooting model is the Collect, Isolate, and
rect Troubleshooting Correct method. This model divides troubleshooting into three large
Model stages, with several steps incorporated into each stage. Ultimately, it
achieves the same goal as the other methods, which is to solve
computer-related problems.
1. Collect. In this stage, you gather information, gather user reports,
document the process, and keep track of known problems. The
key to this stage is to gather a sufficient amount of high-quality
information, rather than simply a large amount of information.
The experience you gain from troubleshooting your systems will
help you determine what data you need to maintain. Note that
some of the steps in the Collect stage are done long before
trouble is reported. Being prepared is the best way to solve prob-
lems quickly and easily when they do arise.
2. Isolate. This stage relies on the proper completion of the Collect
stage. The Isolate stage is a balancing act between a methodical
series of steps and a best-guess attempt at solving problems. In
some cases, an intuitive reaction will lead you quickly to the
source of the trouble. In other cases, you’ll need to methodically
proceed with the troubleshooting process to discover the root of
the problem. The Isolate stage is often completed nearly simulta-
neously with the Correct stage.
3. Correct. This stage involves the steps that actually fix the prob-
lem, as well as preventative measures. The prioritized list you
created in the Isolate stage can help you set a plan for solving
the trouble. Follow your plan. Proceed down your list of poten-
tial causes, step by step, from top to bottom. Document your
progress, and don’t skip any steps.
Troubleshooting Tips
Whenever you are attempting to resolve a problem, you need to keep some general points in
mind. The first is to use your common sense. Some solutions are very obvious if you examine
the equipment. For example, a cable might be loose or disconnected. Be sure to look for these
obvious problems before delving too deeply into troubleshooting mode.
These are the basic troubleshooting steps you will want to take almost every time you face a
device problem:
● Check the physical connections. This might involve making sure the device is plugged in
and connected to the computer, that it is connected to the right port, that an adapter card
is fully seated in the slot, and so forth.
● Check the adapter to which the device is connected. If you are having trouble with a
device, it might not be a fault in the device. It might be a problem with the adapter or the
adapter card to which it is connected. Be sure to troubleshoot the entire interface includ-
ing the card, port, cable, and device.
● Check Device Manager. An exclamation point (!) or X in red or yellow over a device
indicates there is a problem. The Properties sheet of devices has a Device Status box that
indicates whether the device is working properly. This box also contains a Troubleshoot
button which accesses topics in the Help And Support Center.
● Use the Help And Support Center utility to have Windows guide you through the things
you should check when troubleshooting a particular device problem.
Many times when you are troubleshooting a problem, you will find that there is more than one
cause for the problem. In this case, you might need to combine several troubleshooting strate-
gies to resolve the problem. Often you will need to reboot to test whether your attempt to fix
the problem has actually worked. If it did, great! If it didn’t, just keep trying to work your way
through the rest of the list of possible solutions. If none of the solutions work for your prob-
lem, ask a colleague for help. Sometimes that second set of eyes sees the solution that you
don’t.
ACTIVITY 3-6
Identifying Troubleshooting Best Practices
Scenario:
In this activity, you will identify general diagnostics and troubleshooting best practices that
PC technicians should employ.
1. When you receive notice that a user is having trouble with his computer, which is
the best first step?
a) Determine how many users are having similar troubles.
b) Isolate the cause of the problem.
c) Ask the user leading questions to gather information.
d) Check for simple solutions.
TOPIC F
Professionalism and Communication
So far in this lesson, you have identified best practices for working directly with computer
equipment. On almost every service call, you will also need to interact with users who are
experiencing problems. In this topic, you will identify best practices for PC technicians to use
to communicate appropriately with clients and colleagues and conduct business in a profes-
sional manner.
You are a representative of your profession, as well as your company. The way you conduct
yourself professionally directly influences the satisfaction of your customer, which in turn
influences the productivity of your company.
Communication Skills
Using the proper communication skills when dealing with clients and colleagues provides a
professional environment that is conducive to solving the problem at hand.
Active Listening
Active listening techniques can enhance your communications skills. These techniques may
feel awkward at first, so you might want to try them out in a situation outside your job. With
practice, you will use active listening skills more easily and creatively.
Action Description
Questioning Ask questions to gain information, clarify what you have heard, and
direct the conversation. Open-ended questions can elicit a lot of
information. Close-ended questions limit the amount of information
by giving a choice of answers. Yes/no questions further limit infor-
mation exchange and can be used when you need to get to the
point. Examples of each of these question styles are:
● Open-ended: “What happened after you pressed
Ctrl+Alt+Delete?”
● Close-ended: “What kind of a printer do you have, laser or
inkjet?”
● Yes/no: “Are you on a network?”
Action Description
Empathizing Let your customer know that you perceive and support what he or
she is feeling. Try to be specific in naming the emotion and link it
to the customer, using “you,” not “I.” Examples of helpful
empathetic responses include:
● “This delay is frustrating for you.”
● “I can identify...”
Paraphrasing Restate what the customer says in your own words to make sure
that you interpreted correctly, to bring order to the customer’s
thoughts, and to relay that their message is important. Use state-
ments, not questions, and don’t add or change anything. Examples
of starters for paraphrasing include:
● “You’re saying that...”
Summarizing Outline the main points of your conversation to summarize what has
been said. You can begin by summarizing your understanding of the
problem and then checking for clarification. During the conversa-
tion, you can re-establish the focus by listing the important facts.
Bring closure by summing up the work performed. If a follow-up
plan is needed, restate the responsibilities and timeline. Helpful
starters for summarizing include:
● “Let’s see what we have so far.”
Here are some examples of statements and their associated active listening skills.
Professional Conduct
Acting in a professional manner when dealing with colleagues and clients provides a work
environment where problems can be solved efficiently.
Facet Description
Appearance Exhibit a professional appearance. Your work environment may be in a
repair shop, at a help desk, or on-site at the customer’s business. What-
ever the situation, you will want to present a neat, clean, business-like
appearance. On-site work may take you into many settings, from muffler
repair shops to executive offices. You may be asked to remove your shoes
or put on a hard hat. Be aware of the corporate culture and respond
accordingly.
Respect Be respectful of the customer and the environment in which you are
working.
● Maintain a positive attitude when talking with users. Arguing or get-
ting defensive with users will make it harder for you to solve the
problem to the users’s satisfaction.
● Never minimize the customer’s problem. What seems simple to you
could be a mission-critical problem to the user.
● Never insult a customer or call the customer names. No matter how
frustrating a service call might become, rudeness is never the answer.
● When dealing with customers, avoid distractions and interruptions.
Repeatedly answering a cell phone or pager while you are supposed to
be working on a problem sends the message that the user’s problem is
unimportant to you.
● Be sure to keep your work area at the customer site neat. Don’t pile
materials on your customer’s books and files. Clean up after yourself;
a customer who doesn’t know a multimeter from a memory module
may chase after you with the anti-static bag you left behind. When
on-site, ask where to dispose of materials; find out where the recycling
bin is for printer test-run paper.
● Be respectful of the property at the customer site. Always ask permis-
sion before entering an office or workspace, using the telephone, sitting
down at a computer, or adjusting the workspace.
Accountability Be accountable. Do not misrepresent your credentials, competence, or
training. Take responsibility for your actions, and admit your mistakes. In
questions of conflict of interest between your company and the customer,
refer to your supervisor or follow your company’s procedure. Be aware of
your company’s policy for accepting gifts or samples, and socializing
with customers.
Facet Description
Confidentiality Be circumspect. Many fields—including medicine, social work, and spe-
cial education—are regulated by state laws concerning the confidentiality
of their consumers. All companies have personal information about their
employees. Many corporations have sensitive information about the
development of their products or services. Treat any information you
learn about your customer’s business as confidential. Know your compa-
ny’s policies concerning confidential information and follow them.
Ethics Practice ethical conduct. You have an obligation to take responsibility for
ethical conduct within your delivery of service. The issues involved are
complex and ever-changing in the computer industry. An unethical prac-
tice may become so routine that it is falsely assumed to be acceptable
behavior. Learn your company’s policies and adhere to them.
Honesty Be forthright with your customers about what is occurring and the actions
you will take. Clients have a right to understand the process you are fol-
lowing and how it will affect them.
Discourage software pirating. Software copyright infringement, or pirat-
ing, relates to the legal issues surrounding the distribution and use of
software. The Federal Copyright Act of 1976 protects the rights of the
holder of a copyright. Typically, a backup copy of software is allowed
and a site license allows for multiple use at one facility. You are respon-
sible for upholding the law by complying with the license agreements that
both your company and your customer hold. Learn your company’s poli-
cies and adhere to them. Pirating carries penalties and risks, including
fines, imprisonment, corrupted files, virus-infected disks, lack of technical
support, and lack of upgrades.
Prioritizing Set priorities. You will often need to set priorities and make judgment
calls. You will recommend whether your customer should repair or
replace equipment. You will rank the urgency of your customers’ needs.
Base your decisions on common courtesy, fundamental fairness, and
keeping promises. Be familiar with your company’s policies and follow
them.
ACTIVITY 3-7
Identifying Communication and Professionalism Best
Practices
Scenario:
In this activity, you will identify communication and professionalism best practices.
Lesson 3 Follow-up
In this lesson, you identified best practices that are followed by professional PC technicians.
With the proper toolset, awareness of safety and environmental issues, general preventative
maintenance techniques, and basic diagnostic and troubleshooting processes, you are prepared
to do your job in a safe, effective, and professional manner.
1. Which of the best practices discussed in this lesson apply in your workplace?
2. Of the best practices that are not applicable to your work environment, which would
you consider adopting?
Lesson Objectives:
In this lesson, you will install and configure computer components.
You will:
● Install and configure display devices.
● Install and configure input devices.
● Install and configure adapter cards.
● Install multimedia devices.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
In the last lesson, you identified general best practices for personal computer technicians. Now
that you have a solid base of background information, it’s time to start working on some hard-
ware components. In this lesson, you will install and configure peripheral computer
components.
Much of the work that you will perform as a personal computer technician will involve install-
ing and configuring various hardware and software components. Installing and configuring
peripheral components is one of the more common tasks an A+ Technician has. If you config-
ure the peripherals correctly, users will be able to complete their daily tasks more efficiently.
This lesson covers all or part of the following CompTIA A+ (2006) certification objectives:
● Topic A:
■ Exam 220–601 (Essentials): Objective 1.1, Objective 1.2, Objective 2.1, Objective
2.3
■ Exam 220–602 (IT Technician): Objective 1.1, Objective 2.1, Objective 2.3
■ Exam 220–603 (Remote Technician): Objective 1.1
■ Exam 220–604 (Depot Technician): Objective 1.1, Objective 2.1, Objective 2.3
● Topic B:
■ Exam 220–601 (Essentials): Objective 1.1, Objective 1.2, Objective 2.1
■ Exam 220–602 (IT Technician): Objective 1.1
■ Exam 220–603 (Remote Technician): Objective 1.1
■ Exam 220–604 (Depot Technician): Objective 1.1
● Topic C:
■ Exam 220–601 (Essentials): Objective 1.1, Objective 2.1, Objective 5.2
■ Exam 220–602 (IT Technician): Objective 1.1
■ Exam 220–603 (Remote Technician): Objective 1.1
■ Exam 220–604 (Depot Technician): Objective 1.1
● Topic D:
■ Exam 220–601 (Essentials): Objective 1.1, Objective 1.2
■ Exam 220–603 (Remote Technician): Objective 1.1
■ Exam 220–604 (Depot Technician): Objective 1.1
TOPIC A
Install and Configure Display Devices
In this lesson, you will install and configure peripheral components. Generally, one of the sim-
plest peripherals to install is the display device. In this topic, you will install and configure
display devices.
The display device is a user’s window into the computer system. Without the display device,
you can’t see the computer interface to issue commands, and you can’t see the results of your
work. Correctly installing and configuring the display system enables you to meet these basic
user needs. The information in this topic will enable you to install a range of different display
devices correctly.
As demand for color graphics increased, the monochrome standard of the Monochrome Dis-
play Adapter (MDA) was replaced by the Color Graphics Adapter (CGA), which could show
from two to 16 colors at resolutions from 160 x 200 to 640 x 200 pixels (picture elements or
unique dots on the screen). The Enhanced Graphics Adapter (EGA) could show up to 640 x
350 pixels. Monitors of this vintage used digital video signals—TTL for transistor-to-transistor
logic—and are completely incompatible with today’s computers.
Display Settings
You can configure a number of display characteristics for each video output device, either
through a dialog box in Windows or through controls on the physical monitor.
Power Management
Power management settings can affect the performance of monitors and other peripherals. You
configure power management in CMOS by specifying when power conservation settings take
effect. You then specify which components are automatically powered down and under what
conditions.
With the power management enabled in CMOS, you can then use Windows XP Power
Schemes to reduce power consumption of specific devices or the computer as a whole. Win-
dows XP comes with several preconfigured power options you can choose from, or you can
create your own settings. These features must be supported by the hardware in order for Win-
dows XP to implement them. After a specific interval, you can:
● Turn off components such as the monitor or hard drive.
● Go into Standby Mode. This puts devices in a low power state and turns off some
devices.
● Go into Hibernate Mode. This saves the contents of RAM to disk, and then turns off the
monitor, drives, and, finally, the computer itself.
LCD Characteristics
LCD devices have some unique characteristics.
Aspect Ratio
The aspect ratio is the ratio of width to height of a display. Most software expects a 4:3 ratio,
and the display will appear to be distorted if other ratios are used. The aspect ratio is found by
determining the proportion of the number of pixels across the screen to the number of pixels
down the screen. For example, a resolution of 640 x 480 has a 4:3 aspect ratio.
Interlacing
If you have an interlaced display adapter, every other line is scanned during each pass until the
entire screen has been covered. This method improves resolution, but produces a noticeable
flicker as the phosphors lose luminescence before they are hit again.
Connector Types
Display devices can use several different types of connectors.
Device Drivers
Definition:
A device driver is a type of software that enables the operating system and a peripheral device
to communicate with each other. Also referred to as a driver or driver software, a device driver
takes generalized commands from the system software or an application and translates them
into unique programming commands that the device can understand. It also provides the code
that allows the device to function with the operating system, and it is generally installed as
part of the installation process for a new piece of hardware. Device drivers can be generic for
a class of device or specific to a particular device.
Example:
● Included with the Windows XP operating system. New operating systems include thou-
sands of drivers that let them work with all current, popular devices. Peripherals that are
designed after the operating system comes out must supply their own drivers.
● Supplied with the device on a CD-ROM or floppy disk when you purchase the hardware.
● Downloaded from the Internet from the hardware manufacturer’s website.
ACTIVITY 4-1
Installing Display Devices
Setup:
You have a working computer with either a 15-pin VGA-style monitor port and a computer
equipped with a digital video interface, or you have a digital flat-panel LCD monitor that
uses the 29-pin DVI connector. The computer is turned off and the monitor is unplugged.
Scenario:
The marketing department of your company is moving to new offices, and you’ve been
assigned the task of setting up the computers in their new offices. The computers and stan-
dard VGA CRT monitors or LCD monitors with 29-pin DVI connector have been delivered to
each office. Employees want to begin using their computers as soon as possible.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
ACTIVITY 4-2
Configuring Display Devices
Setup:
Your instructor has altered the display settings for your monitor. The computer is running,
and the Welcome screen is displayed.
Scenario:
A monitor was recently moved from the old location to the new location. The employee
reports that the display does not appear in the center of the monitor. The images are too dark,
making it difficult to see, and he can’t see as much on the screen as he would like. The icons
on the screen are too small and the font is too big. The employee needs you to resolve these
issues so that he can get back to work.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
d. Click Apply.
c. Select Normal.
d. Click OK.
TOPIC B
Install and Configure Input Devices
In the last topic, you installed and configured display devices so that users could see computer
output. Users also need to be able to issue commands to the computer software by using input
devices. In this topic, you will install and configure input devices.
Computers need user input before they can do anything useful. In the early days of computing,
user input involved physically rewiring the computers. Later computers could accept input on
cards and paper tape. Keyboards and pointing devices are now the standard input devices for
personal computers, but there are others available that streamline the process of providing
input to the computer. As an A+ technician, part of your responsibilities will include installing
and configuring input devices so that users can perform their assignments in the most efficient
manner possible.
Standard keyboards
Specialty Keyboards
Specialty keyboards include:
● Keyboards for children or users with special needs may have enlarged or specially con-
structed keys.
● Foreign language keyboards have a variety of different keys.
● Custom application keyboards can have multimedia access buttons, video/audio editing
software buttons, and gaming devices.
Factor Considerations
Drivers Be sure that you have the most current drivers for
the input device and the operating system of the
computer on which you plan to install it.
Ports Make sure that the computer has an available port
to which you can connect the device. Input devices
can use PS/2, serial, parallel, USB, SCSI
ports,Infrared, and FireWire/IEEE 1394.
Manufacturer’s instructions Review the manual that came with the device. In
some cases, the manufacturer might require you to
install the device drivers before connecting the
device to the computer.
ACTIVITY 4-3
Installing Input Devices
Setup:
For this activity, you will need a replacement keyboard and mouse or other pointing device.
Scenario:
You have received a service call to replace a user’s mouse and keyboard.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
ACTIVITY 4-4
Configuring Input Devices
Scenario:
You just replaced a user’s mouse and keyboard. The user is left-handed and prefers a slow-
blinking cursor. She also has a hard time distinguishing the mouse pointer from other screen
elements, and asks if you can adjust the pointers to something more easily discernible.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
c. Click OK.
2. Configure the mouse settings. a. In the Printers And Other Hardware Con-
trol Panel, click Mouse.
e. Click OK.
TOPIC C
Install and Configure Adapter Cards
In the previous topic, you installed input devices, such as a mouse and a keyboard, that use
standard ports. You can expand the functionality of your computer by adding adapters to pro-
vide additional ports for a variety of peripheral devices. In this topic, you will install and
configure adapter cards.
When a user needs access to a peripheral for which the computer doesn’t have an existing
interface, you must install an adapter. As an A+ technician, your responsibilities will likely
include upgrading users’ computers by installing a variety of components. By mastering the
skills to install an adapter, you’ll be prepared for whatever device a user asks you to install.
Internal Bus
Architecture Description
8-bit The original IBM PC and its successor, the PC/XT, used simple expansion buses.
Its architecture provided an 8-bit data bus, with minimal support circuitry. This bus
has a clock speed of 4.77 MHz. It supports eight interrupts and four DMA chan-
nels; however, except for IRQ 2 and DMA 3, all resources were already assigned,
so you didn’t have many choices when you installed additional cards. The cards for
an 8-bit slot have only one edge connector. Because they are so outdated, you typi-
cally won’t encounter these cards in the field.
ISA The ISA (Industry Standard Architecture) bus was originally developed for the IBM
PC/XT and PC/AT. Many computers still have some ISA slots along with the newer
types of buses. Features of ISA adapters include:
● 8-bit or 16-bit edge connectors.
EISA The EISA (Extended Industry Standard Architecture) bus was a higher-speed bus
designed for PCs starting with the Intel 80386 processor. EISA has never been
widely adopted. Features of EISA adapters include:
● Compared to ISA cards, they contain an additional row of connectors and addi-
tional guide notches.
● Software configurable.
● Supports bus-mastering, which enables one adapter to take control of the bus
during a data transfer.
● Configured automatically through software configuration utility.
Internal Bus
Architecture Description
MCA IBM developed the Micro Channel Architecture bus, or Micro Channel bus, for its
PS/2 line of computers. This bus operates at 10 MHz and can accept 16- and 32-bit
adapter cards. However, you cannot use cards for ISA or EISA systems in Micro
Channel systems, and IBM required the payment of royalties for implementations of
the architecture—both cards and system boards. Because few vendors were willing
to pay such royalties, this bus was never widely adopted. You configure MCA
adapters using an IBM reference disk.
VL-Bus In 1992, the Video Electronics Standards Association (VESA) introduced the VESA
Local-Bus (VL-Bus) standard. A motherboard can contain up to three VL-Bus slots.
Bus mastering is supported by the VL-Bus standard. A 32-bit or 64-bit slot is
located next to an ISA, EISA, or Micro Channel Architecture slot and enables ven-
dors to design adapters that use the local bus or both buses simultaneously. You
typically configure VL-Bus cards through software.
PCI The PCI (Peripheral Component Interconnect) bus is the most common system bus
found in today’s PCs.
● Physical characteristics of cards: 33 or 66 MHz. 133 MBps throughput at 33
MHz. Up to eight functions can be integrated on one board. Card size varies, but
must have a PCI edge connector. Slot on the system board is white.
