COMPUTER HARDWARE AND DIGITAL ELECTRONICS SYSTEMS Unit- 1
Introduction to Computers Advantages Disadvantages Assembling Computer – Different parts computers Connecting various Devices and Components BIOS Setup –Load Fail Safe Default Load Optimized Default Standard CMOS Features Advance BIOS Features Advance Chipset Features BIOS Setup Integrated Peripheral Power Management Setup PnP PCI Configuration Frequency Voltage Control Supervisor User Password Setting Partitioning and Formatting HDD Introduction to file system Different types file system
Unit- 2
Input Devices Function Input devices– Keyboard Mouse Scanner MIC Light Pen and Touch Screen and their Components Output Devices Function output devices Monitor and Types monitors Speaker Printer and its types Inside to Printer and Plotter
Unit- 3
Memory Primary and Secondary Memory RAM and ROM and its types memory Packages and Modules SIP DIP SIMM DIMM RIMM’s Modules Installation Techniques Introduction the Cache Memory Types the Cache Memory Virtual Memory Flash Memory Secondary Storage Devices – FDD CD HDD DVD and their Internal Components and Structures installing different storage devices.
Unit- 4
Introduction to Electronics difference between electrical and electronics concepts current voltage résistance types current and their conversion different Types Electronic Components and their sub types soldering electronic components electronic tools switching circuits power electronics and digital electronics.
Unit- 5 -
Microprocessor BUS and It’s Types CPU Generation and X86 Intel family processor MHz and GHz. Identification Processor Different Parts Motherboard Processor Slot Socket Memory Slot Expansion Slot IDE Connector FDC connector COM Port Parallel Port USB BIOS Front panel connector Keyboard Connector Power connector Display connector Sound Port Ps 2 Connector
1 | P a g e
UNIT - 1
INTRODUCTION
Computer
A computer is an electronic device that is designed to work with information. The computer takes information in, processes that information, and then displays the results. In this way, a computer is similar to a calculator, except that even the smallest computer is much more versatile than the most powerful calculator. Computers operate at amazingly fast speeds, with a typical computer processing millions of calculations every second.
A computer has four functions:
a. accepts data Input
b. processes data Processing
c. produces output Output
d. stores results Storage
Input (Data):
Input is the raw information entered into a computer from the input devices. It is the collection of letters, numbers, images etc.
Process: Process is the operation of data as per given instruction. It is totally internal process of the computer system.
Output: Output is the processed data given by computer after data processing. Output is also called as Result. We can save these results in the storage devices for the future use.
Computer System
All of the components of a computer system can be summarized with the simple equations.
COMPUTER SYSTEM = HARDWARE + SOFTWARE+ USER
• Hardware = Internal Devices + Peripheral Devices
2 | P a g e
All physical parts of the computer (or everything that we can touch) are known as Hardware.
• Software = Programs
Software gives "intelligence" to the computer.
• USER = Person, who operates computer.
A computer is a device that you can use to store, manipulate, and display text, numbers, images, and sounds. Personal Computer
A personal computer is a small, relatively inexpensive computer that is designed for use by one person at a time. It allows you to perform personal tasks such as creating documents, communicating with other people, and playing games. The abbreviation PC is most often used to refer to computers that run the Microsoft Windows operating system, as well as to differentiate them from Macintosh computers.
Why Computer?
The word ‘Computer’ literally means to ‘Compute’ or to ‘Calculate’. Stated simply, it is an electronic device which processes information based on the instructions provided, to generate the desired output. It, therefore, requires two types of input – raw data, and the set of instructions to process or act upon the data. This can schematically be shown in Figure 1.1.
Outpu Data Process Output Instructions
Input
Figure: Processing Information Data can be of any type – text, numeric, alpha numeric, image, picture, sound etc. The instructions. 1 that act upon this data are also called the program or software in computer terminology.
3 | P a g e
Advantages of Computers
Because of the many advantages of a computer, it has become an important household item. A computer operated by an individual without any specific computer operator is called a personal computer (PC). A PC can be a desktop or a laptop computer and can be used at home or at office. As per the requirement of the user, software is installed in a PC. Let's discuss the advantages of computers.
One can write more effectively by means of a computer. There are tools like spelling and grammar checker, thesaurus and dictionary, installed in the computer. Thus, it takes less time to proofread a written document and also, there is no need to open up a dictionary book to look for meanings of words. Typing is much faster than writing on a paper. If there is a need for reorganizing the sentences or paragraphs, one can cut and paste and make the necessary changes. Thus, overall a computer allows the user to create documents, edit, print, and store them so that they can be retrieved later.
Using a computer, one can remain connected to the world through Internet. Internet is a network of computers that communicates via the Internet Protocol Suite (TCP/IP). The World Wide Web (WWW) or simply web is a huge resource of information that can be accessed via the Internet. To mention a few of the resources, there are electronic mail (e mail), file transferring and sharing, online chat, and gaming. The Internet allows people from around the world to share knowledge, ideas and experiences in any field. But, there are both advantages and disadvantages of Internet.
E mail is a method of communication used globally and is provided with a system of creating, storing and forwarding mails. It may consist of text messages with attachments of audio visual clips. One can also download or upload files using the Internet. There are also facilities like online chatting available on the Internet. As compared to telephonic conversation, both e mail and online chat are cost saving. Online gaming is another important resource of the WWW. Many online games are available, which are of common interest for any age group. In addition, one can read current news, check weather conditions, plan vacations and make hotel and travel reservations, find out about diseases and treatment methods, conduct transactions, learn about specific countries and their cultures, seek jobs, buy products, etc via the Internet.
Nowadays, computers are widely used for education and training purposes. In schools, computer education has been made compulsory to spread awareness about computers. As a matter of fact, computers have become a learning tool for children. Also, there are many universities that provide online degrees, which is very advantageous for those people staying in the remote areas and for the disabled. In fact, online education is one of the most flexible and convenient forms of learning. One can take the benefit of such
4 | P a g e online degree programs staying at home without the need of relocation. Computers are also used for training purposes. Many companies use them to train their staffs.
However, in spite of the many advantages of computers, there are some disadvantages that cannot be ignored. The easy access to information via Internet has made students lazy in terms of their education since they are able to download information without exploring their topic of research. They also use computers for mathematical tables and calculations without actually solving the problems. Also, it is important for parents to keep a check on the browsing habits of their children as some websites are not meant for their viewing. Other disadvantages include identity theft and virus threat. Computers viruses are harmful to the systems and can be transferred from one computer system to another. Disadvantages of computer.
There are a lot of advandantages of using computer and it's necessary to handle it in our life. You can research so many information through the internet. When you do your homework, you can earily find some pictures and vidioes and you can use them as a reference. If you get used to use the computer, it's better to get a good job and in some companies, they insist us to get some certification about computer. So the importance of computer is becoming strengthen.
But some experts alert the danger of the computer addiction disorder. Especially for the children, they can be easily hooked on the computer games. Instead of doing homework, studying or playing with friends, they seclude and just play computer untill late at night. so they can concentrate the teacher's words and it destroys their schooling.
There is another problem of computer. Because of anonymity, some people can deceive other people and it might be a fraud. For example, there is a website where the people can post the advertisement and sell certain products. Throught that site, you paid for one dictionary. But when you recieve and open it, there is a brick, not the dictionary. Nowadays, the electronic commerce is getting popurlar, so it might happen like upper situaion.
When you use the computer a lot, it attacks your eye sight. The experts warn not to use the computer longer than 1 hour and after using it, you have to take a rest for your eyes. But people mostly use the computer longer than one hour and for the children, they can't easily refuse the temtation of computer.
Besides these, there are a lots of disadvantages such as illegal downloading and becomming violent. But the worst thing is that the computer addicts don't know what to do and they don't know how dangerous it is.
5 | P a g e
Assembling Computer
Things to get in place before starting:
• Anti static wrist strap
• Set of screwdrivers and pliers
• Piece of cloth
• CPU Thermal compound (recommended)
• PC components
Tip: CPU Thermal compound is not a necessity but it is recommended to keep your CPU cool under load conditions by helping heat dissipate faster. It is a must if you intend to overclock your PC.
Note: You can find the meaning of an abbreviation at the end of this article under the heading Jargon Buster.
Step 1: Installing the motherboard
Make sure you have all the components in place and a nice, clean and big enough place to work with.
Put your antic static wrist strap on to prevent your components from getting affected. Make sure your hands are clean before starting. First we will be installing the motherboard which is a piece of cake to install.