● Configuration: Supports up to five cards per bus and a system can have two PCI
buses for a total of 10 devices per system. Can share IRQs. Uses PnP.
● Used for: All current adapters in client and server systems.
● Communication method: Local bus standard. 32-bit bus mastering. Each bus uses
10 loads. A load refers to the amount of power consumed by a device. PCI
chipset uses three loads. Integrated PCI controllers use one load. Controllers
installed in a slot use 1.5 loads.
● Pronounced: Pea-Sea-EYE.
AGP The AGP (Accelerated Graphics Port) bus was developed by Intel specifically to
support high-performance video requirements, especially fast 3D graphics.
● Physical characteristics of cards: Brown slot on the system board. AGP 1.0 is a
1x/2x slot. This is the shortest of the AGP slots with a small separator that
divides it into two sections. AGP 2.0 is a 2x/4x slot that has extra pins at one
end. There is also an AGP Pro Slot. See www.tomshardware.com/graphic/
20000922/agppro-01.html for a complete description of the AGP Pro slot.
● Used for: Video cards in systems that support the AGP chipset. The system board
needs an AGP bus slot or an integrated AGP chip.
● Number of data lines: 32 bits wide with a throughput of 266 MBps for AGP 1.0.
Faster modes with throughput of 533 MBps are available on AGP 2.0 and 1.07
GBps for AGP Pro.
● Communication method: Directly accesses RAM rather than needing to transfer
data to video RAM first.
● Pronounced: A-G-P.
Internal Bus
Architecture Description
PCI-E The PCI Express bus is an implementation of the PCI bus that uses a faster serial
physical-layer communications protocol.
● Physical characteristics of cards: A PCI Express slot is designated by the number
of lanes it supports: An x1 slot supports a single lane, an x2 slot supports two
lanes, and so on. Theoretically, slots may be x1, x2, x4, x8, x12, or x16.
● Used for: High-speed graphics cards and high-speed network cards.
● Number of data lines: Each device has a serial connection consisting of one or
more lanes. Each lane offers up to 250 MBps of throughput. An x16 slot can
handle 4 GBps of bandwidth in one direction.
● Communication method: Local serial interconnection.
AMR An Audio/Modem Riser supports both audio and modem functionality. The slot and
its associated cards have two rows of 23 pins each and were primarily used for
software-based sound cards and modems (Winmodems). This technology has been
superseded by CNR.
CNR A Communications/Networking Riser supports audio, modem, and local area net-
work (LAN) functionality.
● Physical characteristics of cards: Two rows of 30 pins, with two possible pin
configurations. CNR Type A uses an 8-pin network interface, while Type B uses
a 16-pin interface. Both types carry USB and audio signals. The slot is often
brown and is usually located in the lower-left corner of the system board.
● Used for: Connecting audio, network, and modem cards, but is being phased out
in favor of on-board or embedded components.
The PCI slots in a computer are often shared PCI/ISA slots. They share a single opening on
the back of the case, so if you install an ISA card in one of the slots, you cannot use the PCI
slot unless you first remove the ISA card.
Step Description
Plug-and-play installation For the most part, PnP BIOS and Windows XP automatically
configure all PnP adapters for you.
Manufacturer driver In the event that Windows doesn’t automatically detect an
adapter, you can point to a driver from the manufacturer on
floppy disk or CD-ROM, or get the driver from the manufac-
turer’s website.
Add Hardware Wizard You can use the Add Hardware Wizard to install and config-
ure PnP devices. You find the Add Hardware Wizard by
opening Control Panel, clicking the Printers And Other Hard-
ware link, and then clicking the Add Hardware link.
Hardware Scan When using the wizard, you should initially let Windows try
to scan for new hardware (this is the default selection).
Device list If Windows can’t find the device, you can then choose the
device from a list of devices offered by Windows and Win-
dows will install the appropriate driver.
Read the installation instructions for the adapter card to determine if any software is required
prior to the installation. Failure to do so could cause the installation to fail or the adapter and
system to behave erratically.
Hardware Resources
All hardware added to the system needs to have resources assigned to enable it to store infor-
mation and communicate with the CPU. Modern computer systems manage assignment of
hardware resources automatically, but in older computers, it was necessary to assign them
manually using jumper or DIP switches or software settings. Conflicting hardware settings
often caused device problems, but resource conflicts are rarely an issue now.
There are several categories of hardware resources.
IRQ Settings
This table shows the default IRQ assignments for the early 8-bit ISA bus and for the current
16-bit systems. Note that some IRQs are shared between two components.
An IRQ controller chip manages the first eight IRQs. The CPU answers the interrupts in
numerical priority order, starting with IRQ 0 (the system clock) and cycling through IRQ 7.
On a 16-bit system, the eight additional IRQs reside on a second IRQ controller chip, which
itself uses interrupt 2 on the first controller chip. Thus, the IRQ priority order becomes 0, 1,
(8, 9, 10, 11, 12, 13, 14, 15), 3, 4, 5, 6, 7.
DMA Assignments
The following table shows the standard DMA assignments for various system components.
ACTIVITY 4-5
Identifying System Parameters
Scenario:
In preparation for adding a new device to your system, you want to check the current com-
munication parameter assignments.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
c. Click System.
Often, it will be easier to insert one end of the card first, then tilt the card down into place
along the rest of the connector. It is best to start by inserting the end of the connector
away from the cover plate.
ACTIVITY 4-6
Installing Adapter Cards
Setup:
You have open ISA, PCI, and AGP slots on the system board. You have been given one or
more of the following card types and device drivers: ISA, PCI, or AGP card.
Scenario:
You have been asked to install several expansion cards in a user’s system. The appropriate
drivers for the card are also available to you should you need them.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Open the system cover and access a. Turn off the system power.
the slots.
b. Unplug the computer from the electri-
cal outlet.
3. Configure the card for the a. Reconnect the peripherals and cables
computer. you disconnected in step 1.
4. Verify that the card is functioning a. Connect any devices to the card that
properly. are required for testing the card
functionality.
1. Which of the following adapter cards provide interfaces necessary to connect SCSI,
serial, USB, and parallel devices for data input and output?
a) Input/output adapters
b) Multimedia adapters
c) Video adapters
d) Modem adapters
2. True or False? Before attempting to install an adapter card, verify that the computer
has an available slot that matches the adapter card’s bus type.
True
False
TOPIC D
Install and Configure Multimedia Devices
In the last topic, you installed and configured adapter cards to support additional computer
functionality. Once you have the right adapters in place, you can add other peripheral compo-
nents to enable users to take full advantage of the capabilities of their personal computers. In
this topic, you will install multimedia devices.
As an A+ technician, you might support corporate users, such as marketing or sales representa-
tives, who will need to create multimedia business presentations. Or, you might work for a
retail computer outlet, supporting home users who like to play music and games on their PCs.
In either case, the users will need a lot of different devices, connected to a number of different
computer ports that are often poorly marked. In either case, the users will rely on you to con-
nect and configure their multimedia devices, such as speakers and microphones, to the PC.
Multimedia Devices
Definition:
A multimedia device is a computer peripheral or internal component that transfers sound or
images to or from a personal computer. These kinds of devices are often connected to a per-
sonal computer by a sound card. Multimedia devices can be input devices or output devices.
Example:
Multimedia Connectors
There are several types of cables and connectors used with common multimedia devices.
Device Considerations
Digital cameras What type of output does the user need from the camera? If the user plans to
use the images only for viewing online, you can select a lower quality
(fewer megapixels) camera. If the user also wants to print the images, par-
ticularly if the user wants large prints (such as 11” x 17” and higher), you
should select a camera with as many megapixels as the user can afford.
Keep in mind that you also need to have a strategy for the user to download
the camera’s photos to the computer. Common techniques you can use
include:
● Connecting the camera directly to the computer via a USB or FireWire
port.
● Using a memory card reader that connects to a USB or FireWire port.
Be aware that FireWire connections provide you with the fastest transfer
speeds.
Device Considerations
Sound cards Sound cards are responsible for translating digital music into analog signals.
Sound cards differ in five basic areas:
● Processor: Handles the communications between the music application,
Windows, and the processor. Higher-end processors offload the processing
of music from the CPU and thus provide better performance. You should
also look for mid- to higher-end processors that support surround sound
(assuming the user needs this capability).
● Number of speakers supported: Higher-end sound cards add support for
five or more speakers, including a subwoofer. If the user needs (or wants)
surround sound, make sure you get a sound card with support for at least
five speakers.
● Recording quality: Higher-end sound cards eliminate substantial amounts
of noise recorded through a microphone. Look for the sound card’s
signal-to-noise ratio; this number, which is measured in decibels, indicates
the quality of the signal. A lower number indicates a lower quality for
recording. Mid-range sound cards offer a signal-to-noise ratio of 30 to 50
decibels; high-end cards offer a 96 to 100 signal-to-noise ratio, which is
very close to ratios for equipment used by professional musicians.
● Jacks: Sound cards come with a minimum of three connections—one for
speakers (typically green), one for a microphone (typically pink), and one
for secondary output called Line Out (typically green) that enables you to
connect devices such as a CD player. Higher-end sound cards offer con-
nections for components such as rear surround sound speakers, digital
speaker systems, and joysticks or MIDI devices. Newer sound cards can
also have a Digital Audio output, sometimes an input, jack. These can be
either RCA type, or S/PDIF (Sony/Phillips Digital Interface).
● Additional features: Because so many computer manufacturers now build
sound capabilities into motherboards, many sound card manufacturers add
extended features to their cards in order to justify their purchase. These
features might include digital output so that you can integrate the com-
puter into a home entertainment system or FireWire connections so that
you can play MP3 recordings directly from an MP3 device. Higher-end
sound cards also offer higher-quality recordings from musical instrument
digital interface (MIDI) devices.
Microphones Users use microphones to complete tasks such as making phone calls via the
Internet and to dictate to the computer using voice recognition software. For
such users, the higher the quality of the microphone, the better they will be
able to accomplish these tasks.
Device Considerations
Speakers If users plan to listen to music or play games on a computer, it’s important
to help them select higher-quality speakers. Key speaker standards include:
● Stereo: Specifies a left and right speaker that connect directly to a single
jack in a sound card. These types of speakers are usually the least
expensive.
● 2.1 Systems: Specifies a pair of stereo speakers plus a subwoofer. These
systems do not support surround sound.
● 5.1 Systems: Specifies five channels of sound, including front-left, front-
center, front-right, rear-left, and rear-right speakers, plus a subwoofer.
● 7.1 Systems: Specifies seven channels of sound, including front-left,
front-center, front-right, middle-left, middle-right, rear-left, and rear-right
speakers, plus a subwoofer.
Consideration Description
Adapter card slots If you’re installing a sound card, do you have an available slot on the
motherboard? Also, try to locate this adapter in such a way as to
avoid reducing the airflow in the computer.
Device drivers Do you have the appropriate device drivers for the computer’s oper-
ating system? If not, download them before starting the installation.
Cables Do you have the necessary cables (and long-enough cables) to con-
nect devices such as speakers and locate them where the user wants
them?
Cameras and card readers Although you can connect a digital camera directly to a computer to
download its photos, doing so increases the wear and tear on the
camera. You should use a memory card reader instead. The user will
also see faster download performance when downloading photos
using a memory card reader.
Read the installation instructions for the device to determine if any software is required prior to
the installation. Failure to do so could cause the installation to fail or the device and system to
behave erratically.
ACTIVITY 4-8
Installing Multimedia Devices
Setup:
If your computer does not have integrated (onboard) sound support, a sound card has been
installed in your computer.
Scenario:
A group in the marketing department is responsible for creating and presenting audio visual
presentations. These users have sound cards installed in their systems. They all have speakers
and microphones connected to their sound cards. Some of them also have MIDI instruments
and instruments that connect through an eighth-inch stereo jack. The users have just received
these sound devices and want to begin using them.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. Connect a microphone to the MIC a. Locate the MIC jack on the computer.
jack.
b. Connect the microphone to the MIC
jack.
1. When installing multimedia devices, how do you connect an external device to the
system?
a) Connect it to the line jack.
b) Connect it to the MIC jack.
c) Connect it through the game port.
d) Connect it to the jack on the sound card.
2. True or False? When installing a sound card, you don’t have to worry about the
available slots on the motherboard.
True
False
Lesson 4 Follow-up
In this lesson, you installed and configured peripheral computer components. The ability to
successfully install and configure computer components is an integral part of a computer tech-
nician’s job.
1. What types of peripheral components will you be required to install most often in
your job?
2. Will you be responsible for configuring specialty input devices at your workplace?
Lesson Objectives:
In this lesson, you will install and configure system components.
You will:
● Select, install, and configure storage devices.
● Install and configure power supplies.
● Install and configure memory.
● Install and configure CPUs.
● Install and configure system boards.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
In the last lesson, you installed and configured peripheral components such as display devices,
input devices, adapter cards, and multimedia devices. As an A+ technician, you will also be
asked to install internal system components such as storage devices, power supplies, memory,
processors, and system boards. In this lesson, you will install and configure system
components.
Much of the work that you will perform as a personal computer technician will involve install-
ing and configuring various hardware and software components. These skills are particularly
important for internal system devices that users cannot install themselves. It will be your pro-
fessional responsibility to know the technical specifications for these components and to install
and configure them correctly.
This lesson covers all or part of the following CompTIA A+ certification objectives:
● Topic A:
■ Exam 220-601 (Essentials): Objective 1.1, Objective 1.2, Objective 2.2, Objective 3.1
■ Exam 220-602 (IT Technician): Objective 1.1, Objective 3.1
■ Exam 220-603 (Remote Technician): Objective 2.1
■ Exam 220-604 (Depot Technician): Objective 1.1, Objective 2.2
● Topic B:
■ Exam 220-601 (Essentials): Objective 1.1
■ Exam 220-602 (IT Technician): Objective 1.1, Objective 1.2
■ Exam 220-604 (Depot Technician): Objective 1.1, Objective 1.2
● Topic C:
■ Exam 220-601 (Essentials): Objective 1.1
■ Exam 220-602 (IT Technician): Objective 1.1
■ Exam 220-604 (Depot Technician): Objective 1.1
● Topic D:
■ Exam 220-601 (Essentials): Objective 1.1
■ Exam 220-602 (IT Technician): Objective 1.1
■ Exam 220-604 (Depot Technician): Objective 1.1
● Topic E:
■ Exam 220-601 (Essentials): Objective 1.1
■ Exam 220-602 (IT Technician): Objective 1.1
■ Exam 220-604 (Depot Technician): Objective 1.1
TOPIC A
Install and Configure Storage Devices
In this lesson, you will install and configure system components. Storage devices such as hard
disks are one of the most common system components you will install. In this topic, you will
install and configure storage devices.
Users rely on local storage devices to keep their applications and data current and available.
As an A+ technician, your responsibilities are likely to include installing and configuring dif-
ferent types of storage devices to provide your users with the data-storage capabilities that they
need to perform their jobs.
When you install PATA drives, you use jumpers to set the master/slave or Cable Select
configuration. Most drives today come preset for Cable Select, which allows the BIOS to con-
figure itself as needed.
PIO Modes
The ATA and ATA-2 standards use the Programmed Input/Output Mode (PIO Mode) to indicate
the speed of data transfer between two devices that use the computer’s processor as a part of
the datapath. The PIO Mode is set in the BIOS. It is originally set when you install an IDE or
EIDE drive. The following table lists the transfer rate for several ATA and ATA-2 standards.
The manufacturer can use any physical interface, but must have an embedded controller that
uses the ATA interface controller to connect the drive directly to the ISA bus.
The original IDE specification did not support CD-ROMs or hard drives larger than 528 or 504
MB. However, revisions of the specifications over the years have extended the capabilities to
provide support for faster and larger hard drives. The following table describes ATA
specifications.
Standard Description
ATA The original ATA specification supported one channel, with two
drives configured in a master/slave arrangement. PIO modes 0, 1,
and 2 were supported, as well as single-word DMA modes 0, 1, and
2 and multi-word DMA mode 0. No support for non-hard disk
devices was included, nor were block mode transfers, logical block
addressing, and other advanced features.
ATA-2 Also known as the Advanced Technology Interface with Extensions.
Western Digital’s implementation was called Enhanced IDE (EIDE).
Seagate’s implementation was called Fast ATA or Fast ATA-2. Sup-
ports PIO modes 3 and 4 and two multi-word modes, 1 and 2, all of
which are faster than the modes supported by the original ATA
specification. Support for 32-bit transactions. Some drives supported
DMA. Could implement power-saving mode features if desired.
Specification also covered removable drives.
ATA-3 Minor enhancement to ATA-2. Improved reliability for high-speed
data transfer modes. Self Monitoring Analysis And Reporting Tech-
nology (SMART) was introduced. This is logic in the drives that
warns of impending drive problems. Password protection available
as a security feature of the drives.
ATAPI AT Attachment Packet Interface is an EIDE interface component
that includes commands used to control tape and CD-ROM drives.
ATA-4 Also known as Ultra-DMA, UDMA, Ultra-ATA, and Ultra DMA/33.
Doubled data transfer rates. Supported ATAPI specification.
ATA-5 The ATA-5 specification introduced Ultra DMA modes 3 and 4, as
well as mandatory use of the 80-pin, high-performance IDE cable.
Additional changes to the command set were also part of this
specification. Supports drives up to 137 GB.
ATA-6 Supports Ultra DMA/100 for data transfers at up to 100 MB/second.
Supports drives as large as 144 PB (petabytes), 144 million MB, or
144 quadrillion bytes.
PIO Programmed Input/Output is a data transfer method that includes the
CPU in the data path. It has been replaced by DMA and Ultra
DMA.
DMA Direct Memory Access is a data transfer method that moves data
directly from the drive to main memory. Ultra DMA Transfers data
in burst mode at a rate of 33.3 MB per second. The speed is two
times faster than DMA.
Ultra DMA 100 Also known as ATA-100, this standard supports data transfers in
burst mode at a rate of 100 MB per second.
Standard Description
Serial ATA Uses serial instead of parallel signaling technology for internal ATA
and ATAPI devices. Serial ATA employs serial connectors and serial
cables, which are smaller, thinner, and more flexible than traditional
parallel ATA cables. Data transfer rates are 150 MB per second or
greater.
Serial ATA II Also known as SATA 3.0, SATA 3.0 Gb/s, and SATA/100. Provides
data transfer rates of 300 MB/sec.
SCSI Standards
SCSI standards have been revised repeatedly over the years. The following table describes cur-
rent SCSI standards.
SCSI Stan-
dard Description
SCSI-1 Features an 8-bit parallel bus (with parity), running asynchronously at 3.5
MB/s or 5 MB/s in synchronous mode, and a maximum bus cable length of
6 meters, compared to the 0.45-meter limit of the Parallel ATA interface. A
variation on the original standard included a high-voltage differential (HVD)
implementation with a maximum cable length of 25 meters.
SCSI-2 Introduced the Fast SCSI and Wide SCSI variants. Fast SCSI doubled the
maximum transfer rate to 10 MB/s, and Wide SCSI doubled the bus width
to 16 bits to reach 20 MB/s. Maximum cable length was reduced to 3
meters.
SCSI-3 The first parallel SCSI devices that exceeded the SCSI-2 capabilities were
simply designated SCSI-3. These devices were also known as Ultra SCSI
and Fast-20 SCSI. The bus speed doubled again to 20 MB/s for narrow (8
bit) systems and 40 MB/s for wide (16-bit). The maximum cable length
stayed at 3 meters.
Ultra-2 SCSI This standard featured a low-voltage differential (LVD) bus. For this reason
Ultra-2 SCSI is sometimes referred to as LVD SCSI. LVD’s greater immu-
nity to noise allowed a maximum bus cable length of 12 meters. At the
same time, the data transfer rate was increased to 80 MB/s.
Ultra-3 SCSI Also known as Ultra-160 SCSI, this version was basically an improvement
on the Ultra-2 SCSI standard, in that the transfer rate was doubled once
more to 160 MB/s. Ultra-160 SCSI offered new features like cyclic redun-
dancy check (CRC), an error correcting process, and domain validation.
Ultra-320 SCSI This standard doubled the data transfer rate to 320 MB/s.
Ultra-640 SCSI Also known as Fast-320 SCSI, Ultra-640 doubles the interface speed yet
again, this time to 640 MB/s. Ultra-640 pushes the limits of LVD signaling;
the speed limits cable lengths drastically, making it impractical for more
than one or two devices.
SCSI Stan-
dard Description
Serial SCSI Four versions of SCSI (SSA, FC-AL, IEEE 1394, and Serial Attached SCSI,
or SAS) perform data transfer via serial communications. Serial SCSI sup-
ports faster data rates than traditional SCSI implementations, hot swapping,
and improved fault isolation. Serial SCSI devices are generally more expen-
sive than the equivalent parallel SCSI devices.
iSCSI iSCSI provides connectivity between SCSI storage networks over an
IP-based network without the need for installing Fibre Channel.
Network-Attached Storage
In contrast to Storage Area Networks, network-attached storage (NAS) refers to storage devices
that are dedicated storage servers. These devices enable users to access their data even when
other servers are down. The drawback to NAS devices is that their performance depends on
the speed of and traffic on your existing network.
Although 3.5 inches is the current standard for floppy disks and drives, 5.25-inch floppy disks
and drives were once standard, but are now seen on only the very oldest computers still in
use.
Write Protection
Floppy disks can be protected so that you cannot write over data on the disk. On the back side
of the floppy disk, you will see a slider in the upper-left corner. If the slider is pushed down, it
blocks the write-protect hole and enables you to write to the floppy disk. If the slider is pushed
up and the write-protect hold is visible, you will not be able to write to the disk.
Optical
Drive Specifications
CD Compact discs store data on one side of the disc and most hold up to 700 MB of data,
although older discs may only hold up to 650 MB of data. (Some CDs can hold up to
1 GB.) CDs are widely used to store music as well as data. To meet the audio CD
standard, the CD drive on a computer must transfer data at a rate of at least 150 kilo-
bytes per second (150 KB/sec). Most CD drives deliver higher speeds: at least twice
(2X, or double speed) or four times (4X, or quad speed) the audio transfer rate. There
are also drives with much higher transfer rates. CD drives use one of two special file
systems: CDFS (Compact Disc File System) or UDF (Universal Disc Format).
DVD Digital video discs can typically hold 4.7 GB on one side of the disc; it is possible to
write to both surfaces of the disc, in which case the disc can hold up to 9.4 GB. DVD
drives access data at speeds from 600 KB/sec to 1.3 MB/sec. Because of the huge
storage capacity and fast data access, DVD discs are widely used to store full-length
movies and other multimedia content. DVD drives use UDF as the file system.
Berg
Molex connectors are used to supply power to Parallel
ATA drives, optical drives, and SCSI drives.
Molex
SATA power connectors are used to supply power to
Serial ATA drives.
Hot Swapping
Definition:
Hot swapping is a type of hardware replacement procedure where a component can be
replaced while the main power is still on. Also called hot plug or hot insertion, hot swap is a
feature of USB and FireWire devices, enabling you to install an external drive, network
adapter, or other peripheral without having to power down the computer. Hot swapping can
also refer to the system’s ability to detect when hardware is added or removed.
Windows Plug and Play facilitates hot swapping by recognizing new devices and installing the
needed drivers.
Example:
Drive Images
Definition:
A drive image is a computer file containing the complete contents and structure of a data-
storage medium or device. Often used in disk cloning, or the transfer of one hard disk’s
contents to another disk, drive images can streamline the setup of new computers, the installa-
tion of operating systems and applications, and the replacement of an installed hard drive. Disk
imaging software is sometimes included when you buy a hard disk drive, and more generic
third-party solutions are also available.
Example:
To create a dual-boot system, you might need to create a partition for each operating system
that you want to install. However, you could also implement what is known as hardware virtual
machines, where virtualization software can enable you to run several different operating sys-
tems on one machine. Examples of virtualization software include VMware® and Microsoft
Virtual PC.
Disk Partition
Type Description
Primary A disk partition that can contain one file system or logical drive. Sometimes
referred to as volumes.
Active A primary partition that is bootable and holds the operating system.
Extended An extended partition can contain several file systems, which are referred to as
logical disks or logical drives.
Logical A part of a physical disk drive that has been partitioned and allocated as an
independent unit and functions as a separate drive.
You are generally limited to four partitions per hard disk. If you need more partitions on a disk,
you can make one of them an extended partition, and then create logical drives within it as
necessary.
Format Types
There are two types of formatting for hard disks:
● Low-level formatting is the process of writing track and sector markings on a hard disk.
This level of formatting is performed when the hard disk is manufactured.
● High-level formatting is an operating system function that builds file systems on drives
and partitions. It tests disk sectors to verify that they can be reliably used to hold data. It
marks any unreliable sectors as bad sectors which cannot be used.
Factor Description
Placement Make sure you place the storage device where it will get good air flow to avoid
overheating the device.
Total air flow Make sure there’s enough total air flow to handle whatever heat the new storage
device will add to the computer.
Power Make sure that the storage device won’t cause the computer to exceed the capac-
ity of its power supply.
Device drivers Make sure that you have the appropriate device drivers for the operating system
of the computer on which you plan to install the new storage device. If necessary,
download the device drivers from the device manufacturer’s website.
Keep in mind that you can’t install a SATA hard drive on a PATA controller.
b. Does the computer have an available power supply cable to supply power to the
device? If it doesn’t, you can’t add another internal storage device to the computer.
You must add an external device.
c. Does the computer have an available drive bay for the storage device? Most hard
drives require a 3.5” drive bay; most tape drives, optical drives, and floppy drives
require a 5.25” drive bay. If you want to install a hard drive in a 5.25” drive bay,
you will need drive rails.
d. Do you have the necessary data cables to connect the storage device to the control-
ler?
3. If you want to install an external storage device, ask yourself the following questions:
a. What interface does the external storage device require (USB, FireWire, or SCSI)?
● If the external storage device uses USB 2.0, does the computer support it?
● If the external storage device uses FireWire, is there an available FireWire port
in the computer? If not, you must buy and install a Firewire controller. Make
sure the computer has an available slot for the FireWire controller before pur-
chasing one.
● If the external storage device uses SCSI, is there room on the SCSI chain for an
additional device?
b. Do you need a cable to connect the external storage device to the computer?
c. Do you have an available source of power for the storage device?
4. If you are installing additional hard drives in order to increase the computer’s reliability,
do you have a controller that supports a Redundant Array of Independent Disks (RAID)?
If not, the computer must use an operating system that supports RAID (Windows 2000,
Windows XP, Windows Server 2003, or Windows Vista). Note that it would be quite
unusual to implement RAID on a desktop system.
8. Prepare the new hard disk drive for use. If you are installing an additional hard drive, you
can use Windows Disk Management to prepare the new drive.
a. Log on to Windows.
b. Open Computer Management.
c. In the left pane, click Disk Management.
d. Right-click the new disk, and choose New Partition.
e. Follow the New Partition Wizard prompts to partition and format the new drive.
f. Close the Computer Management console.
9. If necessary, transfer data to the new disk. You can use disk imaging software to accom-
plish this.
Prepare the new hard disk drive for use. If you are installing an additional hard drive, you
can use Windows Disk Management to prepare the new drive.
a. Log on to Windows.
b. Open Computer Management.
c. In the left pane, click Disk Management.
d. Right-click the new disk, and choose New Partition.
e. Follow the New Partition Wizard prompts to partition and format the new drive.
f. Close the Computer Management console.
8. If necessary, transfer data to the new disk. You can use disk imaging software to accom-
plish this.
9. Prepare the new hard disk drive for use. If you are installing an additional hard drive, you
can use Windows Disk Management to prepare the new drive.
a. Log on to Windows.
b. Open Computer Management.
c. In the left pane, click Disk Management.
d. Right-click the new disk, and choose New Partition.
e. Follow the New Partition Wizard prompts to partition and format the new drive.
f. Close the Computer Management console.
10. If necessary, transfer data to the new disk. You can use disk imaging software to accom-
plish this.
If the floppy disk drive is inside a cage, removing the drive can be more compli-
cated than this.
2. If the tape drive should be installed internally, shut down the computer, unplug all periph-
erals and the power cord, and open the computer case. You might also need to remove the
front cover.
3. If necessary, install the Parallel ATA tape drive.
a. Locate an available drive bay, Parallel ATA data connection on the Parallel ATA con-
troller cable, and a power connector.
b. Set the jumpers for cable select, master, or slave, as appropriate to your needs. There
is usually a sticker on the top of the drive that specifies the jumper settings for each
of these settings. If there is not a sticker, then the documentation for the drive will
include this information.
c. If necessary, attach rails to the drive to fit in the drive bay.
d. Slide the drive into the bay, and then connect the controller and power cables.
e. Restart the system, and if necessary, access CMOS setup to specify the drive type.
f. Verify that you can write data to and read data from the tape drive.
4. If necessary, install the SCSI tape drive.
a. Set the drive ID on the drive. A sticker on the drive or the drive documentation will
show how to set the ID and any other settings required to successfully install the
drive.
b. Determine which device is at the end of the chain and terminate each end of the
chain. Remove termination from any other devices in the SCSI chain.
c. Insert the drive in an available drive bay. If you are using a 5.25-inch drive bay and
a 3.5-inch drive, you will need to install the drive using rails to adapt the drive to the
larger bay.
d. Connect the SCSI cable from the host bus adapter to the drive.
e. Connect the power cable to the drive.
f. Restart the system. If prompted, access CMOS setup and set the disk type, and then
exit CMOS and save the settings.
g. Verify that you can write data to and read data from the tape drive.
5. If necessary, install the external tape drive.
a. Some devices require that you install the drivers before connecting the device to the
system. Read the documentation that came with your device before proceeding.
b. With the computer and device turned off, connect the appropriate cable between the
device and the system.
c. If necessary, connect the AC adapter to the device and plug it into an electrical
outlet.
d. Turn on the device and the computer.
e. If necessary, install appropriate drivers for the device.
f. Verify that you can write data to and read data from the tape drive.
1. You have been asked to order an internal hard drive for one of the customer’s
computers. The customer has heard about the increased performance of SATA
drives and would like you to purchase one for the computer. What question should
you ask first before ordering a new SATA hard drive?
a) Does the computer have an available drive bay for the drive?
b) Does the computer have an available power supply cable for the new drive?
c) Does the computer have existing storage devices?
d) Do you have the necessary data cable to connect the drive to the controller?
2. True or False? You can attach a Serial ATA hard drive as a second drive on a Parallel
ATA data cable.
True
False
3. A user wants to transfer several megabytes of data between two computers that are
not connected by a network. What storage device would you recommend?
a) A USB thumb drive.
b) A floppy disk.
c) An external tape drive.
d) An internal optical drive.
ACTIVITY 5-2
Installing Internal Storage Devices
Setup:
To complete this activity, you will need the following hardware components. If you do not
have these available, you can remove and reinstall the existing hardware.
● A second hard drive and an empty drive bay. If you have a Parallel ATA drive, you will
also need an available connection on the Parallel ATA cable. If you have a SCSI drive,
you will also need an installed SCSI host bus adapter (HBA).
● A floppy disk drive that is compatible with your system.
● An optical drive that is compatible with your system.
● Available power connections for the devices you are adding to the system.
● Optionally, rails to allow smaller drives to fit into larger drive bays.
Scenario:
You have been assigned the task of refurbishing a computer for a user. This computer has a
single functioning hard drive, a floppy disk drive that needs to be replaced, and an optical
drive that needs to be replaced. The user needs a significant amount of local storage space,
and the following internal storage devices have been allocated for use in this project:
● A second hard disk drive
● A floppy drive
● A Parallel ATA optical drive
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Locate available bay, power, and a. Power off the system, unplug all
data connection resources for the peripherals and the power cord, and
new hard disk drive. open the computer case.
2. Prepare the drive for installation. a. If you are installing a Parallel ATA drive,
set the jumpers or switches to Cable
Select or Slave.
3. Install the hard disk drive into the a. Slide the drive into the bay.
system.
b. Connect the data cable to the drive.
4. Verify that the drive is accessible. a. Plug all peripherals back into the
system.
f. Click Next.
k. Click Finish.
6. Remove the floppy disk drive from a. Shut down the computer, and unplug
the computer. the power cord from the power supply.
7. Connect the new floppy drive to a. Insert the floppy disk drive into its bay.
the system.
b. Mount the floppy disk drive to the
chassis using the appropriate screws,
brackets, or clips.
8. Remove the old optical drive from a. Shut down the computer, and unplug
the computer. the power cord from the power supply.
9. Install the new optical drive in the a. If you are installing a Parallel ATA optical
computer. drive, examine the controller cable con-
nectors and the jumper block for
master/slave configuration on the rear
of the drive. Verify that the optical drive
is set as master/single.
TOPIC B
Install and Configure Power Supplies
In the previous topic, you installed and configured storage devices. The next system compo-
nents you’ll focus on are power supplies. In this topic, you will install and configure a power
supply in a computer.
Underpowered systems, especially older systems with relatively small power supplies, can
experience lockups, random reboots, and other quirky behavior. If you are upgrading compo-
nents, you might exceed the capacity of the current power supply. Replacing it with an
adequate power supply can prevent system power problems and keep the number of support
calls down.
Power Requirements
Each component in a personal computer has different power requirements.
Although most devices require specific voltages, some devices have different voltage require-
ments depending on use. This is particularly true of memory chips, which vary in voltage
requirements from 1.8 V to 3.3 V, and some can actually function at different voltages (voltage
range).
CPU Voltages
Even some of the most powerful current CPUs, such as the Intel Core2 Extreme and the AMD
Opteron Dual Core, only use 1.1-1.3 V. Necessary voltage for CPU and RAM is usually
detected by the motherboard (BIOS) and configured appropriately, but sometimes you have to
manually configure it, by accessing the BIOS and entering the appropriate values. The Power
supply will supply 3.3 V for the CPU, RAM, and other devices, but the motherboard regulates
how much they actually get.
You should also make sure to cover empty slots in the system board with filler brackets. If you
do not install a filler bracket, you reduce the efficiency of the power supply’s fan and increase
the chances of the computer overheating.
Criteria Explanation
Power supply rating Make sure that you don’t overload the power supply. Add up the total system
requirements for power and then select a power supply that can meet the
computer’s demands.
Form factor Verify that the power supply will fit in your computer’s case and conform to
your system board’s form factor.
Cooling Ensure that the power supply you select can adequately cool the components
within the computer’s case.
When installing new equipment, always follow the instructions included with the device from
the manufacturer.
To test it, turn on the system, and then try using the components to verify that they are
properly powered. Be sure to test all drives, network connections, and any powered
devices. You can also test the output with a multimeter.
ACTIVITY 5-3
Replacing a Power Supply
Setup:
You have a power supply to install into the system. If you don’t have another power supply,
you can just reinstall the one you take out.
Scenario:
After calculating the power needed for all of the components added to a user’s system, you
have determined that it exceeds the capacity of the installed power supply.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Remove the existing power supply. a. Shut down and turn off the system.
2. Install the replacement power a. Insert the power supply into the case.
supply.
b. Secure the power supply to the case.
b. Log on as Administrator.
1. When determining the amount of power needed for a computer system, which com-
ponents should you include?
a) CPU
b) RAM
c) System board
d) Expansion cards
e) Peripheral devices
2. When installing and configuring a power supply, what step should you complete
first?
a) Unplug the power supply from the system board.
b) Unplug the electrical power cord from the electric outlet and from the power supply.
c) Toggle the power switch on the computer on and off to discharge any remaining
electricity stored in the computer’s capacitors.
d) Shut down and turn off the system.
TOPIC C
Install and Configure Memory
In the last topic, you installed a power supply. Providing sufficient electrical power is one way
to ensure that system components run at an acceptable performance level, but it is not the only
solution you should consider. In this topic, you will install and configure memory.
Just as some people say you can never be too rich or too thin, you can never have too much
memory. Adding memory is one of the simplest and most cost effective ways to increase a
computer’s performance, whether it’s on a brand-new system loaded with high-performance
applications or an older system that performs a few basic tasks. One way or the other, upgrad-
ing the memory is a frequent task for any computer service professional.
Memory Modules
Definition:
A memory module is a printed circuit board that holds a group of memory chips that act as a
single memory chip. Memory modules reside in slots on the system board, and they are
removable and replaceable. Memory modules are defined by the number of chips they contain.
Example:
Memory Types
Random Access Memory (RAM) is the main memory. The computer can both read the data
stored in RAM and write different data into the same RAM. Any byte of data can be accessed
without disturbing other data, so the computer has random access to the data in RAM. RAM is
volatile and requires a constant source of electricity to keep track of the data it is storing. If
the electricity is cut off, RAM forgets everything.
There are several types of RAM.
RAM Speed
RAM speed is the time needed to read and recharge a memory cell. It’s measured in nanosec-
onds (ns). A nanosecond is one-billionth of a second. The smaller the number, the faster the
RAM. For example, 10 ns RAM is faster than 60 ns RAM.
RAM comes in ever-increasing speeds. The RAM on sale at the local computer store might
work just fine in your system, or it might be older, slower RAM they are trying to move out
of stock.
One of the popular memory manufacturers has an article on the speed of SDRAM at http://
crucial.com/library/sfiles4.asp. They also have another article on the PC100 Standard,
including a discussion on the speed of memory, at http://crucial.com/library/sfiles5.asp.
Older EDO RAM was often 60- to 70-ns speed RAM. Modern RAM that you are likely to
find runs at clock speeds of 100 MHz and 133 MHz. The 100 MHz RAM has a RAM speed
of 10 ns. The 133 MHz RAM has a RAM speed of 6 ns.
The SDRAM used in 168-pin DIMMs has access times in the 6 to 12 nanosecond range.
You need to check what RAM speed is currently installed. All of the RAM in the system runs
at the lowest common speed. It is backward-compatible, so it can run at the lower speed if it
finds slower RAM. Some systems will not run with mixed RAM speeds, but these are not
common. Either way, the RAM will not run any faster than the system board’s bus speed.
DRAM Banks
You can combine multiple rows of DRAM into a cluster called a bank. Each row of DRAM
can then be accessed simultaneously. When creating banks, the goal is to match the width of
the DRAM to the width of the CPU’s external data bus, which will generally be 8-bit, 16-bit,
32-bit, or 64-bit. Expressed another way, the number of SIMMs or DIMMs needed to create a
bank is the width of the CPU’s data bus divided by the width of the SIMM or DIMM. So, for
a CPU with a 32-bit data bus, you need four SIMMs to create a bank.
Types of ROM
ROM is memory that is non-volatile. The original ROM chips could not be altered after the
program code was placed on the ROM chip. As time went on, though, users needed the ability
to update the information stored on ROM chips. Over the years, various chips have been cre-
ated that perform the function of ROM, but can be updated one way or another. These are
referred to as programmable ROM (PROM). Types of ROM include:
● PROM: A blank ROM chip that is burned with a special ROM burner. This chip can be
changed only once. After the instructions are burned in, it cannot be updated or changed.
● EPROM (erasable PROM): Like PROM, except that the data can be erased through a
quartz crystal on top of the chip. After removing the chip from the system, a UV light is
used to change the binary data back to its original state, all 1s.
● EEPROM (electronically erasable PROM): A chip that can be reprogrammed using soft-
ware from the BIOS or chip manufacturer using a process called flashing. Also known as
Flash ROM. The chip does not need to be removed in order to be reprogrammed.
2. True or False? RAM will not run any faster than the system board’s bus speed.
True
False
4. In a system that contains RAM modules that run at 6 ns and 10 ns, what speed will
the RAM run at?
a) 4 ns
b) 10 ns
c) 6 ns
d) 16 ns
5. On a typical system with RAM that runs at a speed of 10 ns, you could add RAM that
runs at which speed?
a) 6 ns
b) 10 ns
c) 12 ns
6. The number of SIMMs or DIMMs needed to create a bank is the width of the CPUs
data bus divided by the width of the .
7. On a system with a CPU with a 64-bit data bus, how many SIMMs would you need to
create a bank?
a) 2
b) 4
c) 8
d) 16
8. On a system with a CPU with a 32-bit data bus, how many SIMMs would you need to
create a bank?
a) 2
b) 4
c) 8
d) 16
1. Review the computer’s current configuration to make sure that the computer’s memory
slots aren’t already full.
2. Determine how much RAM is currently installed so that you can determine afterwards if
the new RAM you installed is recognized. You can check the CMOS settings or use the
System Properties dialog box in Windows XP to verify the amount of RAM.
10. Verify that the additional memory was recognized by the system.
ACTIVITY 5-6
Adding RAM to a Computer
Scenario:
The computers your organization purchased have been performing sluggishly. Additional
RAM has been purchased for these computers.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the
C:\085820Data\Simulations\Lesson#\Activity#folder and double-clicking the executable
(.exe) file.
4. Verify that the additional memory a. Plug in the power cord and restart the
is recognized by the system. system.
1. True or False? If there are no empty memory expansion sockets on the system
board, you will need to remove an existing module and replace it with a module that
contains more memory.