• Open the side doors of the cabinet
• Lay the cabinet on its side
• Put the motherboard in place
• Drive in all the required screws
Tip: Most motherboards come with an antistatic bag. It is advisable to put the motherboard on it for some time and then remove it from the antistatic bag before placing it in the cabinet.
6 | P a g e
Step 2: Installing the CPU
CPU is the heart of a computer so make sure you handle it properly and do not drop it or mishandle it. Also try not to touch the pins frequently so that they do not get dirty. Get hold of your motherboard and CPU manual. You need to place the CPU on the dotted white patch of the motherboard in a particular fashion for it to fit properly. There is a golden mark on the CPU to help you assist. Consult both your motherboard and CPU manual to see which position it fits exactly or you could also use try all the 4 positions.
• Lift the CPU lever on the motherboard
• Place the CPU properly on the motherboard
• Pull down the lever to secure the CPU in place
Warning: Do not try to push the CPU into the motherboard!
Got the thermal compound? Now is the time to use it. Take small amount of it and carefully apply it on the top surface of the processor. Be careful not to put it on the neighboring parts of the motherboard. If you do so clean it immediately using the cloth.
Tip: Thermal compounds should be changed once every six months for optimal performance.
Step 3: Installing the heat sink
After installing the processor we proceed to installing the heat sink. There are different kinds of heat sinks that are bundled with the processor and each has a different way of installation. Look into your CPU manual for instructions on how to install it properly.
• Place the heat sink on the processor
• Put the jacks in place
• Secure the heat sink with the lever
7 | P a g e
After this you will need to connect the cable of the heat sink on the motherboard. Again look into the motherboard manual on where to connect it and then connect it to the right port to get your heat sink in operational mode.
Step 4: Installing the RAM
Installing the RAM is also an easy job. The newer RAMs ie. DDR RAMs are easy to install as you don’t have to worry about placing which side where into the slot. The older ones, SDRAMs are plagued by this problem.
If you want to use dual channel configuration then consult your manual on which slots to use to achieve that result.
• Push down the RAM into the slot
• Make sure the both the clips hold the RAM properly
Step 5: Installing the power supply
We will now install the power supply as the components we install after this will require power cables to be connected to them. There is not much to be done to install a PSU.
• Place the PSU into the cabinet
• Put the screws in place tightly
Tip: Some PSU have extra accessories that come bundled with it. Consult your PSU manual to see how to install them.
Step 6: Installing the video card
First you will need to find out whether your video card is AGP or PCI E. AGP graphics cards have become redundant and are being phased out of the market quickly. So if you bought a spanking new card it will certainly be a PCI E.
• Remove the back plate on the cabinet corresponding to the graphics card
8 | P a g e
• Push the card into the slot
• Secure the card with a screw
• Plug in the power connection from PSU (if required)
High end graphics cards need dedicated power supply and if your graphics card needs one then connect the appropriate wire from PSU into the graphics card.
Step 7: Installing the hard disk
Hard disk is another fragile component of the computer and needs to handled carefully.
• Place the hard drive into the bay
• Secure the drive with screws
• Connect the power cable from PSU
• Connect the data cable from motherboard into the drive
If your hard drive is a SATA one then connect one end of SATA cable into the motherboard and other into the SATA port on the hard disk. If your hard disk is PATA type then use the IDE cable instead of the SATA cable.
Tip: If your PSU does not support SATA power supply then you will need to get an converter which will convert your standard IDE power connector to a SATA power connector.
Step 8: Installing optical drive
The installation an optical drive is exactly similar to an hard drive.
• Place the optical drive into the bay
• Drive in the screws
• Connect the power cable and data cable
Tip: When installing multiple optical drives take care of jumper settings. Make sure you make one as primary and other slave by using the jumper. This is not applicable if the drives are SATA drives.
9 | P a g e
Step 9: Connecting various cables
First we will finish setting up internal components and then get on to the external ones. You will need to consult your motherboard manual for finding the appropriate port for connecting various cables at the right places on the motherboard.
• Connect the large ATX power connector to the power supply port on your motherboard
• Next get hold of the smaller square power connector which supplies power to the processor and connect it to the appropriate port by taking help from your motherboard manual
• Connect the cabinet cables for power,reset button in the appropriate port of the motherboard
• Connect the front USB/audio panel cable in the motherboard
• Plug the cable of cabinet fans
You are done with installing the internal components of the PC. Close the side doors of the cabinet and get it upright and place it on your computer table. Get the rest of the PC components like monitor, keyboard, mouse, speakers etc. which we will connect now.
• Connect the VGA cable of the monitor into the VGA port
• If mouse/keyboard are PS/2 then connect them to PS/2 ports or else use the USB port
• Connect the speaker cable in the audio port
• Plug in the power cable from PSU into the UPS
• Also plug in the power cable of the monitor
10 | P a g e
You are now done with setting up your PC. Power on and see your rig boot to glory.
Step 10: Installing the OS and drivers
We are done with the hardware part. Now get your favorite OS disks ready and the CD that came with your motherboard.
• Set the first boot device to CD/DVD drive in BIOS
• Pop in the OS disk
• Reboot the PC
• Install the OS
• Install drivers from motherboard CD (applicable only to Windows OS)
Voila! You have your PC up and running. Enjoy your journey with your self assembled rig!
Jargon Buster
• CPU – Central Processing Unit
• RAM – Random Memory Access
• DDR Double Data Rate
• SDRAM – Synchronous Dynamic Random Access Memory
• PSU Power Supply Unit
• AGP – Accelerated Graphics Port
• PCI E – Peripheral Component Interconnect Express
• SATA – Serial Advanced Technology Attachment
• PATA Parallel Advanced Technology Attachment
• IDE – Integrated Drive Electronics
• ATX – Advanced Technology Extended
• USB – Universal System Bus
• VGA – Video Graphics Array
• PS/2 – Personal System/2
11 | P a g e
• OS – Operating System
Different parts of computer
1. Mouse
2. Keyboard
3. Scanner
4. Digital Camera
5. Web Camera
6. Joysticks
7. Track Ball
8. Touch Pad/ Screen
9. Light Pen
10. Bar Code Reader
11. Microphone
12. Graphics Tablets Connecting various device and components
The computer system essentially comprises three important parts – input device, central processing unit (CPU) and the output device. The CPU itself is made of three components namely, the arithmetic logic unit (ALU), memory unit, and the control unit. In addition to these, auxiliary storage/secondary storage devices are used to store data and instructions on a long term basis.
12 | P a g e
Central Processing Unit
Arithmetic Logic Unit Input Unit Output Unit Control Unit Main Memory
Secondary Storage
Figure: Schematic Representation of a Computer Computers are made of the following basic components: 1. Case with hardware inside: a. Power Supply The power supply comes with the case, but this component is mentioned separately since there are various types of power supplies. The one you should get depends on the requirements of your system. This will be discussed in more detail later b. Motherboard This is where the core components of your computer reside which are listed below. Also the support cards for video, sound, networking and more are mounted into this board. i. Microprocessor This is the brain of your computer. It performs commands and instructions and controls the operation of the computer. 1. Memory The RAM in your system is mounted on the motherboard. This is memory that must be powered on to retain its contents. 2. Drive controllers The drive controllers control the interface of your system to your hard drives. The controllers let your hard drives work by controlling their operation. On most systems, they are included on the motherboard; however you may add additional controllers for faster or other types of drives.
13 | P a g e
2. Hard disk drive(s) This is where your files are permanently stored on your computer. Also, normally, your operating system is installed here. 3. CD-ROM drive(s) This is normally a read only drive where files are permanently stored. There are now read/write CD ROM drives that use special software to allow users to read from and write to these drives.
4. Floppy drive(s) A floppy is a small disk storage device that today typically has about 1.4 Megabytes of memory capacity.
5. Other possible file storage devices include DVD devices, Tape backup devices, and some others.
2. Monitor This device which operates like a TV set lets the user see how the computer is responding to their commands. 3. Keyboard This is where the user enters text commands into the computer. 4. Mouse A point and click interface for entering commands which works well in graphical environments. These various parts will be discussed in the following sections Hardware Vs Software
The electrical, electronic, mechanical and magnetic components that make up the computer system are together termed as ‘ hardware ’.These include components that are responsible for user input, display and mathematical processing. The CPU, disk drives, internal chips and wiring, modem, peripheral devices like the monitor, keyboard, mouse, printer, speakers etc. are together termed as computer hardware. Computer hardware cannot perform any manipulation or calculation without being instructed as to what to do and how to do it. Programs (or instructions) are required to tell the computer what to do. The generic term for computer programs is ‘ software ’. Software comes in two main types – system software and application programs.
System Vs Application software System software consists of programs that control the operations of the computer system itself. It consists of a group of programs that control the operations of a computer equipment including functions like managing memory, managing peripherals, loading, storing, and is an interface between the application programs and the computer. MS DOS (Microsoft’s Disk Operating System), UNIX are examples of system software. Software that can perform a specific task for the user, such as word processing, accounting, budgeting or payroll, fall under the category of application software. Such
14 | P a g e programs run on top of an operating system (like Windows, UNIX, Linux, Macintosh) and are used to carry out specific functions. Word processors, spreadsheets, database management systems are all examples of general purpose application programs.
BITS AND BYTES
All information in the computer is handled using electrical components like the integrated circuits, semiconductors, all of which can recognize only two states – presence or absence of an electrical signal. Two symbols used to represent these two states are 0 and 1, and are known as BITS (an abbreviation for BI nary Digi TS ). 0 represents the absence of a signal, 1 represents the presence of a signal. A BIT is, therefore, the smallest unit of data in a computer and can either store a 0 or 1. Since a single bit can store only one of the two values, there can possibly be only four unique combinations : 00 01 10 11 Bits are, therefore, combined together into larger units in order to hold greater range of values. BYTES are typically a sequence of eight bits put together to create a single computer alphabetical or numerical character. More often referred to in larger multiples, bytes may appear as Kilobytes (1,024 bytes), Megabytes (1,048,576 bytes), GigaBytes (1,073,741,824), TeraBytes (approx. 1,099,511,000,000 bytes), or PetaBytes (approx. 1,125,899,900,000,000 bytes). Bytes are used to quantify the amount of data digitally stored (on disks, tapes) or transmitted (over the internet), and are also used to measure the memory and document size.
BIOS or CMOS setup.
Issue
How to enter the BIOS or CMOS setup.
Solution
Note: This document doesn't help users who cannot enter BIOS or CMOS setup because of a password .
15 | P a g e
Because of the wide variety of computer and BIOS manufacturers over the evolution of computers, there are numerous ways to enter the BIOS or CMOS Setup. Below is a listing of the majority of these methods as well as other recommendations for entering the BIOS setup.
New computers
Thankfully, computers that have been manufactured in the last few years will allow you to enter the CMOS by pressing one of the below five keys during the boot . Usually it's one of the first three.
• F1 • F2 • DEL • ESC • F10
A user will know when to press this key when they see a message similar to the below example as the computer is booting. Some older computers may also display a flashing block to indicate when to press the F1 or F2 keys.
Press
If your computer is a new computer and you are unsure of what key to press when the computer is booting, try pressing and holding one or more keys the keyboard. This will cause a stuck key error, which may allow you to enter the BIOS setup.
Once you've successfully entered the CMOS setup you should see a screen similar to the below example.
16 | P a g e
Older computers
Unlike the computers of today, older computers (before 1995) had numerous different methods of entering the BIOS setup. Below is a listing of general key sequences that may have had to be pressed as the computer was booting.
• CTRL + ALT + ESC • CTRL + ALT + INS • CTRL + ALT + ENTER • CTRL + ALT + S • PAGE UP KEY • PAGE DOWN KEY
ACER BIOS
If your computer is unable to boot or you wish to restore the BIOS back to bootable settings and your computer uses an ACER BIOS, press and hold the F10 key as you turn on the computer. While continuing to hold the F10 key, you should hear two beeps indicating that the settings have been restored.
AMI BIOS
Older AMI BIOS could be restored back to bootable settings by pressing and holding the Insert key as the computer is booting.
17 | P a g e
BIOS / CMOS diskettes
Early 486, 386, and 286 computers may have required a floppy disk in order to enter the BIOS setup. These diskettes are known as ICU, BBU, and SCU disks. Because these diskettes are unique to your computer manufacturer, you must obtain the diskettes from them. See the computer manufacturers list for contact information.
Early IBM computers
Some models of early IBM computers required that the user press and hold both mouse buttons as the computer was booting in order to enter the BIOS setup.
Other suggestions
Finally, if none of the above suggestions help get you into your CMOS setup you can cause a stuck key error, which will usually cause the CMOS setup prompt to appear and remain until you press a key to continue. To do this press and hold any key on the keyboard and do not let go (you may get several beeps as you're doing this). Keep holding the key until the computer stops booting and you're prompted with an option to enter setup or to press another key to continue booting.
Entering the BIOS Setup Program
The BIOS setup programs can normally be entered only during the boot process , either a cold boot or a warm boot (after hitting {Ctrl Alt Del}). Some setup programs will let you go into setup program using a key combination at any time.
At least one thing is finally becoming somewhat standard: the use of the {Del} key to enter the setup program during boot. This is true of AMI and Award BIOSes, and some others as well. Older BIOSes can use any of a myriad of strange key combinations, including {Esc}, {F1}, {F2}, {F10}, {Ctrl Esc}, {Alt Esc}, {Ctrl Alt Esc}, {Ctrl Alt Enter},
Typical Key Controls
Most setup programs show on the screen itself the keys to use to select and change various options; some instead use a very limited help screen, normally accessed with the F1 key. The following keys are pretty much universal:
• {Enter} is normally used to select a menu or sub area. • The arrow keys are used to move between settings (in rare cases, they are used to change the selected setting).
18 | P a g e
• {Page Up} and {Page Down} or {+} and { } are the two most common pairs of keys for modifying the current setting. • {Tab} can also sometimes be used to move between sections or settings. • {Esc} is normally used to move up the menu hierarchy one level, and in some BIOSes it is used to quit out of the setup program as well.
The newer AMI BIOSes are graphical; you put a standard serial mouse on the first serial port and a faux Windows screen pops up with the settings in little "program groups". If you don't have a mouse or it isn't working, you can access this program using keys as well. (I tried it with a PS/2 style mouse once and it didn't work, strange that they wouldn't support this... could be that I did something wrong.)
Note: Some BIOSes have the ability to bypass some of the extended settings during boot, by holding down the {Ins} key during the boot process . This can be useful in the event that you make such incorrect settings that the BIOS cannot even boot (which can happen, though it takes talent. :^) ) Check your motherboard manual to see if your machine can do this
BIOS Settings
This section describes most of the BIOS settings that you will find in a typical Pentium class or higher PC. Some BIOS settings are quite universal, while others can be found on only the systems made with one type of BIOS or made by one manufacturer. This section lists the most common settings that are used in modern PCs, with full explanations as to what they are and how to set them. This includes the more common advanced settings, but does not attempt a "shotgun" coverage of every setting I've ever seen on a machine. Some are very atypical and usually not something you need to worry about. The less common a setting is, the more often it is the case that you really will want to leave it on its default setting anyway. Not always, but usually.
By the nature of how I designed this section, it should cover 95%+ of the settings in your BIOS that you will ever want to change. If you find a setting in your BIOS that isn't covered here, you may find it in the BIOS Survival Guide , which has a more complete list of the settings found on various types of PCs.
For each setting I describe the most common options and what they mean. In addition, I indicate which options are usually the default. I also describe what the implications are of using the different settings, and provide general recommendations on how to configure most of the parameters. The settings themselves are organized based on the names of the settings groups you will find in a typical BIOS setup program.
19 | P a g e
Tip: It is a good idea to "back up" (record on paper) all of your BIOS settings once your PC is running and stable, and especially before you make any changes to them.
Tip: Reference this procedure for specific instructions on configuring the most important BIOS settings to safe values, to maximize the chances of booting a new or problematic system.
Note: Every setup program is slightly different from every other one. Even if two BIOSes are both on Pentium motherboards and are made by Award, they may have different settings. The commands as shown here might be different on your PC, or they might be in a different place. Use care when modifying these parameters, and refer to your motherboard manual if it is accurate.
Warning: The highly prudent will have a backup of their hard disk before fiddling with their BIOS settings.
Warning: Changing advanced parameters can lead to system instability and data loss. It is recommended that only users who really understand what they are doing change these settings. Proceed at your own risk.
Warning: If your BIOS contains a "hard disk utility" that includes items like setting interleave ratios, low level formatting , or "media analysis", do not use it on an IDE/ATA or SCSI drive (which includes virtually every PC hard drive made in at least the last 5 years). These old utilities are designed for the MFM and RLL drives from the 1980s and can in theory damage a modern drive, for which they are unnecessary. I wish they'd just take them out of the setup program entirely (and on many newer PCs they have)
BIOS Settings - Standard Settings
This settings group contains basic parameters that you will normally need to set (or adjust) for your system to work properly. Most of these are present on virtually every PC.