True
False
2. Where can you verify how much RAM is currently installed on your computer?
a) System Properties
b) Component Services
c) Services
d) CMOS Settings
TOPIC D
Install and Configure CPUs
In the previous topics, you installed RAM. Another way to increase the performance of a per-
sonal computer is to install a second processor or upgrade the existing processor. In this topic,
you will install and configure processors.
Have you ever tried to get a new piece of software or a game to run only to find out that your
processor is too slow? If this happens to the users you support, they will want you to fix the
problem, which might mean upgrading the CPU. This might seem like a drastic measure, and
it can be expensive, but in some cases, it is less expensive to upgrade the CPU than it is to
purchase a new system if everything else in a user’s computer provides acceptable
performance.
Instruction Sets
An instruction set is the collection of commands that is used by a CPU to perform calculations
and other computing operations. Every manufacturer has its own instruction set.
There are three main categories of instruction sets used.
Cache Memory
Definition:
Cache memory, or CPU cache, is a type of memory that services the CPU. It is faster than
main memory and allows the CPU to execute instructions and read and write data at a higher
speed. Instructions and data are transferred from main memory to the cache in blocks to
enhance performance. Cache memory is typically static RAM (SRAM) and is identified by
level. Level 1 (L1) cache is built into the CPU chip. Level 2 cache (L2) feeds the L1 cache.
L2 can be built into the CPU chip, reside on a separate chip, or be a separate bank of chips on
the system board. If L2 is built into the CPU, then level 3 cache (L3) can be present on the
system board.
Example:
CPU Characteristic
or Technology Description
Bus width A CPU’s internal bus width is either 32 or 64 bits.
Clock speed The number of processing cycles that a microprocessor can perform in a
given second. Some CPUs require several cycles to assemble and perform a
single instruction, whereas others require fewer cycles. The clock speed is a
technical rating; actual performance speeds can vary from the published
clock speed rating.
Overclocking Configuring your system board to run at a speed greater than your CPU is
rated to handle. Doing so can cause the CPU to overheat, produce random
results, or be damaged or destroyed.
CPU speed CPU speed is an umbrella term for the overall rate at which instructions are
processed. There are two factors that affect the CPU speed. One is the core
clock speed, which is the internal speed at which instructions are processed
within the CPU. The other is the bus clock speed, which is the speed at
which instructions are transferred to the system board.
Throttling To adjust CPU speed. A CPU throttle is typically used to slow down the
machine during idle times to conserve battery or to keep the system running
at a lower performance level when hardware problems have been
encountered.
Hyperthreading A feature of certain Pentium 4 chips that makes one physical CPU appear
as two logical CPUs. It uses additional registers to overlap two instruction
streams to increase the CPU’s performance by about 30%.
Dual core A single chip that contains two distinct CPUs that process simultaneously.
The first dual core chips for x86-based PCs and servers were introduced in
2005.
Cache Dedicated high-speed memory for storing recently used instructions and
data.
Voltage Regulator Module VRM is a replaceable module used to regulate the voltage fed to the CPU.
Multimedia Extensions MMX is a set of additional instructions, called microcode, to support sound,
video, and graphics multimedia functions.
Processor Specifications
The following table summarizes some of the specifications for popular processors.
Name Characteristics
80386DX ● No L2 cache
● Internal Bus Width: 32 bits
● System Data Bus Width: 32 bits
● System Address Bus Width: 32 bits
● Clock Speed: 16–40 MHz
● Addressable RAM: 4 GB
80386SX ● No L2 cache
● Internal Bus Width: 32 bits
● System Data Bus Width: 16 bits
● System Address Bus Width: 24 bits
● Clock Speed: 16–33 MHz
● Addressable RAM: 16 MB
80486DX ● Up to 256 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 32 bits
● System Address Bus Width: 32 bits
● Clock Speed: 25–50 MHz
● Addressable RAM: 4 GB
80486SX ● Up to 256 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 32 bits
● System Address Bus Width: 32 bits
● Clock Speed: 16–33 MHz
● Addressable RAM: 4 GB
80486DX2 ● Up to 256 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 32 bits
● System Address Bus Width: 32 bits
● Clock Speed: 50–80 MHz
● Addressable RAM: 4 GB
80486DX4 ● Up to 256 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 32 bits
● System Address Bus Width: 32 bits
● Clock Speed: 75–120 MHz
● Addressable RAM: 4 GB
Name Characteristics
AMD 5x86 ● Up to 256 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 32 bits
● System Address Bus Width: 32 bits
● Clock Speed: 133 MHz
● Addressable RAM: 4 GB
Cyrix 5x86 ● Up to 256 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 32 bits
● System Address Bus Width: 32 bits
● Clock Speed: 100–200 MHz
● Addressable RAM: 4 GB
Pentium ● 256 KB to 512 KB L2 cache on the system board
● Support for the installation of up to two processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32 bits
● Clock Speed: 60–200 MHz
● Addressable RAM: 4 GB
Pentium MMX ● 256 KB to 512 KB L2 cache on the system board
● Support for the installation of up to two processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32 bits
● Clock Speed: 166–233 MHz
● Addressable RAM: 4 GB
Cyrix 6x86 ● 256 KB to 512 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32 bits
● Clock Speed: 100–150 MHz
● Addressable RAM: 4 GB
AMD K5 ● 256 KB to 512 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32 bits
● Clock Speed: 75–116 MHz
● Addressable RAM: 4 GB
Name Characteristics
Pentium Pro ● 256 KB to 1 MB L2 cache integrated within the CPU
● Support for the installation of up to four processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 36 bits
● Clock Speed: 150–200 MHz
● Addressable RAM: 64 GB
Pentium II ● 512 KB L2 integrated cache
● Support for the installation of up to two processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 36 bits
● Clock Speed: 233–333 MHz
● Addressable RAM: 64 GB
AMD K6 ● 256 KB to 1 MB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32 bits
● Clock Speed: 166–266 MHz
● Addressable RAM: 4 GB
Cyrix 6x86 MX ● 256 KB to 512 KB L2 cache on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32 bits
● Clock Speed: 150–187 MHz
● Addressable RAM: 4 GB
Celeron ● 128 KB L2 cache on–die
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32, 36 bits
● Clock Speed: 266 MHz–1.3 GHz
● Addressable RAM: 4 GB, 64 GB
Pentium II Xeon ● 512 KB to 2 MB L2 cache on the system board
● Support for the installation of up to eight processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 36 bits
● Clock Speed: 400–450 MHz
● Addressable RAM: 64 GB
Name Characteristics
Pentium III ● 256 KB on-die, 512 KB L2 cache on the system board
● Support for the installation of up to two processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 36 bits
● Clock Speed: 450 MHz–1.4 GHz
● Addressable RAM: 64 GB
Pentium III Xeon ● 256 KB to 2 MB L2 integrated cache
● Support for the installation of up to eight processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 36 bits
● Clock Speed: 600–1 GHz
● Addressable RAM: 64 GB
Pentium 4 ● 256 KB on-die L2 cache
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 32 bits
● Clock Speed: 1.3 GHz–2.4 GHz
● Addressable RAM: 4 GB
Itanium ● 96 KB on-die, plus 2 to 4 MB L3 cache
● Support for the installation of up to 14 processors on the system board
● Internal Bus Width: 64 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 44 bits
● Clock Speed: 733–800 MHz
● Addressable RAM: 16 TB
AMD Athlon ● 64 – 512 KB integrated L2 cache
● Support for the installation of up to eight processors on the system board
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 43 bits
● Clock Speed: 500 MHz–2.133 GHz
● Addressable RAM: 8 TB
Name Characteristics
Pentium M ● Developed for laptops to consume less power and generate less heat;
part of Intel Centrino platform
● 2 Mebibyte (MiB) L2 cache
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 36 bits
● Clock Speed: 1.5 GHz–2.1 GHz
● Addressable RAM: 64 GB
Pentium D ● The first multi-core processor developed by Intel
● 1 MiB L2 cache per core (2 MiB L2 cache total)
● Internal Bus Width: 64 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 64 bits
● Clock Speed: 2.8 GHz–3.2 GHz
● Addressable RAM: 1 TB
Intel Core Solo/ ● Fesigned to replace the Pentium M processor
Duo
● Reduced power consumption
● Intel Core Duo is a multi-core processor
● 2 MiB L2 cache shared by both processors
● Internal Bus Width: 32 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 36 bits
● Clock Speed: 1.06 GHz–2.33 GHz
● Addressable RAM: 64 GB
Intel Core 2 Duo ● Multi-core processor
● Significantly reduced power consumption as compared to Pentium chips
● Replaces the Pentium product line
● 1 to 2 MiB L2 cache per core (2 to 4 MiB L2 cache total)
● Internal Bus Width: 64 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 64 bits
● Clock Speed: Up to 2.66 GHz
● Addressable RAM: 1 TB
Name Characteristics
Intel Core 2 Duo ● Multi-core processor
Extreme
● Significantly reduced power consumption as compared to Pentium chips
● 2 MiB L2 cache per core, but comes with a multiplier that increases this
cache to simulate 4 MiB per core
● Internal Bus Width: 64 bits
● System Data Bus Width: 64 bits
● System Address Bus Width: 64 bits
● Clock Speed: Up to 2.93 GHz
● Addressable RAM: 1 TB
Processor Connections
Different CPUs use different connection methods to connect to the system board, including
various sockets, slots, and connection methods.
● Older slot-based processors plugged into a system board in much the same way as an
expansion board.
● And, socketed processors plug into a system board using a grid array of pins.
Many varieties of sockets and slots have been developed over the years.
Slot Types
The following table describes some of the slots you might encounter.
Socket Types
The following table describes some of the sockets you might encounter.
Factor Considerations
Hardware compatibility The key factor you must consider when selecting a
CPU for a computer is its system board. The
design of the computer’s system board determines
the type of CPU you can install. For example, you
can’t install an AMD processor into a system
board designed to support an Intel processor. Most
importantly, you should review the documentation
for the computer’s system board to determine its
compatibility with other CPUs. Keep in mind that
most original equipment manufacturers (OEMs)
such as Dell and Gateway don’t typically provide
you with the system board’s documentation. To
obtain this documentation, try contacting the com-
puter’s manufacturer or the manufacturer of the
system board. (You can typically identify the
manufacturer of the system board by examining it.)
Performance In addition, you should keep in mind that there is
a trade-off between price and performance when
selecting a CPU. The greater the performance
requirements of the user, the more powerful CPU
you should select. And more powerful CPUs are
simply more expensive. When selecting a CPU for
a user, you should ask the user his budget for the
purchase. This budget can help you narrow down
the choices for selecting a processor.
Factor Description
Power Make sure to review the CPU’s power requirements to verify that you aren’t overload-
ing the computer’s power supply.
Removal Review the computer’s documentation to determine how to properly remove the exist-
ing processor from the system board. Most newer processors use Zero Insertion Force
(ZIF) sockets, which is a type of processor socket that uses a lever to tighten or loosen
the pin connections between the processor chip and the socket. So there is no force
required when you insert or remove the chip.
Cooling Verify that you have the necessary equipment to cool the new processor. Some CPUs
come equipped with a heatsink and fan; others don’t. If necessary, follow the new
CPU manufacturer’s instructions to install any fan or heatsink on the new CPU.
When installing new equipment, always follow the instructions included with the device from
the manufacturer.
ACTIVITY 5-8
Upgrading the CPU
Scenario:
One of your clients has an older computer that needs to be upgraded. The CPU in the com-
puter doesn’t meet the requirements for the application the client needs to run. The client has
purchased a CPU upgrade and would like you to install it.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Remove the existing CPU. a. Shut down the system and unplug the
power cord.
2. Install the replacement CPU. a. On the system board, align the pins on
the CPU with the holes in the ZIF
socket.
1. When you install a new CPU in a system, what is the first thing you should do?
a) Shut down the system.
b) Ground yourself to dissipate any static electricity.
c) Unplug the power cord.
d) Pull up the lever on the side of the ZIF-socket CPU.
2. True or False? When installing a CPU, verify that you have the necessary equipment
to cool the new processor.
True
False
TOPIC E
Install and Configure System Boards
In the last topic, you installed and configured CPUs. The final system component that you
might need to install is the system board. In this topic, you will install and configure a system
board.
The most important system component in a computer is the system board. Although you can
argue a case for almost any system component as being most important, without the system
board, the computer simply cannot run. It’s possible that you will be asked to either build a
computer from scratch or to replace the system board in a failed computer. In either case,
whether you are building a computer from scratch or repairing a failed computer, you must be
prepared to install and configure a new system board.
Chipsets
Definition:
A chipset is a system board component that includes the CPU and other chips that support
basic functions of the computer. PC chipsets are housed on one to four chips and include
built-in controllers for almost all common peripherals.
Example:
Chips in Chipsets
Chipset architecture, including the number, function, name, and placement of the various chips
in a chipset, will vary depending on the type and manufacturer of the system board. For
example, on many Intel Pentium computers, the two main chips in the chipset, other than the
CPU, are known as the Northbridge and the Southbridge.
● The Northbridge controls the system memory and the AGP video ports, and it may also
control cache memory. The Northbridge is closer to the processor and communicates
directly with it using the system bus.
● The Southbridge controls input/output functions, the system clock, drives and buses, APM
power management, and various other devices. The Southbridge is further from the CPU
and uses the PCI bus to communicate with the Northbridge.
Newer Intel systems employ the Intel Hub Architecture (IHA) chipset. This also has two main
chips, now named the Graphics and AGP Memory Controller Hub (GMCH) and the I/O Con-
troller Hub (ICH), which perform functions roughly analogous to the Northbridge and
Southbridge.
BIOS Types
Types of BIOSes found on system boards include the system BIOS and the BIOS and device
drivers for any expansion cards. There are many system BIOS types.
The extent to which you can use CMOS to configure a computer depends heavily on the
manufacturer of the particular CMOS.
Computer Cases
The computer case is the enclosure that holds all of the components of your computer. Com-
puter cases come in several formats. Some are designed to hold many internal components and
have a lot of room to work around those components. These cases are usually tower cases and
take up a good deal of room. Other cases are designed to use a minimum amount of space.
The trade-off is that the interior of the case is often cramped, with little room for adding addi-
tional components. Because the tower proved to be popular, there are now several versions of
the tower model. These include:
● Full tower, which is usually used for servers or when you will be installing many drives
and other components.
● Mid tower, which is a slightly smaller version of the full-size tower.
● Micro tower, which is the size that replaces the original desktop case in most modern
systems.
Specific Connectors
There are specific connectors, depending on the motherboard requirements, usually tied to the
CPU type. There’s the 20-pin (ATX), a 24-pin ATX connector, and the 20+4 combo (which
you can separate, or not, depending on the motherboard). This includes a 20-pin for the main
power, plus a 4-pin connector for additional CPU power. This 4-pin is sometimes known as the
Intel Pentium 4 connector. There’s also an 8-pin CPU connector that requires an ATX 2.02, or
EPS12V, PSU.
When installing new equipment, always follow the instructions included with the device from
the manufacturer.
1. If you are upgrading the computer’s system board, remove the original system board.
a. Shut down the system and unplug the power cord.
b. Disconnect all external devices.
c. Remove the system cover.
d. Remove all expansion cards and store them in anti-static bags. (Before removing
components from the system board, you might want to take a picture of the
assembled board so that you can use it as a reference when you reconnect the com-
ponents later.)
e. Disconnect cables from the system board, marking each cable as to what it connects
to and where it goes.
f. Unscrew the system board from the case.
g. Lift the system board out of the case. On some systems, after lifting the system
board over the pin(s), you will need to slide it out of the case.
2. Install the new or replacement system board.
a. Place the new system board into the case and align the mounting holes.
b. Secure the system board to the case.
c. Install RAM and processor(s) on the new system board. Some sources recommend
installing these components prior to installing the system board. If you do this, be
careful not to bend the board or mash any connectors on the bottom side of the sys-
tem board as you insert the components.
d. Reinstall cards and cables removed from the old system board.
e. Replace the system cover.
f. Test the system.
ACTIVITY 5-10
Upgrading the System Board
Scenario:
A lightning storm destroyed the system board in one of your customers’ systems. You have
been assigned the task of replacing the system board. While doing so, the customer would
like you to put in an upgraded system board to improve system performance.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
When installing new equipment, follow the instructions included with the device from the
manufacturer.
1. Remove cards and cables. a. Shut down the computer and unplug
the power cord.
2. Remove the existing system board. a. Unscrew the system board from the
case. Be sure to set the screws aside to
use in mounting the new system board.
3. Install the new system board. a. Slide the new system board into the
case, aligning the mounting holes.
5. Reinstall the cards and cables. a. Reconnect all internal cables and
cards, including any LED or front-panel
switch connections.
1. True or False? Often when you are examining a system board, you will find that
there are very few components on the board that are actually repairable.
True
False
2. When you are installing or upgrading a system board, what should you do as you
are disconnecting the cables from the board?
a) Remove them completely from the case, so they are out of the way.
b) Mark each cable as you go, so you can easily reconnect them later.
c) Unscrew the system board from the case.
d) Disconnect all external devices.
Lesson 5 Follow-up
In this lesson, you installed and configured system components. The ability to successfully
install and configure hardware components is an integral part of a computer technician’s job.
1. What types of internal system hardware will you be required to install most often at
your workplace?
2. Have you encountered any problems with installing and configuring a computer
component?
Lesson Objectives:
In this lesson, you will maintain and troubleshoot peripheral components.
You will:
● Test and troubleshoot display devices.
● Maintain and troubleshoot input devices.
● Test and troubleshoot adapter cards.
● Troubleshoot multimedia devices.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
In the last two lessons, you installed and configured various computer components. After com-
ponents are installed, maintenance and troubleshooting are required to reap the maximum
benefits from the equipment. In this lesson, you will maintain and troubleshoot peripheral
components.
It’s inevitable—at some point in time, problems with computer hardware will arise. As an A+
technician, maintaining and troubleshooting computer hardware, including peripheral compo-
nents, will be an integral part of your job duties. Your ability to quickly and effectively solve
problems with peripherals will be essential in providing your users with the computing envi-
ronments that they need to be able to perform their jobs.
This lesson covers all or part of the following CompTIA A+ (2006) Examination objectives:
● Topic A:
■ Exam 220-601 (Essentials): Objective 1.3
■ Exam 220-603 (Remote Technician): Objective 1.2
● Topic B:
■ Exam 220-601 (Essentials): Objective 1.3, Objective 1.4
■ Exam 220-602 (IT Technician): Objective 1.2, Objective 1.3
■ Exam 220-603 (Remote Technician): Objective 1.2
● Topic C:
■ Exam 220-601 (Essentials): Objective 1.3
■ Exam 220-602 (IT Technician): Objective 1.2
■ Exam 220-603 (Remote Technician): Objective 1.2
■ Exam 220-604 (Depot Technician): Objective 1.2
● Topic D:
■ Exam 220-602 (IT Technician): Objective 1.2
■ Exam 220-603 (Remote Technician): Objective 1.2
TOPIC A
Troubleshoot Display Devices
In the last lesson, you installed and configured computer hardware components. The next step
is to troubleshoot hardware, and a good place to start is with the monitor. In this topic, you
will start by troubleshooting display devices.
Display issues can be very disconcerting for users; after all, if they cannot see output on the
monitor, it is as if they are flying blind. Most display device problems have simple causes that
you can help users resolve easily. However, if the user cannot determine how to solve a par-
ticular issue, or if the symptoms indicate more extensive problems, you will need to step in to
correct the situation.
3. If the monitor power light is on, but nothing is displayed on the screen, you might:
● Determine if the power light is glowing green or orange. If the power light is orange,
the monitor is in energy-saving mode or is getting no data from the computer. A
green power light indicates that the monitor is on and is receiving data.
● Verify that the cable is connected to the monitor and to the PC.
● Adjust the contrast using the buttons on the monitor.
● Adjust the brightness using the buttons on the monitor.
● If it is still not working, swap the monitor with a known good monitor.
4. If the monitor comes on, but then goes blank after a few moments, you should:
● Determine if the monitor power light is glowing green or orange.
● If the light is orange, press a key to arouse the system from energy-saving mode.
Some monitors only seem to wake up when the Windows key is pressed on the
keyboard.
● Change the Power Management settings in CMOS to disable sleep or doze mode.
The exact steps for this vary based on your system BIOS, so the setting might not be
called Power Management and could be under a variety of different options.
● Temporarily change the power scheme settings within Windows. After you have
determined that the monitor is not shutting down due to electrical malfunctions, the
user can adjust these settings to meet his or her needs.
a. Right-click the Windows Desktop and choose Properties.
b. Display the Screen Saver page and click Power.
c. From the Power Schemes drop-down list, select Always On.
d. Change all settings in the Always On power scheme to Never.