Date
The system date. Make sure that you enter it in the correct format; normally this is mm/dd/yy in North America, but may vary elsewhere.
Newer versions of Windows will let you change the date within the built in "Date/Time Properties" feature, and the BIOS date will be updated automatically by the system.
20 | P a g e
Time
The system time. Most systems require this to be entered using a 24 hour clock (1:00 pm = 13:00, etc.)
Newer versions of Windows will let you change the time within the built in "Date/Time Properties" feature, and the BIOS time will be updated automatically by the system.
Daylight Savings
If your BIOS has this setting, enabling it will forward the time by one hour on the first Sunday in April, and drop it back by one hour on the last Sunday in October. The default value is usually "Enabled".
This setting is not present on most PCs; however, some operating systems, such as Windows 95, will do this for you automatically if you enable the daylight savings time option in their control settings.
Note: The date when daylight savings time "kicks in" can change in some cases; for example, a few years ago the spring date changed from the last Sunday in April to the first. If this happens again your BIOS will change the time on the wrong date so you will want to disable this unless a flash BIOS upgrade is made available to you that compensates.
DE Primary Master
This is where the hard disk parameters are entered for the primary master IDE/ATA device, the first drive in a modern IDE system. See the hard disk section for details on what these terms mean and how these devices are set up. The various settings for the drive are discussed in detail in the IDE Setup / Autodetection section . The default setting for this on a system with IDE autodetection, is usually "Auto".
Note: Some older systems only have places for two drives' parameters to be entered; often in this case they just call them "Drive C" and "Drive D"
IDE Primary Slave
This is where the hard disk parameters are entered for the primary slave IDE device, the second drive in a modern IDE system. See the hard disk section for details on what these terms mean and how these devices are set up. The various settings for the drive are discussed in detail in the IDE Setup / Autodetection section . The default setting for this on a system with IDE autodetection, is usually "Auto".
21 | P a g e
DE Secondary Master
This is where the hard disk parameters are entered for the secondary master IDE device, normally the third drive in a modern IDE system (though it can be the second as well, if the primary slave device is not used). See the hard disk section for details on what these terms mean and how these devices are set up. The various settings for the drive are discussed in detail in the IDE Setup / Autodetection section . The default setting for this on a system with IDE autodetection, is usually "Auto".
IDE Secondary Slave
This is where the hard disk parameters are entered for the secondary slave IDE device, the fourth drive in a modern IDE system. See the hard disk section for details on what these terms mean and how these devices are set up. The various settings for the drive are discussed in detail in the IDE Setup / Autodetection section . The default setting for this on a system with IDE autodetection, is usually "Auto".
Floppy Drive A
The type of the first floppy drive . The choices normally are:
• 1.44 MB: A normal 3.5" drive. • 1.2 MB: A normal 5.25" drive. • 2.88 MB: A high density 3.5" drive, found on some newer systems. • 720 KB: A low density 3.5" drive. • 360 KB: A low density 5.25" drive. • None: No floppy drive present in the "floppy A" position. May read "not installed" or similar.
This setting usually defaults to a 1.44 MB 3.5" drive, the most common type currently in use.
Floppy Drive B
The type of the second floppy drive. See common choices under "Floppy Drive A" above.
The type of the second floppy drive . The choices normally are:
• 1.44 MB: A normal 3.5" drive. • 1.2 MB: A normal 5.25" drive. • 2.88 MB: A high density 3.5" drive, found on some newer systems.
22 | P a g e
• 720 KB: A low density 3.5" drive. • 360 KB: A low density 5.25" drive. • None: No floppy drive present in the "floppy A" position. May read "not installed" or similar.
This setting usually defaults to "none" or "not installed" since most PCs don't have a second floppy drive.
Video Display Type
This is the standard type of the display you are using; almost always this should be set to either "VGA" or "VGA/EGA" for a modern PC, if you are using any sort of VGA or SVGA card (which is basically every PC made in the nineties.) This is also usually the default value.
Halt On
Some PCs give you the ability to tell the BIOS specifically which types of errors will halt the computer during the power on self test section of the boot process . Using this, you can tell the PC to ignore certain types of errors; common settings for this parameter are:
• All Errors: The boot process will halt on all errors. You will be prompted for action in the event of recoverable errors. This is the normally the default setting, and is also the recommended one. • No Errors: The POST will not stop of any type of error. Not recommended except for very special cases. • All But Keyboard: The boot process will stop for any error except a keyboard error . This can be useful for setting up a machine without a keyboard, for example for a file or print server. • All But Diskette/Floppy: All errors will halt the system except diskette errors. In my opinion, if your floppy drive has recurring and known problems, it is most likely best just to replace (or disconnect) the drive rather than using this.
Warning: Telling the system not to halt for any error types is generally not wise. You may end up missing a problem with your system that you will want to know about
BIOS Settings - Advanced Features
This section usually contains more advanced features for controlling the behavior of your system. There are some settings here that you will want to adjust to ensure
23 | P a g e maximum performance from your system. There may also be some features you will need to enable or disable if your system is exhibiting problem behavior .
Virus Protection / Virus Warning
This setting has one of the most misleading names of all of the parameters in the BIOS. The system BIOS really has no way at all to tell which programs are viruses, and which are "wanted" programs. If enabled, what this setting does is to trap any and all writes to the hard disk's master boot record , and display a message to the screen each time asking if you are willing to allow the write. Since one common type of virus is the boot sector infector , this can indeed prevent the spread of these viruses.
However, this setting will also cause the BIOS to display its warning message for any legitimate access to the boot sector . So if you use any utilities that modify partitions, or even if you reformat your hard disk, this message will pop up rather unexpectedly. You can of course just "authorize" the BIOS, telling it to proceed with the write, but this can grow rather annoying if it happens often. It can also be quite confusing to someone who doesn't understand what this strange BIOS message means.
Some people prefer the safety of having this enabled, others find it annoying and turn it off. In fact, most people don't regularly run utilities that modify the boot sector. If you turn this setting off, you can probably find a similar feature, more elegantly implemented, in a memory resident anti virus program .
Internal Cache
This setting enables or disables the internal cache on your processor. This is also known as the L1 or level 1 cache . For 486 or later processors this should be enabled; turning off the level one cache will lead to a major performance hit . Earlier processors don't have internal cache, and enabling this setting can possibly lead to problems. You should disable this setting only for testing purposes if you are trying to find a problem, or if you suspect a bad processor chip .
On some BIOSes you may see three choices: "Disabled", "Write Through" and "Write Back". These refer to the cache's write policy . The write back cache policy will produce the best performance .
External Cache
This setting enables or disables the external cache on your processor, also known as the L2 or level 2 cache. Most 486 or later motherboards include this cache memory. Like the internal cache setting, this should be enabled at all times unless you are
24 | P a g e disabling it for troubleshooting purposes. Disabling the external cache will cause your system to slow down dramatically, but you can use it if you are having system crashes and suspect a problem with the cache chips.
On some BIOSes you may see three choices: "Disabled", "Write Through" and "Write Back". These refer to the cache's write policy . The write back cache policy will produce the best performance .
Note: There are some motherboards out on the market, particular PCI-based 486 motherboards, that have fake level 2 cache on the board. One way to test for this is to disable the external cache and see if there is a performance decrease in the system. If there isn't, you never had any level 2 cache to begin with. In addition, some systems will report (in the System Configuration Summary ) the presence of enabled level 2 cache even when it is disabled. This is a BIOS that has been "doctored" and is a sign of fake cache on the motherboard as well. Amazing the trouble people will go to to cheat someone out of a few bucks, isn't it?
Quick Power On Self Test / Quick Boot
Enabling this setting will cause the BIOS power on self test routine to skip some of its tests during bootup . One of the key things this setting usually does when enabled is cause the POST to skip checking all of extended memory for errors.
Most people enable this setting to speed up the boot process , but you should realize that you do increase the chance of the POST missing an error if you use this. Fortunately (or unfortunately) the POST memory test is virtually useless to detect transient memory errors (as opposed to hard errors that you would discover the first time you powered up the machine with the new memory in it), so once your system is running and stable, you can in most cases enable this setting safely. It's still safest to leave it disabled, which is what I recommend unless you have truly monstrous amounts of RAM. After all, how often do you boot the system during normal use?
Memory Test Tick Sound
When enabled, the POST memory test will make a tick sound as it counts up your system memory. Most people leave this enabled, others turn it off because they find the sound annoying. Many newer systems skip this option and turn the sound off entirely.
When building a system, it is recommended that you enable this, as the sound will act as a confirmation that your speaker is working, and that the POST is progressing
25 | P a g e normally. This is important during the first few boots of a system, and also if you are having video problems.
Boot Sequence
This setting controls the order that the BIOS uses to look for a boot device from which to load the operating system during the DOS boot process . Older machines do not have this setting; they look at the floppy drive first (A:) and then the hard drive (C:). Most systems will at least let you choose between "A:, C:" (the default) and "C:, A:". Newer systems will allow you to boot from the CD ROM as well; in this case there will be six different combinations listed. The default will normally be "A:, C:, CD ROM".
Note: Booting off the second floppy disk , B:, has not been an option on any PC I've ever seen.
Some BIOSes are getting even more advanced in terms of the boot sequence options they will allow. Some systems will now allow you to boot off a different IDE hard disk than the primary master (C:), or let you boot from a SCSI device instead of IDE even when both are used in the same system (normally the IDE device gets preference ).
Changing the boot sequence to seek from the hard disk drive first instead of the floppy disk drive has some advantages, and also some disadvantages. There are two main advantages. First, if the floppy disk isn't bootable , you virtually eliminate the chance of a boot sector virus spreading to your hard disk from a floppy. Second, you have a measure of security and reliability since when the floppy disk is bootable, anyone can write their own system files and boot the PC with their floppy, bypassing the standard startup files on the hard disk.
The disadvantages of not having the floppy bootable all relate to convenience. First, if you ever do have a virus on your PC then you will normally need to boot from a clean floppy disk to disinfect your hard disk; you will have to go back into the BIOS and change the boot sequence, disinfect, and then change it back. Second, there are some software programs that require their own boot disks (though they are becoming quite rare). Third, if your hard disk ever fails, you won't have any way to boot the PC. Some viruses manifest themselves by making the hard disk disappear. Finally, if you are installing a new operating system, or building a PC, you really need to be able to boot from the floppy disk.
26 | P a g e
S.M.A.R.T. for Hard Disks
Some BIOSes have a specific BIOS setting to enable monitoring of hard disks that support the SMART (Self Monitoring And Reporting Technology) feature , which can allow the hard disk to report, under some circumstances, impending failures of the hard disk. . The normal default for this setting is "Disabled".
Power On Delay / Boot Delay
If you have the combination of a PC that boots up quickly, and a hard disk that takes a relatively long time to spin up, your BIOS may start trying to boot the operating system before the hard disk is read. A giveaway to this problem is the computer that won't boot when first powered on but will boot seconds later if the reset button is pressed.
If your BIOS has this option, you can specify a time in seconds to delay the boot process . This is normally disabled, and should be unless you are experiencing this problem.
Boot Up Numlock Status
This setting, when enabled, automatically turns on your NumLock key when the system is booted. Most systems default this to enabled. This item is a matter of personal taste.
Tip: There is also a DOS command (NUMLOCK) that can be put in the CONFIG .SYS file to enable the NumLock key. This will override the BIOS setting at startup if used .
Swap Floppy Drives
A useful feature for those machines that use two floppy drives, when enabled this swaps the A: and B: drives. This enables you to change the bootable floppy without having to open the case and switch the cable. See here for details on multiple floppy drives and the floppy cable .
Warning: Windows NT 4.0 does not properly support the floppy drive swap BIOS option; do not enable it if using NT. I have read reports of people getting stuck in the middle of NT installs because NT changed the floppy disk letters in the middle of the installation.
Floppy Drive Seek
Causes the BIOS to search for floppy disk drives at boot time. When enabled, the BIOS will activate the floppy disk drives during the boot process: the drive activity light will
27 | P a g e come on and the head will move back and forth once. First A: will be done and then B: if it exists. When disabled, this seek will not be done. Older PCs always did this seek; on newer machines it can be disabled to speed up the boot process.
Note: This setting will not affect the boot sequence , and vice-versa; if the boot sequence starts with A: the system will still try to boot from the floppy disk even if this is disabled, and if the boot sequence starts with C: the system will still look to C: even if floppy disk seek is enabled.
Boot Up System Speed
There aren't as many PCs that have this setting any more. Usually the options are "High" and "Low", where "High" is the normal system speed, and is the default setting. "Low" is for debugging only. Overall, this is a software equivalent of the good old "Turbo Switch" and on a modern system should be used the same way: that is, not at all.
Keyboard Installed
Some BIOSes let you specify explicitly if there is a keyboard in the system. The default is of course "Installed" (or "Yes", etc.) If you are using a PC without a keyboard (for example, for a file server or secured network PC) this will instruct the BIOS to skip the keyboard test during the POST. Also see the "Halt On" setting for a different way to accomplish this task.
Typematic Delay
This setting controls the automatic repeat capability of your keyboard. Usually specified in milliseconds, this controls how long a key must be held down before it begins automatically repeating. Typical settings are usually somewhere between 200 and 1000 milliseconds. Use what feels comfortable. See also "Typematic Rate".
Note: Some higher-end keyboards have the equivalent function built-in.
Warning: Setting this too low can cause the keyboard to repeat keys during normal typing, which can appear to be "keyboard bounce" and imply a hardware problem with the keyboard to the casual user.
Typematic Rate
This setting controls the repeat rate for the keyboard when the typematic feature is activated. It is usually expressed in characters per second. Use what feels comfortable,
28 | P a g e but don't go too high or you may feed the characters faster than the system can deal with them, which can cause beeping or even system lockups.
Tip: Some higher-end keyboards have the ability to set this parameter built-in; sometimes it is called "Key Repeat" or "Repeat Rate".
Fast A20 / A20 Gate Option
In order to fully understand this setting you need to understand what the A20 line (21st address line) is and what its significance is . In a nutshell, the A20 line is used to control access to the high memory area, the first 64 KB or so of extended memory. This line is normally controlled by the keyboard controller . To improve performance , newer systems have this control function built into the chipset as well.
To have the chipset control the A20 line and improve performance, enable this option. This setting is normally enabled by default. There is rarely any reason to disable this.
Video BIOS Shadow
This parameter, when enabled, turns on BIOS ROM shadowing for the block of memory normally used for standard VGA video ROM code, which is C0000 to C7FFF (32K). See here for a full description of what ROM shadowing does ; in short, it speeds up your system by copying the contents of your video BIOS code from the slow ROM in which it resides into faster RAM.
The default for this setting depends on the particular system a great deal.. Enabling it will increase performance . Disable it if it causes system problems, particularly those related to the video subsystem.
Note: On some systems the video BIOS shadow setting is named for the address range the video BIOS occupies, C0000-C7FFFh, instead of being specifically called "Video BIOS Shadow".
System BIOS Shadow
When enabled, this parameter turns on BIOS ROM shadowing for the block of memory that contains your system BIOS. This is normally F0000 to FFFFF (64K). See here for a full description of what ROM shadowing does ; in short, it speeds up your system by copying the contents of your system BIOS code from the slow ROM in which it resides into faster RAM.
29 | P a g e
This setting normally defaults to "Enabled". Since the system BIOS code is used so extensively, shadowing it can cause a great deal of system performance improvement.
C8000-CBFFF Shadow, CC000-CFFFF Shadow, etc.
Most BIOSes have several settings for shadowing each of the 16K blocks of RAM from C8000h through DFFFFh. These settings show up as something like "C8000 CBFFF Shadow", "CC000 CFFFF Shadow", etc., up to "DC000 DFFFF Shadow". Some systems have settings for ROM shadowing in 32K blocks instead of 16K, so you will see "C8000 CFFFF" instead of "C8000 CBFFF" and "CC000 CFFFF". (Some systems leave off the last digit in their notation, calling the blocks "C800 CBFF", etc. It's the same thing.)
When enabled, the setting selected turns on adapter ROM shadowing for that 16K block of memory. See here for a full description of what ROM shadowing does ; in short, it speeds up your system by copying the contents of any BIOS code found in adapters using this memory space, from the slow ROM in which it resides into faster RAM.