5. If the monitor is making noises, determine whether it is making a crackling or whining
noise:
● If it is a crackling noise, clean the monitor and try to vacuum or blow dust out of
monitor vents. Remember, do not open the monitor! If necessary, send it to a moni-
tor repair facility for more in-depth cleaning.
● If it is a whining noise, try moving the monitor. You might also try changing the
refresh rate. If it is still whining, send it out to a monitor repair facility for adjust-
ment and replace it with a quieter monitor.
6. If none of your attempts to correct the problem are successful, it might be because the
monitor has failed and needs to be replaced. It is usually less expensive to replace the
monitor than to send it out for repairs. To replace the monitor:
a. Remove the existing monitor.
1. Shut down the computer.
2. Turn off the power on the computer and the monitor.
3. Unplug the monitor from the electrical outlet.
4. Unplug the monitor data cable from the monitor port.
b. Install the new monitor.
1. Connect the data cable from the monitor to the computer’s monitor port.
2. Plug the monitor power cable into an electrical outlet.
3. Turn on the monitor and computer power.
4. Start the computer and verify that the new hardware was detected.
ACTIVITY 6-1
Troubleshooting Display Devices
Scenario:
Several users have opened trouble tickets with the support center about problems with their
monitors. All of the users need their systems fixed before they can continue with their work.
You need to resolve the problems. The following is a list of the trouble tickets you are
responding to.
User
Ticket No. Location Name Issue
296001 Main build- Robert Allen The user’s monitor is not coming on. The power light
ing, 31H21 is not lighted. The user has checked that the monitor is
plugged in and the monitor is connected to the system.
296002 Main build- Althea Gavin User’s monitor is flickering and the display is
ing, 13B19 distorted.
296003 Elmwood Chris Parker The monitor power light is on, but there is no display.
Place, cube
32
296005 Main build- Joan Paris The monitor is making noises.
ing, 62B35
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Resolve trouble ticket 296001. a. Unplug the monitor from the electrical
outlet and plug in a lamp or other
device to verify that the monitor is
plugged into a working outlet. If the device
works, plug the monitor back into the
outlet. If the device does not work, con-
tact the electrician to fix the outlet and
plug the monitor in to another outlet.
2. Resolve trouble ticket 296002. a. Verify that the monitor cable is firmly
plugged in to the monitor and to the
computer.
3. Resolve trouble ticket 296003. a. Verify that the monitor cable is con-
nected to the monitor and to the PC.
TOPIC B
Maintain and Troubleshoot Input Devices
In the previous topic, you corrected problems with display devices. You might also need to
troubleshoot mice, keyboards, and other input devices. In this topic, you will maintain and
troubleshoot input devices.
Input device problems can bring users to a standstill. If they cannot interact with their com-
puter systems, they can get very little work done. They will turn to you as a computer support
professional to resolve this issues for them very quickly. Fortunately, most input device
troubleshooting is straightforward and relies most on common sense. Plus, you can avoid many
input device problems if you can help computer users to care for these devices properly.
Keyboards and pointing devices are so inexpensive, that unless the device is a special one
designed for a specific need, it is more cost-effective to simply replace the device.
ACTIVITY 6-2
Maintaining and Troubleshooting Input Devices
Scenario:
Several users have opened trouble tickets with the support center about problems with their
keyboards and pointing devices. All of the users need their systems fixed before they can
continue with their work. You need to resolve the problems and get the users back to work.
The following is a list of the trouble tickets you are responding to.
User
Ticket No. Location Name Issue
299001 Elmwood Al Mikels The user’s keyboard is not working at all.
Place, cube
24
299002 Training cen- Andy User’s keyboard is producing the wrong characters
ter, room 1 Potarnia when he types.
299003 Main build- Toma Wright User’s mouse jumping around on the screen.
ing, 42B31
299004 Main build- Jason Zeh User has a cordless mouse, and the mouse pointer is
ing, 31C93 not moving on the screen.
299005 Main build- Daniel Root beer has been spilled on user’s keyboard.
ing, 26B15 Bidlack
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. If you have been assigned trouble a. Verify that the keyboard is plugged in
ticket 299001, resolve trouble ticket to the keyboard port.
299001.
b. Verify that the keyboard cable is
securely connected.
2. If you have been assigned trouble a. Verify that no Function key, Scroll
ticket 299002, resolve trouble ticket Lock, or other key is enabled or stuck
299002. down.
3. If you have been assigned trouble a. Make sure the surface the mouse is
ticket 299003, resolve trouble ticket being rolled on is clean and smooth.
299003.
b. Clean the rollers inside the mouse.
5. If you have been assigned trouble a. Remind users that all drinks must be
ticket 299005, resolve trouble ticket covered when used near computer
299005. equipment.
TOPIC C
Troubleshoot Adapter Cards
In the last topic, you resolved problems with input devices. Adapter cards can also have
problems. In this topic, you will troubleshoot adapter cards.
Your mechanic often knows just what component in your car is acting up based on your
description of the way your vehicle is acting. Knowing the common problems associated with
adapter cards will enable you to quickly correct the problems your users encounter. Being able
to quickly resolve problems for your users will make them more productive.
Solutions:
● Reseat adapter card (or cards).
ACTIVITY 6-3
Troubleshooting Adapter Cards
Scenario:
The call center has received several trouble calls that are related to internal PC adapter card
problems. You need to help resolve the problems and get the users back to work. The follow-
ing is a list of the current trouble tickets.
User
Ticket No. Location Name Issue
399001 Main build- Aminah The user is still having problems with his video
ing, 33J27 Sinclair system. All monitor problems were reviewed and none
of these resolved the problem. Therefore, it points
toward a problem with the video card.
399002 Elmwood Conroy Ives Last night a lightning storm struck. Most equipment
Place, cube was fine, but this user is having problems with getting
14 on the network. All other users in the area are connect-
ing without problems.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. If it has been assigned to you, a. Locate the video card and make sure it
respond to trouble ticket 399001. is fully seated into the slot, then see if
this fixed the problem.
TOPIC D
Troubleshoot Multimedia Devices
In the last topic, you resolved problems with adapter cards. Another group of peripheral
devices that you need to be able to troubleshoot is multimedia devices. In this topic, you will
troubleshoot multimedia devices.
Although multimedia devices typically aren’t critical for a user to complete his or her work,
they are usually the devices that give the user the most satisfaction while working. As an A+
technician, you can keep your users happy by making sure they’re able to take full advantage
of the multimedia components included with their computers.
● If you’re playing an audio CD, the cable that should connect the
sound card to the CD drive might have been disconnected.
● Damaged wire or plug.
Solution:
● Verify that the speakers are plugged into the correct port, turned on,
and connected to the computer.
● Check the volume settings within Windows using Control Panel or
the Volume System Tray icon.
● Verify that you’ve configured the sound card properly within Win-
dows by using the Sounds And Audio Devices Properties dialog
box.
● Check Device Manager to make sure it is reporting any problems
with the sound card and its drivers.
● Install or reinstall the most current drivers for the sound card and
computer operating system.
● Try plugging the speakers into a sound card that you know works to
determine if they’re bad.
● Try plugging a known good pair of speakers into the suspect sound
card to determine if it is bad.
The microphone doesn’t work Problem:
or is too low. ● The microphone is plugged into the wrong port on the sound card.
● Switch the audio mixer software to Recording and verify that the
microphone is selected as the input device. In Windows, you can use
the Sounds And Audio Devices Control Panel application to manage
audio settings.
● In Windows, you can enable Mic Boost in the Sounds And Audio
Devices Control Panel application.
ACTIVITY 6-4
Troubleshooting Multimedia Devices
Scenario:
Two users have opened trouble tickets with the support center about problems with their
speakers. You have been asked to resolve these problems. The following is a list of the
trouble tickets.
User
Ticket No. Location Name Issue
325145 Main build- Reilly Smith No sound is coming out of the user’s speakers. The
ing, 31H21 power light on the speakers is not lit.
325146 Main build- Alice Griffin No sound is coming out of the user’s speakers. The
ing, 13B19 power light on the speakers is lit.
1. If it has been assigned to you, a. Make sure that the speakers are
respond to trouble ticket 325145. plugged into a power source.
2. If it has been assigned to you, a. Verify that the volume on the speakers
respond to trouble ticket 325146. is turned up high enough to be audible.
Lesson 6 Follow-up
In this lesson, you maintained and corrected problems with peripheral components. Knowing
how to prevent and solve problems with computer peripherals enables you to help your users
perform their duties.
1. What types of maintenance tasks will be part of your daily routine?
Lesson Objectives:
In this lesson, you will troubleshoot system components.
You will:
● Troubleshoot storage devices.
● Test and troubleshoot power supplies.
● Test and troubleshoot memory.
● Test and troubleshoot CPUs.
● Test and troubleshoot system boards.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
In the last lesson, you maintained and troubleshot peripheral components. Internal system com-
ponents also cause problems for users. In this lesson, you will maintain and troubleshoot
system components.
It’s only a matter of time before a personal computer’s internal system components experience
problems. As an A+ technician, many of the service calls that you respond to will involve
troubleshooting system components, and your ability to quickly and effectively diagnose and
solve the problems will be essential in maintaining the satisfaction level of the users you
support.
This lesson covers all or part of the following CompTIA A+ (2006) certification objectives:
● Topic A:
■ Exam 220-601 (Essentials): Objective 1.3, Objective 3.3
■ Exam 220-602 (IT Technician): Objective 1.2, Objective 1.3, Objective 3.1
■ Exam 220-603 (Remote Technician): Objective 1.2, Objective 1.3
● Topic B:
■ Exam 220-601 (Essentials): Objective 1.3
■ Exam 220-602 (IT Technician): Objective 1.2
■ Exam 220-603 (Remote Technician): Objective 1.2
■ Exam 220-604 (Depot Technician): Objective 1.2
● Topic C:
■ Exam 220-601 (Essentials): Objective 1.1, Objective 1.3
■ Exam 220-602 (IT Technician): Objective 1.2
■ Exam 220-603 (Remote Technician): Objective 1.2
■ Exam 220-604 (Depot Technician): Objective 1.2
● Topic D:
■ Exam 220-601 (Essentials): Objective 1.3
■ Exam 220-602 (IT Technician): Objective 1.2
■ Exam 220-603 (Remote Technician): Objective 1.2
■ Exam 220-604 (Depot Technician): Objective 1.2
● Topic E:
■ Exam 220-601 (Essentials): Objective 1.3
■ Exam 220-602 (IT Technician): Objective 1.2
■ Exam 220-603 (Remote Technician): Objective 1.2
■ Exam 220-604 (Depot Technician): Objective 1.2
TOPIC A
Troubleshoot Storage Devices
In this lesson, you will troubleshoot system components. The first component inside the com-
puter case that might need troubleshooting are the storage devices. In this topic, you will
troubleshoot storage devices.
Storage devices, because they are one of the few system components that contain moving
parts, are particularly susceptible to wear and damage. There is a saying that there are two
types of storage devices: the ones that have failed and the ones that are failing. Because these
devices support so many system functions, it is not always obvious that the device is the cul-
prit, yet storage device problems (particularly those involving hard drives) can have a truly
devastating effect on a system and on a user’s productivity. Therefore, being able to spot, iden-
tify, and correct storage device problems early, before they cause data loss, will be an
important skill for you as a support technician.
Computer will not boot Drive disconnected, damaged, not recognized by the BIOS.
Solution: Visually inspect and reconnect drive. Enable drive in
CMOS setup utility.
Repeated grinding noises Physically damaged drive, most likely due to a head crash.
Solution: Replace the hard drive. Remind users and technicians
not to move a machine while it is in use because that is the most
common cause of head crashes.
Data corruption or utilities System not being shut down properly, drive is in the process of
not running properly failing, virus.
Solution: Educate users on how to properly shut down the system.
Run virus protection software. Back up the data, replace failed or
failing drive.
Hard drive is slow Drive is too full or fragmented. The hard drive controller is too
slow. An incorrect (and slower) cable was used to connect the
drive.
Solution: Delete all unneeded files. Defragment the drive. Verify
and replace the hard drive cable if necessary.
There are several points to keep in mind when troubleshooting SATA drive problems.
Issue Description
IDs and termina- The vast majority (up to 95 percent) of problems with SCSI disks are due to incor-
tion rect ID settings and improper termination. Verify that all SCSI devices have unique
SCSI ID numbers and are properly terminated.
Resetting system When a SCSI system is booted or reset, SCSI controllers generally need to renew
all SCSI device connections before activating the devices, causing a delay during
POST.
Issue Description
Cables SCSI cables should be handled carefully to minimize problems. For instance, roll-
ing SCSI cable onto itself can cause crosstalk and impede the signal. Running long
lengths of it next to metal or past power supplies can also cause errors due to sig-
nal impedance.
SCSI BIOS If you intend for a SCSI disc to be bootable after you install it, you must enable
the SCSI BIOS by using jumper settings or software configuration.
Connectors If you are installing an additional SCSI hard drive into a computer where only one
connector is available on the SCSI cable and the cable itself is terminated, remove
and replace the cable with one that has multiple connectors.
You can use a manufacturer’s install program such as Maxblast or Maxtore to enable an
older BIOS to work with a large drive.
2. Users are often misled about the exact size of a drive. When talking in general terms,
most people round 1,024 bytes to 1,000 because it is easier to talk in round numbers. By
the time you get up to billions of bytes, as you will with the newer drives, those 24 bytes
for each 1,000 bytes start to add up to significant amounts.
For more information about binary multiples as used in denoting drive sizes, see http://
physics.nist.gov/cuu/Units/binary.html.
4. If you attempt to read a floppy disk and receive a message that the disk is not formatted,
it was most likely formatted using a different operating system such as Macintosh or
Linux. If so, then the original owner of the disk will need to provide the information to
you on a medium that Windows can read. This might be over the network or on a
Windows-formatted floppy disk (both Macintosh and Linux can read and write to
Windows-formatted floppy disks).
5. If you can read and write to floppy disks on this system, but they cannot be read on
another system, you should suspect that the drive is out of alignment. In a drive that is
out of alignment, the read/write head is not properly aligned with the tracks on the disk
and covers parts of tracks rather than a single track. While there are tools for adjusting
the drive alignment, it is often cheaper to simply replace the drive. More information
about the types of misalignment, causes, and methods for repairing the damage can be
found at www.accurite.com/FloppyPrimer.html.
6. If none of the previous solutions fixed the problem, you might need to replace the floppy
drive.
a. In Control Panel, display the Sounds, Speech, And Audio Devices dialog box,
and then click the Hardware tab.
b. Verify that the Devices list includes the proper driver and that Audio Codecs is
listed.
c. If not, use the Add Hardware Wizard to add the appropriate drivers.
● Use the Troubleshooting Wizard for the Sounds, Speech, And Audio Devices. (You
access this Wizard from the Hardware tab in the Sounds And Audio Devices Proper-
ties dialog box. To open this dialog box, open Control Panel, click the Sounds,
Speech, And Audio Devices link, and then click the Sounds And Audio Devices
link.)
● Attempt to play the default song in the Windows Media Player.
a. From the Start menu, choose All Programs→Accessories→Entertainment→
Windows Media Player.
b. Choose Tools→Options.
c. Click the File Types tab and verify that all File Types are checked.
d. Click OK.
e. Click the Play button to attempt to play the default song.
● Verify the default audio is set to the system audio drive.
a. In Control Panel, open Sounds And Audio Devices.
b. Click the Audio tab.
c. Under Sound Playback, verify the driver for the sound card is listed below
Default Device.
d. Click OK.
● Verify that the user can now play the audio CD.
3. If, after upgrading to Windows XP, a user can no longer access his or her CD/DVD drive:
● Verify that the drive is on the Windows XP hardware compatibility list.
● Verify that the drive is properly installed.
● Verify that Windows Explorer lists a drive letter for the CD/DVD drive.
● Verify that the appropriate driver is installed.
a. Open My Computer.
b. Right-click the CD/DVD drive icon and choose Properties.
c. Click the Hardware tab.
d. Verify that the appropriate driver is listed.
● Use the Drives And Network Adapters Troubleshooter within the Help And Support
Center.
a. Open My Computer.
b. Right-click the drive icon and choose Properties.
c. Click the Hardware tab.
d. Click the Troubleshoot button and follow the prompts to troubleshoot the
problem.
4. If there is a drive letter conflict, specify a free drive letter for the drive.
a. From the Start menu, right-click My Computer, and then choose Manage.
b. In Computer Management, select Disk Management.
c. In the list of drives in the right pane, right-click the CD/DVD drive and then choose
Change Drive Letter And Paths.
d. Click Change, and in the Assign The Following Letter drop-down list, select a new
drive letter for the Removable Device, choosing one that is not assigned to local or
mapped network drives.
e. Click OK twice.
5. If the user inserts a blank CD/DVD in the CD-RW or DVD-RW drive, and the drive
ejects it before the user can write to it:
● Confirm that the user has a CD-R, CD-RW, DVD-R, or DVD-RW drive and not just
a CD-ROM or DVD-ROM drive in his or her computer.
● Make sure the media is rated for the speed at which you are trying to write.
● Make sure the user is not trying to write more than the disc can hold.
● Check for software error messages that indicate what the problem might be.
● There might be debris inside the drive. Dust and other foreign matter can cause a
drive to constantly eject the disc.
● Check whether the operating system or the hardware is causing the problem by
unplugging the data cable from the drive before inserting the disc. If there is a pause
before the disc is ejected or if the drive light blinks steadily, it might be because the
media is defective or not high enough quality for the drive to use. Try a different
brand of discs.
● If the hardware appears to be fine, the operating system might be causing the
problem. Try pressing and holding Shift and inserting a disc; pressing Shift tempo-
rarily disables the AutoRun feature for the CD/DVD devices. If the CD/DVD plays
properly, the operating system is the cause of the problem. You can disable AutoRun
permanently by editing the registry. See http://support.microsoft.com/kb/155217/
en-us for the steps to accomplish this task.
● See if the CD-RW or DVD-RW drive will write after the system has been off for a
while. Some systems overheat and have trouble writing when the drive gets too hot.
6. If you can’t get video from a DVD disc, you might need to install decoder software to
emulate the hardware decoder in standalone DVD players.
ACTIVITY 7-1
Troubleshooting Hard Drive Problems
Scenario:
In this activity, you will troubleshoot hard drive problems.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
3. You have installed a second hard drive and it is not recognized. You know that one
of the things you need to check when a newly installed drive isn’t recognized is the
CMOS settings for the drive. What in particular do you need to check in CMOS for
this problem?
4. Another thing you should check when a second hard drive isn’t recognized is that
the drive was installed correctly. What exactly would you be checking?
5. A second hard drive was properly installed but you cannot access it by its drive
letter. What should your next step be?
6. A user is encountering the following problem: Her computer boots fine and every-
thing works until the user tries to access data on the second hard drive, the D drive.
The message “Can’t Access This Drive” is displayed when she tries to access the D
drive. The user would also like an explanation about what the error message means.
List some of the steps you might take to resolve this problem.
7. When a user tries to access the hard drive containing his data, the system locks up
and makes a clicking sound. From the DOS prompt, he can change to drive D, but
when he tries to access a file or list the files on the drive, it locks up and begins
clicking again. What steps might you take to attempt to resolve this problem? What
is the most likely cause of the problem?
8. A user reports that some of his folders have begun disappearing and some folder
and file names are scrambled with strange characters in their names. What steps
might you take to attempt to resolve this problem? What is the most likely cause of
the problem?
9. A 30-GB hard drive was installed, but the system reports that the drive is about 500
MB. What can be done to resolve this problem?
10. A user is questioning the difference between the sizes in GB and bytes. Why is there
such a big difference? The disk reports in some places as 9.33 GB and in others as
10,025,000,960 bytes. Why isn’t it 10 GB?
Scenario:
Users have opened trouble calls with the help center for the following problems that are
related to the floppy drives on their systems.
User
Ticket No. Location Name Issue
235001 Main build- Angharad When the user attempts to access the floppy drive, he
ing, 23D41 Phatek sees the message This Disk Is Not Formatted. Do You
Want To Format It Now Or Insert Disk Now?
235002 Main build- Gary The user cannot write to a disk in the floppy drive.
ing, 32G37 Toomey
235003 Elmwood Zoe Isaacs When trying to access the floppy drive from the com-
Place, cube mand prompt, she sees the message The System
37 Cannot Find The Drive Specified.
235004 Elmwood Etta Romero User received a floppy disk containing important infor-
Place, cube mation from another user. When Etta tries to access
42 the disk through Windows Explorer, she receives a
message that the disk is not formatted.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Identify some issues you should check in resolving trouble ticket 235001.