The areas of memory from C8000 to DFFFFh are normally used by expansion cards such as network adapters. Turning on shadowing would speed these adapters up in the same way that shadowing the system BIOS speeds up the system BIOS code. However, things are much more tricky here, because some adapters use RAM as well as ROM, and map this RAM into this address space as well. If they do, and you enable shadowing, the adapter will malfunction because shadowing write protects the RAM it uses (since it thinks it is emulating a ROM only, which cannot be rewritten). This can cause spurious results when using these cards, and can be very difficult to diagnose. In addition, normally unused areas of memory in this region are used as UMBs for loading drivers via the EMM386 driver, and enabling shadowing will cause this to malfunction.
For this reason, the default for shadowing these adapter ROM areas is normally "Disabled" and I recommend that it be left that way in most cases. If you know all the details on the card whose ROM you are trying to shadow, enabling this can in theory increase performance , but it is not going to be anything very substantial in most cases. Incidentally, on most IDE/ATA systems, the block from C8000 to CBFFFh is reserved by the IDE hard disk BIOS
BIOS Settings - Advanced Chipset Features
This section of the BIOS setup program provides settings to "tweak" the chipset control parameters. Most of these settings are associated with fine tuning control over the system cache, memory, and I/O buses, to optimize performance.
30 | P a g e
Warning: This section contains many settings that have the potential to screw up your system. :^) If after reading these descriptions you are not sure what a setting does, it is usually best to leave it at its default setting . For most people, using some form of the automatic configuration setting is highly recommended.
Chipset Special Features / Global Features
Some chipsets have this "generic" setting that, when enabled, turns on some of the special performance enhancing features of the chipset. This should normally be enabled unless you experience lockups or other system problems.
I have thus far only encountered this setting on motherboards that use Intel's 430HX "Triton II" chipset .
Cache Timing
This setting determines the speed that the chipset will use for reading data from the external (level 2) cache . This normally appears as something like x y y y. In this case the parameter refers to the number of clock cycles to do a 32 byte burst read from the external cache line. Each entry in the cache of a modern PC is 256 bits wide; data is read from the cache using four consecutive 64 bit reads. The first read is normally slower than the others; this is the "x" above, and the next three reads are the "y"s. An example would be "3 1 1 1", which means it takes a total of six clock cycles to read from the cache. More information on cache timing can be found here .
In general, the lower these numbers, the faster your system will be. How low you can drop them depends on your system, how fast your memory is, what clock speed your memory bus runs at, etc. If your BIOS supports an "Auto" setting for this parameter, using it is normally wisest, although it may not produce the highest performance results . You can try more aggressive settings (lower numbers) but be prepared to back off if you experience system problems, and don't go below the rating for your cache type.
Level 2 Cacheable DRAM Size / Cache Over 64 MB of DRAM
This setting controls how much of the system memory is "covered" by the level 2 cache. Using uncached memory on your system can cause it to slow down dramatically . You should always ensure that this value is set at least as high as the total amount of RAM in your system. However, for best performance, do not set it any higher than it needs to be.
Many motherboards using the 430FX, 430VX and 430TX chipsets will not have this option; it is most common on 430HX motherboards to select between 64 MB and 512
31 | P a g e
MB cacheability. You should in this case set it to 64 MB unless you are using more than 64 MB.
Note: This setting will not be present on Pentium Pro motherboards, since the Pentium Pro uses an integrated level 2 cache.
Level 2 Cache Size
Some systems have a specific setting you must change to indicate how much level 2 cache you have on your board. Most newer boards do not have this setting and instead the hardware automatically detects how much level 2 cache you have. If you have this setting in your setup program, make sure it is correct.
Note: This setting will not be present on Pentium Pro or Pentium II motherboards , since these chips use integrated level 2 cache, not cache on the motherboard.
System BIOS Cacheable
On most systems, you can shadow your system BIOS ROM . Shadowing increases performance by copying the BIOS code from ROM to much faster system RAM . Enabling this setting will allow the system to cache this RAM as well, further increasing performance.
Normally you will want to enable this unless you are having a problem with your system and turning it off fixes it. If you have system BIOS shadowing disabled, this setting will be ignored.
Video BIOS Cacheable
On most systems, you can shadow your system BIOS ROM . Shadowing increases performance by copying the video BIOS code from video adapter's ROM to much faster system RAM. Enabling this setting will allow the system to cache this RAM as well, further increasing performance.
Normally you will want to enable this unless you are having a problem with your system and turning it off fixes it. If you have video BIOS shadowing disabled, this setting will be ignored.
DRAM Parity Checking
When enabled, turns on parity checking for the system RAM . This should be enabled if you are using parity checking (or ECC), and disabled otherwise. The default is normally
32 | P a g e
"Disabled" since (unfortunately) most modern systems don't use parity memory. I recommend the use of parity memory; see here for details on what parity memory is , and see here for a discussion of the merits of parity memory versus non parity memory .
Warning: If you turn on parity checking on a system that does not have parity memory in it, the system will halt with a parity error as soon as it tries to boot up. If you turn off parity checking on a system that does have parity memory, the system will run just fine, but you will have no parity checking protection active.
DRAM Parity / ECC Mode
On a system that supports both parity and ECC error detection / correction modes most newer systems support either both or neither selects which mode is activated. ECC stands for "error correcting code" or "error correction code" and is a more advanced error detection and correction protocol than straight parity.
The default for this setting is normally "Parity"; it is ignored or disabled if "DRAM Parity Checking" is disabled.
Single Bit Error Report
If you are enabling ECC on your system, the hardware is capable of detecting and correcting single bit errors on the fly. It is very useful to be able to know when this has happened, because if it happens often then this is a signal that you have a hardware or software problem in your PC. Enabling this option will cause the system to tell you when it corrects a single bit error when ECC is running. The default is usually "Disabled". I recommend enabling this if you are running with ECC enabled.
DRAM Speed / DRAM Timing / DRAM Auto Configuration
There are a number of settings that control the timing of your system memory . For a full discussion on system memory timing, look here . Most setup programs now come with some sort of "automatic" setting that will determine what these parameters are for you. This is a "parent" setting of sorts that can be used to control the other individual timing settings on the screen. These parent settings normally come in one of two flavors:
• Dynamic Automatic Timing Setting: Some BIOSes have a fully automatic setting. When you put the DRAM Timing setting on "Auto", the chipset will detect what type of memory and cache you have at boot time and dynamically set all the timings for you automatically based on what it finds. This is the simplest way to ensure basically good performance from your system using any type of memory that it supports.
33 | P a g e
• Fixed Timing Based on Memory Speed: Other BIOSes, instead of having an "Auto" setting, let you choose from a selection of common memory speeds (or types) and then modify the individual timing settings based on your selection. Here, you may find settings like "70 ns", "60 ns", "EDO" and "Manual". "Manual" turns off the automated settings so you can tweak them yourself.
When you use the "Auto" setting (either fully automatic or by selecting a memory speed) the BIOS will normally "lock" the individual settings that are controlled by this one, to reflect the fact that they are being set automatically by the BIOS. To unlock the individual settings so you can change them, you normally must turn off the "Auto" setting, or select "Manual". The default in most BIOSes is to enable automatic timing settings.
Warning: In a system that dynamically sets timing based on the detected speed of your memory, you must take care when using memory of different speeds . You should generally put the slower memory in the first bank, often called Bank 0. Otherwise, the system may set the timing too fast for the slower chips.
DRAM R/W Leadoff Timing
This parameter controls how many clock cycles are required for the first access to memory during a four read "burst". In modern PCs, reads from the system memory are done in sets of four, because the level 2 cache used in the PC (which is filled by information from the main memory ) is 256 bits wide (four sets of 64 bits). The timing, in clock cycles, to perform this quadruple read is normally stated as "x y y y". The first read is slower because the address for the read must be supplied to the memory; the next three are faster because they are read consecutively from the first location (no need to supply an address).
Using the x y y y notation, the Leadoff Timing setting refers to the "x" value, the number of clock cycles for the first read. On most BIOSes, this parameter is absolute, and refers to the actual number of clock cycles used for the first access. On others, this setting is the number of additional cycles required for the first access. For example, let's suppose the optimal burst timing for your system is 5 2 2 2. This means the first read takes 5 clock cycles, and the next three take 2 each. In most BIOSes, Leadoff Timing would here be set to 5. In some BIOSes, you would have a parameter called "Leadoff Wait States" or "Additional Leadoff Cycles", and you would put here 3 (the number of additional cycles required for the first read.)
The lower this setting, the faster your system will work. How low you can set this depends on your memory bus speed and the speed and type of memory you are using.
34 | P a g e
In general, the faster your memory bus runs the more cycles it will take to access the memory unless the memory is also made faster. Putting this setting too low will cause memory errors; some of these can appear intermittently and be very difficult to diagnose. Using automatic timing to set this parameter is usually recommended.
By default most BIOSes enable automatic timing settings so this parameter would be "locked out" and not changeable; if you enable manual timing settings this setting will usually default to the slowest possible setting at first, for compatibility reasons.
Note: This setting controls the timing for both reads and writes. Some systems could have two different settings instead, one for read leadoff timing and the other for write leadoff timing.
Note: This setting is normally controlled by the DRAM Timing or Auto Configuration mode, and if automatic settings are enabled you may not be able to change this
DRAM Read Timing / DRAM Burst Read Timing / DRAM Read Wait States
This parameter controls how many clock cycles are required for the burst reads from memory during a four read "burst". In most modern PCs, reads from the system memory are done in sets of four, because the level 2 cache used in the PC (which is filled by information from the main memory ) is 256 bits wide (four sets of 64 bits). The timing, in clock cycles, to perform this quadruple read is normally stated as "x y y y". The first read is slower because the address for the read must be supplied to the memory; the next three are faster because they are read consecutively from the addresses immediately following the first location (no need to supply an address)..
Using the x y y y notation, the Read Timing or Burst Read Timing setting refers to the "y y y" value, the number of clock cycles for the 2nd, 3rd and 4th reads of the four read cycle. This setting will most often have options like "x 2 2 2", "x 3 3 3" and "x 4 4 4", although in some BIOSes the single number is used instead ("2", "3", "4".) Some BIOSes, especially on older machines, instead refer to read "wait states", which is essentially the same thing, except that it is one less than the number referred to above. A wait state is an extra cycle inserted for the processor to wait for the system memory. In the x y y y notation, the "y" is the total number of cycles for each memory access. "x 1 1 1" is the best you can do, since it always takes at least one cycle. Zero wait states is the best you can do. So "x 3 3 3" is equivalent to 2 wait states.
Some chipsets will have a double value for this setting, with one used for EDO DRAM and another used for FPM DRAM. The system automatically detects which is being used; this is a sort of "semi automatic" setting. In this case you may see options that
35 | P a g e look something like "x 2 2 2 / x 3 3 3" or "x 3 3 3 / x 4 4 4 4". The first timing number is used when EDO is detected and the second when FPM is detected.
Your system will operate fastest when this setting is as low as possible. How low you can set this depends on your memory bus speed and the speed and type of memory you are using. In general, the faster your memory bus runs the more cycles it will take to access the memory unless the memory is also made faster. Putting this setting too low will cause memory errors; some of these can appear intermittently and be very difficult to diagnose. Using automatic timing to set this parameter is usually recommended.
By default most BIOSes enable automatic timing settings so this parameter would be "locked out" and not changeable; if you enable manual timing settings this setting will usually default to the slowest possible setting at first, for compatibility reasons.
Note: This setting is normally controlled by the DRAM Timing or Auto Configuration mode, and if automatic settings are enabled you may not be able to change this.
Note: On some BIOSes this setting is combined with DRAM Write Timing / DRAM Write Burst Timing. In this case the same timing is used for both reads and writes
DRAM Write Timing / DRAM Burst Write Timing / DRAM Write Wait States
This parameter controls how many clock cycles are required for the burst writes to memory during a four read "burst". In most modern PCs, writes to the system memory are done in sets of four, because the level 2 cache used in the PC (which is filled by information from the main memory ) is 256 bits wide (four sets of 64 bits). The timing, in clock cycles, to perform this quadruple write is normally stated as "x y y y". The first write is slower because the address for the write must be supplied to the memory; the next three are faster because they are written consecutively to the addresses immediately following the first location (no need to supply an address). Memory system timing is discussed in much more detail here .
Using the x y y y notation, the Write Timing or Burst Write Timing setting refers to the "y y y" value, the number of clock cycles for the 2nd, 3rd and 4th writes of the four write cycle. This setting will most often have options like "x 2 2 2", "x 3 3 3" and "x 4 4 4", although in some BIOSes the single number is used instead ("2", "3", "4".) Some BIOSes, especially on older machines, instead refer to write "wait states", which is essentially the same thing, except that it is one less than the number referred to above. A wait state is an extra cycle inserted for the processor to wait for the system memory. In the x y y y notation, the "y" is the total number of cycles. "x 1 1 1" is the best you can
36 | P a g e do, since it always takes at least one cycle. Zero wait states is the best you can do. So "x 3 3 3" is equivalent to 2 wait states.
Note: Systems that have a double value for read burst timing (one for EDO memory and one for FPM ) will still have just a single value for write burst timing. This is because EDO is only faster than FPM memory when reading.
Your system will operate fastest when this setting is as low as possible. How low you can set this depends on your memory bus speed and the speed and type of memory you are using. In general, the faster your memory bus runs the more cycles it will take to access the memory unless the memory is also made faster. Putting this setting too low will cause memory errors; some of these can appear intermittently and be very difficult to diagnose. Using automatic timing to set this parameter is usually recommended. By default most BIOSes enable automatic timing settings so this parameter would be "locked out" and not changeable; if you enable manual timing settings this setting will usually default to the slowest possible setting at first, for compatibility reasons.
Note: This setting is normally controlled by the DRAM Timing or Auto Configuration mode, and if automatic settings are enabled you may not be able to change this.
Note: On some BIOSes this setting is combined with DRAM Read Timing / DRAM Read Burst Timing. In this case the same timing is used for both reads and writes.
DRAM Speculative Leadoff
This is a performance enhancement available with some chipsets to speed up the (relatively slow) first access to system memory. In short, the memory controller "cheats" by starting the initial read request before the address for the read has been completely resolved. This can result in a performance increase. For best efficiency you will normally enable this. If doing so causes instability then you should disable it.
Note: This setting is normally controlled by the DRAM Timing or Auto Configuration mode, and if automatic settings are enabled you may not be able to change this .
Turn-Around Insertion
When enabled, inserts an extra clock cycle (wait state) between consecutive DRAM read cycles (i.e., consecutive 4 read bursts). Normally the system can perform back to back burst reads without this extra delay, and the default for this setting is "Disabled".
Note: This setting is normally controlled by the DRAM Timing or Auto Configuration mode, and if automatic settings are enabled you may not be able to change this.
37 | P a g e
Memory Hole
Some (unusual) expansion cards require access to particular memory addresses in order to function properly. This parameter lets you set aside the appropriate area of memory for these cards. The typical memory areas that can be set aside are "512 640KB" (the upper 128K of conventional memory) and "15 16MB".
This setting should be disabled unless you have a card that you know requires this setting. The default is normally "Disabled".
ISA (or AT Bus) Clock Speed / Divisor
This setting controls the speed of the ISA bus , in one of two ways. The less common way is for the setting to allow a direct setting of the ISA clock speed; this would include options of "6 MHz", "8 MHz", etc. The most common way is for the ISA clock speed to be set as a fraction of the PCI clock speed. The settings in this case will usually look something like "PCICLK/3", "PCICLK/4", "PCICLK/6", etc.
The setting to choose is the one that puts the ISA clock speed as close as possible to 8.33 MHz, which is the accepted standard maximum clock speed for the bus. Anything higher than this is considered overclocking. 8.33 MHz means that the correct option for a 33 MHz or 30 MHz PCI machine would be "PCICLK/4", while for a 25 MHz PCI machine it would be "PCICLK/3".
On some BIOSes there is an "Auto" setting as well that will pick the right fraction depending on the PCI bus speed it detects, but this is somewhat less common in my experience than other automatic settings elsewhere in the BIOS.
8-Bit I/O Recovery Time
This setting allows you to insert additional clock cycles after an 8 bit ISA I/O request. These are sometimes needed to slow down the processor after completing activity on the ISA bus, which runs much slower than the PCI bus. The default setting for this is usually 1 cycle. This can normally be increased to 5 or higher, or reduced to 0 (disabled). Normally you will want to keep this at its default setting.
16-Bit I/O Recovery Time
This setting allows you to insert additional clock cycles after a 16 bit ISA I/O request. These are sometimes needed to slow down the processor after completing activity on the ISA bus, which runs much slower than the PCI bus. The default setting for this is
38 | P a g e usually 1 cycle. This can normally be increased to 5 or higher, or reduced to 0 (disabled). Normally you will want to keep this at its default setting.
Peer Concurrency
This setting, when enabled, allows multiple PCI devices to be active at the same time. The default for this setting is "Enabled" and you will normally want to leave it on the default.