3. What might cause the user to receive the error message shown in trouble ticket
235003?
4. What would you recommend to the user to resolve trouble ticket 235004?
ACTIVITY 7-3
Troubleshooting Optical Drive Problems
Scenario:
The following are the trouble tickets related to CD-ROM, CD-R/RW, DVD, and DVD-R
drives that have been assigned to you for resolution.
User
Ticket No. Location Name Issue
232001 Main build- Nichole The door will not open on the CD-ROM drive. The
ing, 31A57 Lombard user needs the CD that is in the drive.
232002 Main build- Ruth Dalton User needs to be able to listen to audio CDs. The sys-
ing, 41A23 tem reads data and program CDs just fine but there is
no audio.
232003 Main build- Richard The user’s CD-RW drive was listed as D. A new drive
ing, 11A10 Alston was added to the system and now the D drive does not
point to the CD-ROM drive. Some applications cannot
find the CD-ROM when he attempts to run the applica-
tion, even though the CD is in the drive.
232004 Main build- Mark Glick User needs to burn a CD and the drive keeps ejecting
ing, 12D52 the CD media before he can write the disc.
232005 Elmwood Jennifer The user needs to be able to watch DVDs on her
Place, cube Kulp system. She can read CDs, play audio CDs, and read
7 data DVDs in the drive, but does not see any video.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Resolve trouble ticket 232001. a. Verify that there is power to the drive.
2. Resolve trouble ticket 232002. a. Verify that you can read a data CD.
3. Regarding trouble ticket 232003, explain to the user what the reason for the problem
is and what needs to be done to correct it.
4. What would you suggest that the user try in resolving trouble ticket 232004?
5. After checking over the hardware for the DVD drive on the system, you find no
problems. What else might the problem be in trouble ticket 232005?
TOPIC B
Troubleshoot Power Supplies
In the last topic, you identified and corrected problems with storage devices. Another personal
computer component that is required for the system to operate is the power supply. In this
topic, you will troubleshoot power supplies.
Underpowered systems, especially older systems with relatively small power supplies, can
experience lockups, random reboots, and other quirky behavior. As an A+ technician, you will
be required to test and troubleshoot power supplies.
POST error codes from 020 and 029 are related to the power supply.
Be sure to not touch the case, internal components, or multimeter probe contacts
while measuring the power supply voltage. You could be seriously injured or killed.
2. If there are power-related startup errors, such as the system, fan, and power light not com-
ing on:
a. Verify that the power cord is securely connected to the power supply and to the elec-
trical outlet on the UPS or surge protector (or the wall, but you should always
protect it through a UPS or surge protector).
b. Verify that the UPS or surge protector is turned on and plugged in.
c. Verify that the UPS or surge protector is working by plugging in a lamp with a
known good light bulb and turning on the light.
d. If the lamp did not light, check to see whether any reset buttons need to be reset on
the UPS or surge suppressor, or check the electric outlet’s circuit breaker.
e. If none of these fixed the problem, replace the power supply.
3. If an ATX motherboard will not power up, use a multimeter or power supply tester to
check the voltage of the power being supplied. Check the connectors to the system board
as well.
ACTIVITY 7-4
Troubleshooting Power Supplies
Setup:
Before you begin this activity, shut down your computer.
Scenario:
The following are the trouble tickets related to power problems that have been assigned for
you to resolve.
User
Ticket No. Location Name Issue
125001 Elmwood Sylvania One of the other hardware technicians has been trying
Place, cube Rawleigh to troubleshoot a power problem. The system will not
20 come on when the user turns on the power switch. He
determined that the user has an ATX system board and
power supply. You have been assigned to take over
this trouble ticket.
125002 Main build- Darlene When the user turns on the PC, it doesn’t always come
ing, 51B24 Burley on and sometimes it just shuts itself down abruptly,
with no warning. When she turns on the system again,
there is no fan noise. She is using a legacy database
application and the data is being corrupted during the
improper shutdowns.
125003 Main build- Earle The user turns on the power switch, but the system
ing, 21K37 Washburn does not come on. He does not hear the fan, there is
no power light on, and he hears no beeps or other
sounds coming from the system. His system is plugged
into a surge protector.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Resolve trouble ticket 125001. a. Set the multimeter for DC volts over
12V.
3. If the computer did not start, what would your next action be?
4. List the steps you would use to resolve trouble ticket 125003.
5. If the computer did not start, what would your next action be?
TOPIC C
Troubleshoot Memory
In the last topic, you resolved problems with power supplies. Memory issues can also be the
cause of generalized computer problems. In this topic, you will troubleshoot memory.
Memory plays a huge role in every operation done by a personal computer. An issue with
memory can result in a wide range of problems and symptoms. As an A+ technician, your abil-
ity to identify and solve memory problems will be crucial in providing your users with the
optimal computing environment.
Error Checking
Many memory modules include error-checking mechanisms to protect data. The most common
are parity and Error Correcting Code (ECC).
Error-Checking
Mechanism Description
Parity Parity is an error correction method that is used for electronic
communications. For memory modules, the use of a parity bit can detect
some of the errors that can be introduced during a data transmission. Eight
bits are for data, and the ninth bit is the parity bit. Parity can be odd or
even, meaning that the total number of 1s is an odd or an even number. If
an error is detected, nothing is done to fix it. The system simply tries
again after discarding the data. Parity is rarely used; other system compo-
nents are relied on to verify that the data contained in memory is accurate
when non-parity memory is used. Some chips use fake parity. In this case,
the values are always 1s and it is assumed that there are never any
memory problems. Other pieces of hardware and/or software take over in
verifying that the information contained in the memory is correct.
Error Correction Code Error Correction Code (ECC) is an error correction method that uses sev-
(ECC) eral bits for error-checking. A special algorithm is used to detect and then
correct any errors it finds. ECC is used only in upper-end systems such as
high-end workstations and servers; other desktop systems use non-ECC
memory.
User
Ticket No. Location Name Issue
401001 Main build- Roger The user is experiencing corrupted data in his database
ing, 12B52 Wheaton application. The hard drive has been checked and no
problems were found with it. The application was rein-
stalled and the database was reindexed and all data
problems have been corrected. No other users are
experiencing this problem when they enter data. He
has been successfully entering data until just recently.
401002 Elmwood Rory Waldon The user is complaining of application crashes. He is
Place, cube 6 fine if he is only running his email and word process-
ing programs. If he also opens his graphics program at
the same time, then the applications are crashing.
401003 Main build- Hazel Beech Additional memory was installed in her system and
ing, 22G42 now it won’t boot.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. You are attempting to resolve trouble ticket 401002. Why is the user only experienc-
ing the problem when additional applications are opened?
a) There is not enough memory in the system.
b) Memory errors are occurring in higher memory than is normally used.
c) The memory modules are incompatible with one another.
3. Resolve trouble ticket 401003 by placing the steps in the proper order.
Verify that the correct memory was installed in the system.
Check to see if the BIOS manufacturer has released any upgrades that would resolve
the problem.
Try swapping memory around in the memory banks.
Verify that memory was installed and configured correctly.
TOPIC D
Troubleshoot CPUs
In the last topic, you resolved memory problems. In addition to memory, the processor is
involved in every computer operation and can cause problems throughout the system if it is
compromised. In this topic, you will troubleshoot CPUs.
Because the processor provides the computational power that drives everything that a personal
computer does, the ability to recognize and resolve processor issues is a critical skill for com-
puter technicians.
Older prcessors in unsecured sockets could experience chip creep, which is the phenomenon
of vibrations and movements causing the chip to become loose. In today’s ZIF sockets, this is
no longer an issue.
All processors today use some type of socket installation. For older slot-based systems, it was
possible to purchase adapters to use a socketed processor in the slot-based system board.
● If you suspect the CPU is overclocked, use BIOS or jumper settings to reduce the CPU
speed.
1. What initial steps should you take to identify and resolve a potential CPU problem?
a) Replace the CPU with a known good processor.
b) Verify that the CPU fan and other cooling systems are installed and functional.
c) Replace the system board.
d) Reseat the CPU.
e) If the CPU is overclocked, throttle it down to the manufacturer-rated clock speed.
2. All other diagnostic and corrective steps have failed. You need to verify that it is the
CPU itself that is defective. What should you do?
a) Replace the system board.
b) Reinstall the operating system.
c) Remove all the adapter cards.
d) Replace the CPU with a known good chip.
TOPIC E
Troubleshoot System Boards
In previous topics, you resolved problems with the majority of the components of a personal
computer. Because this is the main circuitry in the personal computer, problems with the sys-
tem board will affect other components. In this topic, you will troubleshoot system boards.
As an A+ technician, it’s likely that you will be asked to troubleshoot many different hardware
components, including system boards. Identifying and solving system board problems can be
difficult, but doing so efficiently can alleviate the need to replace an entire personal computer,
saving both money and user downtime.
User
Ticket No. Location Name Issue
135095 Main build- Jennifer When the user turns on the PC, it doesn’t always come
ing, 51B24 Bules on and sometimes it just shuts itself down abruptly,
with no warning. When she turns on the system again,
there is no fan noise. Her data is becoming corrupted
from the frequent reboots.
135096 Main build- Edward When the user turns on the computer, he sees a mes-
ing, 21K37 Wever sage stating that the computer’s date and time are
incorrect. He must reset this information in the com-
puter’s BIOS each time he starts the computer.
135097 Elmwood Sarah One of the other hardware technicians has been trying
Place, cube Wesson to troubleshoot a power problem. The computer peri-
20 odically and randomly reboots. The other technician
has determined that the user has an ATX system board
and power supply. You have been assigned to take
over this trouble ticket.
Lesson 7 Follow-up
In this lesson, you resolved problems with system components. Solving problems with storage
devices, power issues, memory, CPUs, and system boards is a critical skill for any hardware
technician.
1. With what types of system components do you have troubleshooting experience?
2. What system components do you expect to have to troubleshoot most often at your
workplace?
Lesson Objectives:
In this lesson, you will install and configure operating systems.
You will:
● Install Microsoft Windows.
● Upgrade Windows from a given version to a later version.
● Add devices to an installation of Microsoft Windows.
● Optimize an installation of Microsoft Windows.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
So far in this course, you have installed and configured the physical components of a system,
and you have worked with the operating system only in a high-level general way. Now it is
time to put the system hardware and software together. In this lesson, you will install and con-
figure operating systems.
Because so many computers today come with operating system software installed by the ven-
dor, an ordinary user might never need to install an operating system. As a trained computer
support professional, however, your needs are different. You might be called upon to install
and configure operating systems if the original installation does not meet your needs; if you
are upgrading a system; if you have constructed a computer from scratch; or if you are rede-
ploying a system from one use to another. In all these cases, you will need the skills to install,
configure, and optimize the computer so it meets your business needs.
This lesson covers all or part of the following CompTIA A+ (2006) certification objectives:
● Topic A:
■ Exam 220–601 (Essentials): Objective 1.2, Objective 3.1, Objective 3.2, Objective
3.3, Objective 3.4
■ Exam 220–602 (IT Technician): Objective 3.1, Objective 3.2, Objective 3.3, Objec-
tive 3.4, Objective 4.2
■ Exam 220–603 (Remote Technician): Objective 2.1, Objective 2.4, Objective 3.2
■ Exam 220–604 (Depot Technician): Objective 1.1
● Topic B:
■ Exam 220–601 (Essentials): Objective 3.2
■ Exam 220–602 (IT Technician): Objective 3.2
■ Exam 220–603 (Remote Technician): Objective 2.2, Objective 2.4
● Topic C:
■ Exam 220–601 (Essentials): Objective 3.2, Objective 3.3
■ Exam 220–602 (IT Technician): Objective 3.3
● Topic D:
■ Exam 220–601 (Essentials): Objective 3.1, Objective 3.2, Objective 3.3, Objective
3.4
■ Exam 220–602 (IT Technician): Objective 3.1, Objective 3.2, Objective 3.4
■ Exam 220–603 (Remote Technician): Objective 2.1, Objective 2.2, Objective 2.4
TOPIC A
Install Microsoft Windows
In this lesson, you will install and configure operating systems. The fundamental installation
method is to install the operating system from scratch. In this topic, you will perform a fresh
installation of Microsoft Windows.
Being able to perform a fresh installation of Windows can be important if you have built a
custom computer system from scratch, if the system you purchased from a vendor did not have
the correct system installed, or if you are completely redeploying existing hardware from one
purpose to another. The skills and information in this topic will help you plan and perform a
fresh installation properly whatever your technical and business requirements might be.
Hardware Compatibility
You should check all your hardware to ensure that it is compatible with the version of Win-
dows you plan to install. Microsoft tests and verifies hardware devices for different versions of
Windows and maintains the results in the Windows Marketplace Tested Products List. For
Windows XP Professional, you can also run the Microsoft Windows Upgrade Advisor from the
product compact disc to generate compatibility reports.
Previously, Microsoft issued a list of all supported hardware in a file called the Hardware Com-
patibility List (HCL). For current versions of Windows, the HCL has been replaced by the
Tested Products List. You still can access the HCLs for legacy versions of Windows from the
HCL Home Page at http://www.microsoft.com/whdc/hcl/default.mspx.
Installation Methods
You can choose any of several methods to install Windows operating systems.
Problems can arise from differences in the hardware between the reference computer and the
install computer. Not everyone has the same exact computer throughout a company, so it’s
not uncommon for slight variances in network and video cards to exist. For these systems, the
best thing to do is to create the image without these drivers installed, then install them after
the machine is imaged. Bigger concerns that are difficult to overcome deal with motherboard
differences at the system board level which can cause the installation to fail. This would
necessitate different images for each system type.
If your network environment supports Microsoft Active Directory, you can use Microsoft’s
Remote Installation Services (RIS) to deploy Windows automatically on multiple computers
throughout your organization. The RIS process is somewhat similar to deploying ghost
images, but requires a number of Microsoft services and system tools rather than third-party
software.
Installation Options
There are various options you can choose during Windows operating system installation.
Option Description
Disk and file system You can set up and format one or more disk partitions during installation. If
preparation you make an entire disk one partition, you cannot repartition the disk later
without either reinstalling the operating system or using a third-party tool.
NTFS is the recommended Windows file system because it is well-suited to
today’s large partition sizes and provides security and enables file compres-
sion and encryption.
Regional and date and You can set the date and time for your locale and select the appropriate
time settings regional settings, such as the appropriate local display format for currency.
Computer name You can give the computer a descriptive name of up to 15 characters. The
Setup program might suggest a default name for you.
Network configuration You can decide how you want to configure networking settings for the
computer. You can accept a Typical configuration or you can configure Cus-
tom settings that are appropriate to your environment.
Workgroup or domain Domains and workgroups are two different organizational and security models
membership for Windows networking. Domains require a specially-configured Windows
Server computer called a domain controller and are most often used in corpo-
rate environments with centralized administration. Workgroups are
unstructured named collections of individual computers and are usually
deployed in homes and small offices.
Internet connection You can indicate whether the computer will connect to the Internet using the
method local network connection or if it will connect to an account from an Internet
Service Provider (ISP).
Local user accounts For Windows XP, if you are installing into a workgroup, you can create local
user accounts during installation. You can create additional local users and
groups after installation.
For Windows 2000, if you are installing into a workgroup, you can set logon
options for local users. You can configure the system to require each user to
log on individually, or you can configure it to log on automatically as a spe-
cific user whenever the computer boots.
Windows Update
After you have installed Windows, you should obtain the latest updates for that version from
Microsoft Windows Update website. The appearance and functionality of the website will be
customized for the particular version of Windows you are using, but the updates will fall gen-
erally into one of three categories: critical updates, including Service Packs and security-
related system patches; optional software updates that provide new tools and functionality; and
optional hardware updates such as new device drivers.
Microsoft Update is an alternative Microsoft website you can use as a comprehensive source
of updates for not only Windows operating systems but also for other Microsoft software prod-
ucts as well. You can access Microsoft Update at update.microsoft.com/microsoftupdate.
Service Pack 2
Windows XP Professional Service Pack 2 (SP2) was a major update that Microsoft released to
address security threats against Windows computers. Most of the enhancements in Service
Pack 2 are aimed at increasing the default level of security of the operating system, including
the Windows Firewall and the Security Center Control Panel application. SP2 also includes
some improvements to Internet Explorer such as a pop-up advertisment blocker and other sys-
tem functionality enhancements.
You can add Service Pack 2 to existing Windows XP installations. However, for new installa-
tions, the Service Pack is typically slipstreamed into the media, which means that it is included
with the Windows XP installation files and installed concurrently with the base operating
system.
You must have an activated installation of Windows to download updates and add-ons from
Windows Update.
Activation Methods
For individual installations of Windows, you can activate the installation over the Internet. If
you do not have an Internet connection, you can activate over the phone although this takes a
little longer. If you wish, you can postpone product activation and activate later in the activa-
tion grace period.
In large organizations, you can use a Volume License Product Key that eliminates the need to
individually activate each installation of Windows. You can also activate Windows as part of
an automated installation.
Procedure Reference: Create a User Account with Local Users and Groups
To create a user account with Local Users and Groups:
1. Open Computer Management.
2. Under System Tools, expand Local Users And Groups and select the Users folder.
3. Choose Action→New User, or right-click the Users folder and choose New User.
4. In the New User dialog box, enter the user name. This name uniquely identifies the
account. It can contain up to 20 characters.
5. If desired, enter a full name for the user. This is a descriptive name that can be longer
than the user’s logon name. The full name will display on the Welcome screen. If you do
not enter a full name, the full name will be set to match the user name.
6. If desired, enter a description to be displayed next to the user account in Local Users and
Groups.
7. If desired, enter and confirm a password for the user. Otherwise, the default password will
be blank.
8. Select the desired account options.
● User Must Change Password At Next Logon
● User Cannot Change Password
● Password Never Expires
● Account Is Disabled
9. Click Create, and then click Close.
In Windows XP, resetting a user’s password will prevent them from accessing any
encrypted files. You should reset a user’s password only as a last resort.
3. Expand Local Users And Groups and select the Users folder.
4. Right-click the user for whom you want to change the password and choose Set
Password.
5. If you’re using Windows XP, click Proceed.
6. In the New Password text box, type the new password for the user.
7. In the Confirm Password text box, type the password again.
8. Click OK.
9. Close Computer Management.
If you want to search for the group to which you want to add the user:
a. Click Advanced.
b. Click Find Now to display a list of groups.
c. Select the desired group or groups and click OK.
9. Click OK to close the Select Groups dialog box.
10. Click OK to close the user’s Properties dialog box.
11. Close Computer Management.
Scenario:
You have built a custom computer system for a client’s home using individual hardware
components. You now need to install an operating system. Because this client only needs the
system for private home use, you think that Windows XP Home is the operating system
choice that will best meet his requirements.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Run the Windows XP Home setup a. Insert the Windows XP Home installa-
program. tion CD-ROM in your CD-ROM drive.
c. Click Restart.
2. Partition and format the disk. a. On the Welcome to Setup screen, press
Enter.
3. Use the Setup Wizard to select a. The system restarts in graphic mode and
installation options. the first stages of the installation proceed
without user intervention. When the Win-
dows XP Home Edition Setup Wizard
launches, on the Regional and Language
page, to accept the default settings, click
Next.
c. Click Next.
g. Click Finish.
5. What additional steps should you perform at this point to complete the installation?
a) Create additional user accounts.
b) Install applications.
c) Install Service Packs and other critical updates.
d) Install a printer.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
i. Close My Computer.
TOPIC B
Upgrade Windows
In the previous topic, you installed Microsoft Windows from scratch. The other primary type
of installation is an upgrade installation. In this topic, you will upgrade Windows.
As a system professional, you’ll probably be called upon to upgrade systems even more often
than performing from-scratch installations. Software vendors such as Microsoft are constantly
coming out with new operating system versions, and it is much more economical to upgrade
existing systems when possible rather than to purchase new computer hardware with the new
version pre-installed. Whether you are upgrading for an individual user or as part of a
company-wide migration plan, the skills in this topic should help you upgrade older versions
of Windows to the current version successfully.
Unsupported Upgrades
Upgrading Windows 95 directly to Windows XP Professional is not supported. It was possible
to upgrade a Windows 95 computer to Windows 2000 Professional and subsequently to Win-
dows XP Professional. However, Windows 2000 Professional is no longer commercially
available. If you still have installation media for Windows 2000 you can follow this indirect
upgrade path. Generally, it is best to perform a clean installation of Windows XP Professional
on any systems that are still running Windows 95.
Scenario:
A customer purchased a computer that came preinstalled with Windows XP Home, but after
using it for a while, the customer has decided that she prefers to use the more advanced func-
tionality of Windows XP Professional. The computer system vendor has provided an
installation CD for Windows XP Professional, and the customer would like you to upgrade
her system.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
3. Complete the post-installation a. The system will restart, load the Windows
steps. XP Professional Setup program, and
Setup will continue. The installation pro-
gram might reload more than once. When
the upgrade is complete, the system will
restart in Windows. On the Welcome To
Microsoft Windows screen, click Next.
d. Click Finish.
ACTIVITY 8-4
Creating and Managing Local User Accounts
Setup:
There are two administrative user accounts on the computer: the default Administrator
account and an account named Admin## that you created when you installed Windows.
Scenario:
You have been called in to configure a client’s new Windows XP computer. After interview-
ing the client, you’ve determined that she needs accounts on the computer for the following
users:
● Susan Williams (the client)
● Jeff Bernard (Susan’s employee in her home-based business)
For consistency, you recommend that your client use the following naming convention for
user accounts: the user’s first name plus the first initial of his or her last name. In addition,
you recommend that each user have a reasonably complex password. Susan does not want
her employee to be able to change his password. Because Susan is the owner of the com-
puter, you plan to add her account to the Administrators group.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
j. Click Create.
l. Click Create.
m. Click Close.
c. Click Add.
e. Press Enter.
TOPIC C
Add Devices to Windows
In the first part of this lesson, you installed and upgraded Windows. After installation, you
might need to make various modifications to the system, such as adding devices. In this topic,
you will add devices to Windows.
Although the installation process should detect and install any devices present on the system at
the time of installation, what if it does not do so? And what if you need to add devices to the
system later? You know how to accomplish the physical installation of most devices, but the
other half of the equation is to make sure that Windows properly detects the device and adds
the correct drivers. The information and skills in this topic should ensure that you can add
devices to Windows regardless of the device type or the source of the device drivers.
Driver Signing
Definition:
A signed device driver is a driver that has been tested and verified for a particular operating
system, and has a piece of encrypted data, called a digital signature, attached to it by a signing
authority. The digital signature ensures that the driver files have not been altered or overwritten
by another program’s installation process, and that the drivers will not overwrite system files
with older and sometimes incompatible versions, which can cause system instability. For the
best performance and stability, Microsoft recommends that you use only hardware devices with
signed drivers.
Some hardware manufacturers do not provide signed drivers so there will be no option for
using signed drivers in some installs. Proceed with the understanding that the drivers could
cause problems.
Example:
Installation Permissions
You need Administrator level permissions to be able to install new permanent devices in
Windows. However, ordinary users can generally add and remove common Plug and Play
devices, such as USB-based removable storage drives, that have support built in to Windows.
If you find that you have difficulty installing a device, log on with an account that is a member
of the Administrators group.
If you want to start the scan immediately without configuring options, you can also run
the command sigverif.exe /defscan.
ACTIVITY 8-5
Installing Hardware Manually
Scenario:
You have a desktop computer with a single network adapter, but you need to do some testing
on the system as if it had two network adapters. You decide to install The Microsoft
Loopback Adapter, which is a software interface that can simulate the presence of a network
adapter.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
d. Click Next.
k. Click Finish.
ACTIVITY 8-6
Configuring Driver Signing Verification
Scenario:
You work in a lightly managed Windows XP Professional environment. Users have a lot of
autonomy and occasionally make changes to the hardware configurations of their own
systems. To protect your environment, you first want to make sure that all the current drivers
on each user’s computer are safe. Then, you want to make sure that users cannot install any
hardware with unsigned device drivers.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
c. Click Advanced.
e. Click Start.
2. If you discovered any unsigned files during the scan, how would you use this infor-
mation?
e. Click OK twice.
TOPIC D
Optimize Windows
In the previous topics, you installed and configured Windows and the devices running on
Windows. Once the system software and hardware has been completely installed, you might
find that you need to make adjustments so that the system performs at an optimal level. In this
topic, you will optimize Windows.
Installing and configuring Windows goes beyond making sure all the hardware and software is
installed and working. As a support professional, others will be looking to you to ensure that
their systems are functioning at their highest possible level. The skills and information in this
topic should help you meet users’ needs by optimizing the performance of many aspects of the
Windows environment.
Virtual Memory
Definition:
Virtual memory is the ability of the computer system to use a portion of the hard disk as if it
were physical RAM. Windows can manage enough memory addresses to fill 4 GB of memory,
but few systems have this much physical RAM installed. The Windows Virtual Memory Man-
ager (VMM) component is responsible for translating this virtual range of addresses into a
physical memory location. When all physical memory locations are assigned, the VMM can
transfer some of the memory data to a designated location on the hard disk called the pagefile.
Example:
Windows Services
Definition:
A Windows service is a background process that performs a specific operation. Services can
run whether or not a user is logged on. Unlike applications, services do not run in visible
windows. Services enable the system to perform functions that are not included in the operat-
ing system kernel. This keeps the kernel small and streamlined, and it enables an administrator
to optimize the performance of the system by running only necessary services.
Example:
Windows XP also enables you to configure the operating system to attempt to automatically
restart a service when it fails. You can do so by using the Recovery tab in the Properties dia-
log box for each service.
Sequence Description
Pre-boot The pre-boot sequence begins when the power is turned on. The computer runs
sequence Power-On Self Test (POST) routines to determine the amount of physical memory
and the other hardware components present. If the computer has a Plug and Play
BIOS, the hardware is recognized and configured. The computer’s BIOS locates the
boot device, and then loads and runs the Master Boot Record (MBR).
Sequence Description
Boot sequence The boot sequence is when the operating system is selected, and the hardware con-
figuration is detected and loaded. It has four sub-phases: Initial Boot Loader,
Operating System Selection, Hardware Detection, and Configuration Selection. The
boot sequence uses six files during its four sub-phases: Ntldr, Boot.ini, Ntdetect.com,
Ntoskrnl.exe, Ntbootdd.sys, and the optional Bootsect.dos file.
● During the Initial Boot Loader phase, the operating system loader file, Ntldr,
switches the microprocessor from real mode, in which 640 K of RAM is reserved
for MS-DOS and the rest is designated as extended memory, to 32-bit flat
memory mode, in which Windows XP Professional uses all of the available
memory. Ntldr starts the built-in mini-file system drivers, so that it can find parti-
tions formatted to FAT or to NTFS and begin the startup process on them.
● During the Operating System Selection phase, if there are multiple operating sys-
tems installed on the computer, and the Boot.ini file is configured to present a list
of operating systems, the Please Select The Operating System To Start menu
appears so that the user can select a system. If Windows XP is chosen, Ntldr runs
Ntdetect.com. If a non-Windows operating system is chosen, Ntldr runs Bootsect.
dos and relinquishes control of the system. If the user makes no selection, the
default operating system loads.
● During the Hardware Detection phase, Ntdetect.com collects a list of currently
installed hardware components and returns the list to Ntldr. This list will later be
used to create the Hardware key in the registry. The components detected include
bus and adapter types, video adapters, communications ports, parallel ports,
floating-point coprocessors, removable media, keyboards, and pointing devices.
● During the Configuration Selection phase, if the computer has multiple hardware
profiles configured, Ntldr displays the Hardware Profile/Configuration Recovery
menu. Otherwise, Windows XP loads using the default hardware profile.
Kernel load During the kernel load sequence, the operating system components are loaded into
sequence memory. Ntldr loads Ntoskrnl.exe, containing the Windows XP kernel, but does not
initialize it. Ntldr then loads the HAL.dll file. Next, the HKEY_LOCAL_
MACHINE\SYSTEM registry key loads, and Ntldr reads the SELECT key to
determine which control set to load. Control sets are areas of the registry that con-
tain the low-level configuration information for the system, such as the list of device
drivers and services to start. If the system includes any BIOS-disabled SCSI drives,
Windows XP will load the Ntbootdd.sys device driver.
Kernel initiation In the kernel initiation sequence, the Windows XP Professional kernel takes control
sequence of the system. Ntldr passes control to the Windows XP kernel. At this point, the
Microsoft Windows XP logo appears, along with a status bar. During this sequence:
● The HKEY_LOCAL_MACHINE\HARDWARE registry key is created from the
information gathered in the hardware detection phase.
● A copy of the current control set, called Clone, is created.
● Device drivers are loaded and initialized based on entries in the HKEY_LOCAL_
MACHINE\System\CurrentControlSet\Services key. First, drivers with a registry
Start value of 0 load, then drivers with a Start value of 1.
● Next, the Session Manager starts higher-order subsystems and services. This
includes the Win32 subsystem, which controls all input/output devices, provides
access to the video display, and enables the Graphical User Interface (GUI). The
Session Manager also starts the Winlogon process.
Sequence Description
Logon sequence During the logon sequence, Winlogon.exe starts the Local Security Authority (LSA),
and the Logon screen or Logon dialog box appears. Users can now log on, while
Windows XP continues to load low-level drivers and services in the background. The
boot process is considered complete when a user successfully logs on. The Clone
control set built earlier is copied to a new control set called LastKnownGood, thus
preserving a copy of the settings in the successful boot sequence.
The Please Select The Operating System To Start menu is also known as the Boot Loader
menu and the OS Choices menu.
ACTIVITY 8-7
Examining Startup Settings
Scenario:
In this activity, you will examine the startup settings that are controlled by the Boot.ini file.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
Temporary Files
The Windows operating system as well as applications and services that run on the system
occasionally need to store information in temporary files in various locations on the hard disk.
In most cases, the system will remove temporary files after use, but if too many temporary
files remain on the disk it, can take up hard disk space and slow performance. You should
occasionally remove old temporary files if they exist.
Applications can have their own temporary file storage locations. For example, the Internet
Explorer web browser application stores temporary copies of downloaded web files in a Tem-
porary Internet Files folder. This helps web pages load faster. Files in the Temporary Internet
Files folder usually have a functional extension such as .htm or .gif.
ACTIVITY 8-8
Viewing Windows Temporary Files
Scenario:
You are unsure where your Windows system stores its temporary files. You would like to find
the temporary file storage location and open it to determine if an inordinate number of tem-
porary files has accumulated on the system.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Determine the value of the Path a. On the Advanced page of the System
variable. Properties dialog box, click Environment
Variables.
Optimization
Category Tools
Virtual memory Use the Virtual Memory dialog box to adjust settings for virtual memory, including
optimization pagefile locations and initial and maximum size for each pagefile.
Optimization
Category Tools
Hard drive optimi- Disk Management is the primary tool you will use to optimize hard disks on your
zation system by creating, deleting, or formatting partitions to create the most functional
disk configuration. For example, you might want to break a large hard disk into
one operating system partition and a data partition; when users search for files or
documents they can limit the search to the data partition only and save time.
You might also use the Disk Defragmenter utility or its command-line version,
defrag.exe, to reduce fragmentation on the disk.
Temporary file You can use the Advanced tab of the System Properties dialog box to set or
optimization change the Path variable that determines where Windows stores temporary files.
To optimize storage of temporary Internet files in Internet Explorer, open the
Internet Options dialog box and click Settings. You can view or delete the existing
temporary files, and you can set the percentage of disk space allotted to temporary
Internet files.
You can manually delete temporary files from the \Temp folder. Windows XP also
provides the Disk Cleanup tool to assist you in locating and removing unnecessary
files. This also helps improve drive performance overall.
Windows services Running only the necessary services saves system resources such as memory and
optimization processor time and improves efficiency. Use the Services node in Computer Man-
agement to view the list of running services, start or stop services, and set the
startup type (Manual, Automatic, or Disabled) for services.
Startup optimiza- ● Using the Services node in Computer Management to set only necessary ser-
tion vices to start automatically will also improve startup time.
● You can use the System Configuration Utility, available from the Tools group in
the Help And Support Center, to selectively disable legacy configuration files
such as System.ini and Win.ini. These text-based configuration files are present
primarily to support backward-compatibility with older Windows programs.
However, because the processing time required to load these small files is negli-
gible, this also could affect system stability without effectively reducing boot
time. For further information, see Windows XP Help on the System Configura-
tion Utility.
● On multi-boot systems, you can you can edit the Boot.ini file reduce the
timeout value for the boot loader menu. You can also suppress the display of
the Boot Loader menu completely by reducing the timeout value to zero or by
removing all but one operating system entry from Boot.ini. Use the Startup And
Recovery dialog box to configure startup settings in Boot.ini.
Application opti- The best approach you can take to ensure optimum performance for all applica-
mization tions is to:
● Make sure the system is configured with sufficient processor, memory, and hard
disk resources.
● Perform routine system-wide optimization and tuning.
ACTIVITY 8-9
Configuring Virtual Memory
Scenario:
You manage Windows XP Professional desktop systems for a group of desktop-publishing
specialists who use highly memory-intensive applications for developing, editing, and printing
graphics. They have been receiving some low-memory errors. Until you can purchase and
install more RAM, you want to ensure that you have adequate pagefile space allocated on
your system to meet their virtual memory needs. There is quite a bit of empty space on their
hard disks.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. Adjust the virtual memory settings. a. To select the text, double-click in the Ini-
tial Size text box.
e. Click Set.
ACTIVITY 8-10
Disabling the Remote Registry Service
Scenario:
You have users who complain that their systems are running slowly and take a long time to
start up. You want to improve system performance and the boot time by preventing unneces-
sary services from loading. After examining the list of running services, you determine that
there is no need for administrators to edit the registry on these machines from elsewhere on
the network, so you decide that it would be advisable to disable the Remote Registry service.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
d. Click Stop.
e. Click OK.
Lesson 8 Follow-up
In this lesson, you installed and configured operating systems. Whether you are upgrading,
installing from scratch, or redeploying a system, you will need the skills that enable you to
install, configure, and optimize computer operating systems to meet your business needs.
1. Have you done operating system installations prior to this training? Do you feel you
will be able to perform installations more efficiently as a result of the information in
this lesson?
2. Which of the configuration and optimization procedures in this lesson do you think
will be of the most use to you in your professional environment?
Lesson Objectives:
In this lesson, you will maintain and troubleshoot installations of Microsoft Windows.
You will:
● Identify Windows operating system utilities to use in maintenance and
troubleshooting.
● Perform backups.
● Troubleshoot Windows.
● Recover a damaged installation of Windows.
CompTIA® A+® Certification: A Comprehensive Approach for all 2006 Exam Objectives
Introduction
In the previous lesson, you installed and configured Microsoft Windows. Once the system has
been installed, you will need to maintain it on an ongoing basis and correct any problems that
may occur. In this lesson, you will maintain and troubleshoot Microsoft Windows.
It would be nice if you could install a system, configure it, verify it, and walk away and never
touch it again. But in the real world, systems need attention both for ongoing maintenance
tasks as well as to resolve the problems that can, unfortunately, arise. As a professional com-
puter support technician, you will be the main point of contact for customers and clients who
have systems that need fine-tuning or have problems they need an expert to solve. You will
need to be ready with the tools, knowledge, and skills to resolve the users’ issues quickly.
This lesson covers all or part of the following CompTIA A+ (2006) certification objectives:
● Topic A:
■ Exam 220–601 (Essentials): Objective 3.1, Objective 3.3, Objective 3.4
■ Exam 220–602 (IT Technician): Objective 1.3, Objective 3.1, Objective 3.3, Objec-
tive 3.4, Objective 6.2
■ Exam 220–603 (Remote Technician): Objective 1.3, Objective 2.1, Objective 2.3,
Objective 2.4
● Topic B:
■ Exam 220–601 (Essentials): Objective 3.3, Objective 3.4, Objective 6.2
■ Exam 220–602 (IT Technician): Objective 3.1, Objective 3.3, Objective 3.4
■ Exam 220–603 (Remote Technician): Objective 2.1, Objective 2.3
● Topic C:
■ Exam 220–601 (Essentials): Objective 1.3, Objective 3.3
■ Exam 220–602 (IT Technician): Objective 3.1, Objective 3.3, Objective 6.1
■ Exam 220–603 (Remote Technician): Objective 2.1, Objective 2.3, Objective 5.2
● Topic D:
■ Exam 220–601 (Essentials): Objective 3.3
■ Exam 220–602 (IT Technician): Objective 3.1, Objective 3.3
■ Exam 220–603 (Remote Technician): Objective 2.1, Objective 2.3
TOPIC A
Operating System Utilities
In this lesson, you will maintain and troubleshoot Microsoft Windows. To prepare yourself for
these tasks, you should start by reviewing the maintenance and troubleshooting utilities that are
available on the system. In this topic, you will identify operating system utilities to use in
maintenance and troubleshooting.
As a competent computer support professional, you don’t want to have just a few tools in your
toolkit; you want to have a wide range of options available so that you can choose the most
appropriate one to use in a particular situation. Some tools are physical items that you can
touch, but a lot of them are software utilities that are built in to the operating system. This
topic will prepare you to make the best use of the wide range of tools and utilities that you
can use to perform file, disk, and system management on Microsoft Windows.
File Management
Tool Description
Windows Explorer Windows Explorer is the primary graphical utility that you can use to perform
all basic file and folder management tasks. With Windows Explorer, you can:
● Create files and folders.
● View file and folder properties such as file size or the date and time the
file was modified.
● View or change file or folder attributes.
Command-line tools There are command-line utilities that enable you to perform most file-
management tasks at a command prompt or in a script file. These include:
● del, deltr to delete files and folders.
● md to create folders
● rd to delete folders.
For the syntax of these commands, see the Windows Help system.
Disk Management
Tool Description
Disk Management A comprehensive graphical tool that you can use to manage disk drives
themselves as well as the partitions the drives contain. With Disk Manage-
ment, you can:
● Display the drives attached to the system.
ACTIVITY 9-1
Exploring Disk Management Tools
Setup:
There are at least two NTFS partitions on the primary hard disk. If you did not do the lab for
the Installing and Configuring Operating Systems lesson, you will need to create a second
NTFS partition.
Scenario:
As a computer support professional, you will be responsible for managing and maintaining
hard disk configuration and performance for your customer. To prepare yourself for profes-
sional disk-management tasks, you plan to review the status of the disks on your own local
system.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
b. Enter chkdsk
ACTIVITY 9-2
Exploring System Management Utilities
Scenario:
As a computer support professional, you will be responsible for managing and maintaining
system configuration and performance for your customers. To prepare yourself for profes-
sional system-management tasks, you plan to review the status of the system components on
your own local computer.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
3. Examine the system status with a. Right-click the taskbar and choose
Task Manager. Task Manager.
h. Click Yes.
5. Examine the system information a. In the Help And Support Center, in the
with msinfo32. Tools list, click Advanced System
Information.
h. Collapse Components.
l. Select Summary.
g. Choose View→Filter.
i. Click OK.
TOPIC B
Maintain Microsoft Windows
In the previous topic, you identified the general operating system management utilities that you
will employ in a range of activities as a computer support technician. One of those common
support tasks is to perform basic system maintenance. In this topic, you will maintain Win-
dows systems by performing data and system backups.
Maintaining an operating system is an ongoing task that might not seem as exciting or interest-
ing as performing a new installation or replacing a hard disk, but it is actually one of the most
crucial tasks for a support technician. System maintenance is important for two reasons; first,
proper maintenance can prevent system problems from arising. Second, proper maintenance of
the system, including the creation of appropriate backups, can make recovery or troubleshoot-
ing operations much easier in the event that problems do arise. As an A+ technician, you can
use the skills and information in this topic to perform backups as part of your ongoing operat-
ing system maintenance tasks.
Example:
Backup Schemes
Backups should be performed systematically and on a regular basis for the best protection
against data loss. Most large organizations will implement a structured backup scheme that
includes a backup schedule and specifications for how much data is backed up, where it is
stored, and how it can be retrieved. The backup scheme will specify the backup rotation
method, which determines how many backup tapes or other media sets are needed, and the
sequence in which they are used and reused. Designated administrators will have the responsi-
bility for designing and managing the backup scheme and for restoring data when needed.
You can access the Windows Backup Ulitility from the command line using the ntbackup.exe
command.
There are also many third-party backup utilities available for backing up and restoring data on
Windows computers.
Backup Types
Windows Backup supports a variety of backup types.
Backup Requirements
You must be a member of the Backup Operators group, be a file owner, or have at least Read
NTFS permissions to back up file data.
Backing up the System State data requires approximately 400 MB of space. You must back it
up to a tape, a folder on the local computer, or a shared folder on a server.
7. On the What To Back Up page, select Let Me Choose What To Back Up.
8. Click Next.
9. Below Items To Back Up, expand My Computer and check System State.
10. Click Next.
11. On the Backup Type, Destination, And Name page, complete the following tasks:
a. From the Select The Backup Type drop-down list, select the type of backup you
want to create (if you do not have a local tape backup device, your only choice will
be File).
b. Next to Choose A Place To Save Your Backup, click Browse to browse for the folder
in which you will store the backup. If you’re backing up to file, you must store the
System State data backup on a hard disk because you will need approximately 400
MB of storage space.
c. In the Type A Name For This Backup text box, type a name for the backup file.
d. Click Next.
12. To create the backup using the default settings, click Finish (click Advanced if you want
to schedule the backup to run on a regular basis).
13. Review the Backup Progress dialog box to verify that the backup completed successfully.
14. Click Close to close the Backup Progress dialog box.
Advanced Mode
You can also run Windows Backup in Advanced Mode. Advanced Mode enables you to enter
your backup configuration options on separate pages of a dialog box instead of through the
wizard. However, all the same options are available through either method. To run in
Advanced Mode, click the Advanced Mode link on the first page of the Backup Or Restore
Wizard. A Backup Utility window will open. To switch back to Wizard Mode, click the Wizard
Mode link on the Welcome page in the Backup Utility window.
Ntbackup
You can also use the ntbackup command to back up folders from the command line. This is
useful if you want to create a batch file to back up data. See Windows Backup Help for the
syntax and usage of the ntbackup command.
ACTIVITY 9-3
Backing Up System State Data
Setup:
You will need approximately 400 MB of free space on your C drive to complete the backup.
Scenario:
One of your clients uses his computer 100 percent of the time to do his job. His computer
uses the Windows XP operating system. He is very concerned about a computer crash. He
wants to make sure that you will be able to reconstruct his computer as quickly as possible in
the event of an operating system failure.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
c. Choose File→Properties.
f. Choose File→New→Folder.
2. Back up the System State data. a. From the Start menu, choose All
Programs→Accessories→System
Tools→Backup.
c. Click Next.
h. Click Next.
j. Click Next.
k. Click Finish.
TOPIC C
Troubleshoot Microsoft Windows
In the previous topic, you performed basic Windows system maintenance tasks. By maintaining
the system properly, you can avoid many problem conditions and you will be in a good posi-
tion to correct errors efficiently when they arise. In this topic, you will diagnose and correct
various Windows system errors.
As a computer support professional, you will be the first line of response to help users when
problems arise with their systems. You will need the knowledge to recognize and diagnose
problem conditions, and you will be need to respond to those problems with the appropriate
corrective action. The information, utilities, and skills in this topic should provide you with the
diagnostic and troubleshooting toolkit you will need to identify and correct a range of possible
system problems.
Example:
Example:
Application Errors
There are some common error messages that indicate problems with applications.
Boot Errors
There are several errors that can occur during the boot process or Windows startup.
Error Description
POST errors If there are errors during the POST, the system might display a numeric error
message. Typically, you can press F1 to acknowledge the error and continue booting.
For other POST errors, a series of audible beeps will tell you if a problem has been
detected. The sequence of beeps is a code that indicates the type of problem.
Invalid boot The most common cause of this is a non-bootable disk in a drive. If your system has
disk floppy-disk drives, check to see if you need to remove a disk from the drive. How-
ever, there could be a hardware problem with the hard disk. Also verify that CMOS is
set to boot from the hard drive. Most BIOS allow for the configuration of 4 or more
boot devices as 1st, 2nd, 3rd, etc. If one fails, it will automatically try the next in
line. The only way this process will fail is if the boot devices are set to None or all
the same (which many don’t allow). Also, it can’t be assumed that the user will want
the CMOS to be set to ″boot from the hard drive″ since many times there is a need to
boot from CD, or even boot through the network.
Inaccessible There might be a hardware problem with the hard disk or hard disk controller. Check
boot device hard drive and hard drive controller connections.
Missing The NTLDR file might be missing or corrupt, in which case you might need to copy
NTLDR it from the Windows CD-ROM. However, the most common problem is that there is
a non-bootable disk in the drive.
Error Description
Other missing If Ntoskrnl is missing, you can copy it from the Windows installation CD-ROM. This
Windows error can also indicate a problem in the ARC path specifications in the Boot.ini file.
startup files If Bootsect.dos is missing on a dual-boot system, you will have to restore it from a
backup file, as its contents are specific to a particular system.
System files should not be deleted or become corrupt during normal system operation,
so these errors are rare. They might indicate an underlying hardware problem, a disk
error, or the presence of a computer virus.
Device or ser- There might be a problem with a missing or corrupted device driver, or there could
vice failed be hardware resource conflicts (although this is rare on a Plug and Play system).
during startup
Device or pro- A device driver or related file might be missing or damaged. You might need to rein-
gram in registry stall the device.
not found
Beep
Error Video
Code Output Problem Solution
One or more Command None (nor- None.
short beeps prompt mal startup
beep)
None None Power Check power cords, wall voltage, PC’s power
supply.
None Cursor Power Check the PC’s power supply; check for suffi-
cient wall voltage.
None Command None May be a defective speaker.
prompt
One short, None Display Check for monitor power; check video cable;
one long check display adapter.
beep
Two short None or Display Check for monitor power; check video cable;
beeps incorrect check display adapter.
display (gar-
bage)
Two short None Memory Check to see that all RAM chips are seated
beeps firmly, swap out RAM chips to determine which
is defective, and replace the defective chip.
Repeating Probably Power Check the PC’s power supply; check for suffi-
short beeps none cient wall voltage.
Continuous Probably Power Check the PC’s power supply; check for suffi-
tone none cient wall voltage.
Beep
Error Video
Code Output Problem Solution
One long, Probably System Check to see that all adapters, memory, and chips
one short none board are seated firmly; check for proper power connec-
beep tions to the system board; use diagnostics
software or hardware to further troubleshoot the
system board.
One long, Probably Display Check for monitor power; check video cable;
two short none check display adapter.
beeps
One long, Probably Display Check for monitor power; check video cable;
three short none check display adapter.
beeps
Two short Numeric Varies depending upon the source of the problem
beeps error code as indicated by the numeric error code.
Item Description
Type The type of log entry: Information, Warning, Error, Success Audit, or Failure
Audit.
Source The software that logged the event; this could be an application, service, or
driver.
Category Classifications for security events, such as Logon and Logoff, Policy Change,
Object Access, and so on.
Event An identifying number for the type of event. Events with the same number
are of the same nature.
User The name of the user that generated the event, if applicable. (Many events
are generated by the system itself.)
Computer The name of the computer where the event occurred.
Description A text description of the event. These descriptions tend to be quite short; in
many cases, there is a link to more specific information on the Microsoft
Help and Support website.
Data Binary event data. Not all events generate binary data.
1. A user calls saying that her screen occasionally goes blue and the system shuts
down. What should you advise her to do?
a) Call the Help Desk the next time the shutdown is in progress.
b) Reboot manually after the automatic restart.
c) Record as much information on the top of the blue screen as she can so that you
can research the particular error.
d) Run the system in Safe Mode.
2. A user reports that his Microsoft Word window has gone blank and he cannot type
text. What are possible approaches to resolving his problem?
a) Reboot the computer.
b) Run another copy of Microsoft Word.
c) Wait a few minutes to see if the application returns to normal.
d) Use Task Manager to shut down the application if it has a status of Not Responding.
3. A user reports her monitor display is “fuzzy” and hard to look at. What is a possible
cause of this problem?
a) Display settings for the monitor are incorrectly configured.
b) The power cord is unplugged.
c) The monitor cable is not properly seated.
d) The monitor device is disabled in Windows.
4. A user reports that while she is editing a document, she receives an “invalid work-
ing directory” message from her application. What is a good diagnostic question to
ask in response to this error?
a) Did the application work yesterday?
b) Is anyone else having this problem?
c) Who installed the application?
d) Have you deleted any files or folders lately?
3. If necessary, you can filter the events in the log to help you identify the cause of the
problem. To do so, select the appropriate log and then choose View→Filter. Make the
appropriate selections to filter the log. Criteria on which you can filter include:
● The type of message (information, warning, error, success audit, or failure audit).
● The source of the message (an application, service, or driver).
● Category of the message.
● The event ID, an identifying number for the type of event.
● The user who generated the event (if applicable).
● The name of the computer where the event occurred.
● A text description of the event.
4. If you’re unsure as to the cause of an error message, try researching the message in the
Microsoft KnowledgeBase at http://support.microsoft.com/search/?adv=1.
3. When prompted, enter a valid user name and password for the remote computer.
When you establish the connection to the remote computer, Windows XP automatically
switches to the user logon screen at that system to prevent the remote user from interfer-
ing with the troubleshooting steps you perform.
4. Perform any necessary diagnostics and troubleshooting using the desktop displayed. You
can work as if you were seated at the remote computer.
5. When you are done, make sure you log off from the remote computer. Then, disconnect
or shut down the remote desktop application.
ACTIVITY 9-5
Troubleshooting a Remote Computer with Remote
Desktop
Setup:
You are going to work with a partner to complete this activity. You will take turns playing
the role of the helper and the user needing assistance. First, the user needing assistance will
enable Remote Desktop. Then, the helper will connect to that computer using Remote Desk-
top Connection and the Administrator user account.
Scenario:
You have been assigned to support a user whose office is several floors away from yours. You
would like to be able to troubleshoot this computer without having to go to the user’s office.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. At the computer needing help, con- a. Open the System Properties dialog
figure the computer to support box.
Remote Desktop connections.
b. Click the Remote tab.
d. Click OK.
Helper Computer:
c. Click Connect.
TOPIC D
Recover Microsoft Windows
In the previous topic, you performed troubleshooting tasks to correct various Windows error
conditions. If you cannot correct the error condition using normal troubleshooting means, you
might need to recover all or part of the system data or configuration. In this topic, you will
recover Microsoft Windows from various system problems.
As a computer support professional, it will be your responsibility to recover systems from
severe problems when they arise. Windows provides a wide range of techniques for recovering
from all types of error conditions. You will need to know which recovery technique is the most
appropriate to use in a given situation, as well as to be able to employ it properly. The infor-
mation and skills in this topic should prepare you to respond in a professional and competent
manner to correct system issues, recover the system, and get users working again.
System Restore
A system restore point is a snapshot of the system configuration at a given moment in time.
The System Restore utility monitors the system for changes to core system files, drivers, and
the registry. It automatically creates restore points that contain information about any changes
to these components and stores the restore points on the computer’s hard disk. You can also
create manual restore points. Restore points include information about changes to system files,
but not data files or the contents of the My Documents folder. You can use a restore point to
restore system settings to an earlier state without affecting changes in user data since that time.
For a complete list of file types that are excluded from System Restore monitoring, see
“Appendix D – Tools for Troubleshooting” in the Windows XP Professional Resource Kit.
Restore points also do not completely remove installed software. Use Add Or Remove Pro-
grams to remove all files, settings, and Registry entries for an installed application.
Safe Mode
Safe Mode is a Windows system startup method that loads only a minimal set of drivers and
services. If a non-critical driver or service on your system is causing a severe error, you can
use Safe Mode to omit all non-critical drivers and services from the boot sequence; start the
system; load additional drivers, services, and applications as needed; and correct the problem.
An example of a Safe Mode error is when the display fails to initialize during startup. This can
produce stop errors or the screen will appear blank or distorted. You can start the computer in
Safe Mode, and then roll back or uninstall the display adapter driver. When you restart the
computer, the display should initialize.
Remember that Windows startup is not considered successful until a user logs on. Therefore,
the Last Known Good control set is not created until user logon. This also means that once
you have restarted and logged on to a damaged system, you can no longer use Last Known
Good to revert to a previous configuration.
Recovery Console
The Recovery Console is a minimal, non-graphical administrative version of Windows. You
can boot to Recovery Console and use a command-line interface to manage the system even if
Windows will not start normally.
You can install Recovery Console as a boot option or launch it from the Windows XP installa-
tion CD-ROM.
One way to use Recovery Console is to fix a disk problem that prevents NTLDR from loading.
The Recovery Console has two commands that can fix the master boot record (MBR) and the
boot sector: Fixmbr, which rewrites the MBR, and Fixboot, which rewrites the boot sector of
the system volume.
Repair Installations
Although ASR is not supported in Windows 2000, both Windows 2000 and Windows XP sup-
port an alternate recovery method called Emergency Repair. When you install Windows, the
system stores information about the configuration of the operating system in a hidden folder
called \Windows\Repair. If your installation is damaged, you may be able to repair it by using
this information and the Windows Setup program. You might want to try a repair installation
as an intermediate step before attempting ASR or a complete reinstall.
Recovery Partitions
Sometimes a computer manufacturer will supply a recovery partition or CD-ROM that you can
use to restore a computer to the configuration it was in when it shipped from the manufacturer.
Note that the Recovery Partition/CD-ROM not only restores the operating system, but also all
applications that came pre-installed on the computer. Some manufacturers store the necessary
information in a hidden partition on the computer’s hard disk. Others store this information on
a CD-ROM. The steps you use to perform this type of recovery are manufacturer-specific.
Review the documentation that came with the computer to determine how to perform the
recovery.
Category of
Problem Possible Causes and Actions to Take
General issues ● For boot process issues, use standard Safe Mode and boot-process trouble-
shooting techniques.
● Viruses can cause a variety of general system problems. Install or update the
user’s virus software and perform a complete virus scan.
● If the problem occurs when a specific application runs, use Task Manager to
terminate the application and then troubleshoot its installation and
configuration.
Memory issues An application or service might be leaking memory, which means that it is not
releasing previously allocated memory back to the system after use.
● Use Task Manager to see which applications are using memory. Have the user
reboot and run for a period of time, then check again to confirm.
● Use the System Configuration Utility to disable problem applications at
startup.
● Use system monitoring techniques to check the overall memory performance.
Category of
Problem Possible Causes and Actions to Take
Disk issues Low disk space can slow system performance. If there is less than 100 MB of
free disk space:
● Delete temporary Internet files in the Internet Explorer cache.
● Run the Disk Defragmenter, Disk Cleanup, and Check Disk utilities.
CPU issues Use Task Manager to identify processes that dominate the available CPU usage.
Use System Configuration to disable any unnecessary processes at startup.
The ultimate solution to some performance problems might be upgrading the system hardware
by adding more memory or a larger hard disk. As a support technician, you might or might not
be able to request this type of upgrade.
3. Select Last Known Good or the desired Safe Mode option from the Windows Advanced
Options menu.
4. Start Windows and log on.
5. If you are in Safe Mode, click OK in the message box.
6. If you are in Safe Mode, perform the appropriate configuration or troubleshooting tasks
and restart the system in normal mode.
Even if the disk is already blank and formatted, you must format it again under Windows.
The Windows formatting routine writes required boot information to the boot sector of the
floppy disk.
7. Copy the following required boot files from the C:\ folder to the floppy disk:
● Boot.ini
● Ntldr
● Ntdetect.com
● Bootsect.dos (if present)
● Ntbootdd.sys (if present) (This is the device driver for BIOS-disabled SCSI disk
drives.)
8. Restart the computer with the floppy disk in the drive to verify that you can boot
successfully.
9. Remove the boot floppy disk, label it, and store it in a secure location.
10. Remove the floppy disk, label it, and store it in a secure location.
To create an ASR backup set while also backing up all user data, run Windows Backup
in Wizard mode, select Back Up Files And Settings, and select All Information On This
Computer. You will need enough storage space to back up the complete contents of your
computer.
To support unattended system recovery, the screens in the Automated System Recovery
Wizard are configured to advance automatically after a time-out.
6. If you are prompted for an installation directory (for example, if you are installing to a
clean hard disk) provide the path (typically you will install to C:\Windows). When the
installation and restoration are complete, the computer will restart.
7. Log on and verify the system configuration.
ACTIVITY 9-6
Restoring System State Data
Setup:
You have backed up the System State data for Windows XP to C:\Backup\Backup.bkf.
Scenario:
A programmer just installed a custom application he developed on one of your client’s
computers. The client has contacted you because he’s now experiencing problems with his
computer. You aren’t sure what the custom application changed on the computer. Fortunately,
you scheduled a System State data backup to take place on a regular basis; the last backup
occurred last night.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
b. Click Next.
e. Click Next.
f. Click Advanced.
ACTIVITY 9-7
Restoring the System to a Restore Point
Setup:
In this activity, you will create a restore point and restore the system to that restore point.
Scenario:
One of your hardware suppliers has just posted some updated device drivers to their website,
and they recommend that all their clients install these drivers. However, none of the drivers
are signed. You know that you could roll back a single driver if you have problems with it,
but in this case, you have several different files to update. You’re not sure exactly what the
ramifications to the system will be. Before you start installing the new drivers, you would
like to be sure that you have a way to bring the system back to its current state if you
encounter problems. You decide to use a restore point; because you have not created a
manual restore point before, you want to test the restore point after you create it.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
d. Click Create.
ACTIVITY 9-8
Recovering the System With Last Known Good
Objective:
In this activity, you will create a boot problem with the keyboard, and then correct the prob-
lem by using Last Known Good.
Scenario:
A change to the configuration of the keyboard driver is completely preventing user logons.
Because the keyboard is not responding, even the Administrator can’t log on to fix the
problem. You need to restore system functionality so that users can log on again.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
1. Modify the Registry to prevent the a. To run Registry Editor, Choose Start→
Kbdclass device from loading. Run, type regedit and click OK.
5. Use the Last Known Good configu- a. Use the power button to turn the com-
ration to start the computer. puter off and on again.
ACTIVITY 9-9
Testing the Recovery Console
Setup:
You have the Windows XP Professional installation CD-ROM available.
Scenario:
You are spending your day visiting the desktops of a number of users who have reported
severe system problems. Not all the systems have Recovery Console installed as a boot
option, so you have a copy of the Windows XP Professional CD-ROM available. Once you
boot to Recovery Console, however, you need to select the appropriate tools and techniques
to correct the specific problem for each system.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
2. View Help system entries on vari- a. At the C:\Windows prompt, to display a list
ous Recovery Console commands. of supported Recovery Console com-
mands, enter help
3. Use the Help information to match the system problem with the most likely method
for correcting it in Recovery Console.
After performing some a. Use the enable command to enable
disk management tasks, a the service.
user has been unable to
restart his computer. The
user sees an Unreadable
Boot Disk message.
A user has manually dis- b. Use the delete command to delete
abled a key startup pagefile.sys. The file will be re-created
service. at the next startup.
A user installed a new, c. Use Fixmbr, which rewrites the MBR,
unsigned driver and the or Fixboot, which rewrites the boot
system will not start. sector of the system volume.
A user deleted the d. Use the expand and copy commands
Ntdetect.com file. to copy a new version of the file from
the Windows XP Professional installa-
tion media.
The Windows pagefile has e. Use the disable command to disable
become corrupt. the driver. When you reboot, you can
remove the driver.
NTLDR will not load. f. Use the bootcfg command.
ACTIVITY 9-10
Creating and Testing a Windows XP Boot Floppy Disk
Setup:
You will need a blank floppy disk for this activity. Your computer system BIOS is configured
to boot from the floppy drive.
Scenario:
You’re updating your troubleshooting toolkit, and you realize that you don’t have a boot
floppy disk for the new Windows XP Professional installations in your company. You decide
to use your desktop computer to create a Windows XP Professional boot floppy disk.
There is a simulated version of this activity available on the CD-ROM that shipped with this
course. You can run this simulation on any Windows computer to review the activity after
class, or as an alternative to performing the activity as a group in class. The activity simula-
tion can be launched either directly from the CD-ROM by clicking the Interactives link and
navigating to the appropriate one, or from the installed data file location by opening the C:\
085820Data\Simulations\Lesson#\Activity# folder and double-clicking the executable (.exe)
file.
b. Open My Computer.
g. Click Close.
i. Click OK.
3. Copy the required files to the boot a. In the C:\ folder, select the Boot.ini,
floppy disk. Ntldr, and Ntdetect.com files.
4. Test the boot floppy disk. a. Choose Start→Turn Off Computer and
click Restart.
Lesson 9 Follow-up
In this lesson, you performed maintenance and troubleshooting on Microsoft Windows systems.
You will be the main point of contact for customers and clients who have maintenance issues
or system problems, and the skills and tools you used in this lesson should help you resolve
those problems for your clients quickly.
1. Were any of the management or recovery tools and utilities presented in this lesson
familiar? Which ones?
2. Have you ever had to recover a damaged computer system? What was the situation,
and what approach did you use? Do you think your approach will be different from
now on?
1.1