BIOS Settings - PCI / PnP Configuration
The settings in this section deal specifically with the PCI bus and Plug and Play (PnP) settings. PCs that do not have a PCI bus will of course not have this section at all; older buses such as the VLB did not have the features that this section of settings controls. The PCI bus for the most part takes care of itself, but the settings in this section can be used when particular behavior by the bus or expansion cards needs to be addressed.
Warning: This section contains many advanced settings that in the vast majority of cases you do not need to change. For most users, using some form of the provided automatic configuration setting is highly recommended.
Plug and Play Aware OS
This setting is shown on only some BIOSes. If present, enabling this tells the BIOS that you are using an operating system that supports the Plug and Play specification (such as Windows 95). When enabled, the BIOS will look for and initialize any Plug and Play cards in the system. Enable the setting if using Windows 95 or another Plug and Play compatible OS. The default is normally "Disabled".
Note: Some BIOSes will perform the initialization of Plug and Play cards automatically regardless of the operating system being used, and will thus not have this setting. Some will work fine with Plug and Play regardless of how this option is set. However, on some systems that have this setting, Plug and Play may not function properly if the setting is disabled.
PCI IDE Bus Master
Some BIOSes have an explicit setting to enable bus mastering of PCI IDE hard disk drives. If this setting is present in your BIOS and you are using PCI IDE bus mastering you should set this to "Enabled". Otherwise it should be left on the default, which is "Disabled".
39 | P a g e
Automatic Resource Allocation
There are several settings in the PCI / PnP Configuration section of the BIOS program that deal with assigning interrupt resources. This includes both regular IRQs and the internal PCI interrupt resources. For most applications there is no need to manually select or deal with these resources; in this case the default setting of "Auto" should be selected, to enable automatic resource allocation. Not all BIOSes have this setting.
When you use the "Auto" setting the BIOS will normally "lock" the "PCI IRQ and DMA Settings" (below) to reflect the fact that they are being set automatically by the BIOS. To unlock the individual settings so you can change them, you must turn off the "Auto" setting.
PCI IRQ and DMA Settings / IRQ
When automatic resource allocation is not used, the BIOS allows you to specifically designate which system interrupts (IRQs) and direct memory access channels (DMAs) you want it to be able to use for setting up Plug and Play devices. For each IRQ or DMA, except ones reserved by the system, you can designate either "PCI/PnP" or "ISA /Legacy". When a resource is assigned to "ISA/Legacy" it is declared "off limits" to the BIOS.
The IRQs that you can normally set here are IRQs 3, 4, 5, 7, 9, 10, 11, 12, 14 and 15. The DMA channels are 0, 1, 3, 5, 6 and 7. (The others are reserved by system devices.) The default on most systems for each of these settings is "PCI/PnP". If your system does not have automatic resource allocation (which is preferred) then it is usually best to leave these settings on "PCI/PnP" unless you are having a problem with Plug and Play. For example, if PnP keeps taking a resource for a PnP card that you need for an ISA card, you might want to set that resource to "ISA/Legacy " here to reserve it.
Note: If automatic resource allocation is enabled, these options will normally either be locked to prevent change, or even cleared from the screen altogether, since the BIOS will control them automatically.
1st / 2nd / 3rd / 4th Available PCI Interrupt
The PCI bus uses its own internal interrupts , usually numbered #1 to #4 or #A to #D. Some PCI cards need to be able to use one of the regular system IRQs (interrupt request lines) to communicate with the processor. This setting "maps" the PCI interrupts to regular system IRQs by telling the BIOS which regular interrupt line to use for PCI cards that need one. The usual choices for this are IRQ9, IRQ10, IRQ11 and IRQ12.
40 | P a g e
Note: If automatic resource allocation is enabled, these options will normally either be locked to prevent change, or even cleared from the screen altogether, since the BIOS will control them automatically.
PCI VGA Palette Snoop
The VGA "palette" is the set of colors that are in use by the video card when it is in 256 color mode. Since there are thousands of colors and only 256 can be used in that mode, a palette containing the current colors is used . Some special VGA cards, high end hardware MPEG decoders etc. need to be able to look at the video card's VGA palette to determine what colors are currently in use. Enabling this feature turns on this palette "snoop".
This option is only very rarely needed. It should be left at "Disabled" unless a video device specifically requires the setting enabled upon installation.
BIOS Settings - Power Management
This section contains the various settings that you can use to control your system's automatic power management settings. The pros and cons of using it are in this section on system care .
Note: In many ways, automatic power management is still "not ready for prime time", at least in my experience. Enabling power management can cause problems in your system because many software programs aren't prepared to properly deal with having the processor power down or the hard disks turn off, etc. You can certainly use power management, but be prepared to disable some of the settings if you have problems with them. I strongly recommend disabling all power management features when initially assembling a new system or performing upgrades or new software installations. If you do not, you will have a hard time figuring out what is causing any problems you might experience.
Global Power Management Setting
This is a setting that, if present, globally enables or disables power management. When set to "Disabled", the other settings in this section will typically be either locked out (so they cannot be changed) or else they will simply be ignored.
Video Power down Mode
If present, this setting controls the method used to put the monitor into low power mode. The typical options for this setting are:
41 | P a g e
• DPMS: Select this option if your monitor supports the DPMS standard for monitor power management . This is the preferred and usual default setting; most modern monitors do support DPMS. • V/H Sync+Blank: Selecting this option causes the video card to shut down the vertical and horizontal sync signals to the monitor, as well as sending blank data to the monitor. • Blank Screen: This option causes the monitor to be blanked only.
Video Power Down Timeout
This setting controls how long the system must be idle for the video to be powered down. It is specified in minutes, or set to "Disabled". How long you set this for depends on your personal taste and how you use your system. Note that a colorful "screen saver" really doesn't save any power at all over regular use of the monitor the monitor is still on and displaying information either way.
Hard Disk Power Down Timeout
This setting controls how long a hard disk must be left idle before it spins down. The default is "Disabled". In a system with more than one hard disk, an idle timer is normally maintained individually for each. The choice of setting here depends a lot on how you use your system, as well as your personal opinion on the question of whether or not hard disks are better off running continuously or spinning down when not in use.
Doze Mode Timeout
This setting defines the number of minutes before the system enters "doze mode", the first level of system inactivity shutdown. The exact definition depends on the system, but in general this mode means that the processor slows down to a minimal activity level while other parts of the system keep running as normal. The default for this setting is usually "Disabled".
Standby Mode Timeout
This setting defines the number of minutes before the system enters "standby mode", the intermediate level of system inactivity shutdown. The exact definition depends on the system, but in general this mode means that the processor slows down to an even lower activity level than doze mode, and the video and hard disk drives are powered down. The default option is "Disabled".
42 | P a g e
Suspend Mode Timeout
This setting defines the number of minutes before the system enters "suspend mode", the deepest level of system inactivity shutdown. The exact definition depends on the system, but in general this mode means that all system devices are shutdown (except for any that the BIOS is specifically told to keep running) and the processor is shut down to a trickle mode. The default option is "Disabled".
IRQ Wake-Up Events and Activity Monitors
When the system enters a power down mode, it will look for activity to tell it when to wake back up. Normally you wake the system back up either by pressing a key or moving the mouse. However, you may want the system to wake up in response to other events. For example, you might want the system to wake up when activity on the modem is detected, if your PC answers incoming faxes. Some BIOSes give you the ability to specify whether or not activity on an IRQ will wake up the system.
The BIOS monitors the system for "activity" to determine when to enable power management. You can tell the system what it should consider activity and what it should not, in other words, what sorts of events on the PC should reset the idle counter for power management. For example, in almost every case a movement of the mouse or a keypress could be considered activity. However, if you have a sensitive mouse that can move slightly in response to vibration, you might want to set the BIOS so that movement on the mouse will not reset the power management countdown timers.
There will normally be a separate setting for each IRQ. For each one, the options will typically be:
• Wake Up: Activity on this IRQ will wake up the system when in a power down mode. • Monitor: Activity on this IRQ will reset the system idle countdown timers. • Both: Activity on this IRQ will both wake up the system when powered down and reset the idle timers when powered up. • Neither: Activity on this IRQ will neither wake the system nor reset idle timers.
The default for these depends on the system. Some BIOSes use similar controls with different names, or may separate the wake up event controls from the monitoring controls. If you are using power management you will want to tailor these based on what interrupts (devices) are in use on your system. Look here for information on what the typical IRQ allocations are on a PC .
43 | P a g e
Tip: For a system with a PS/2 style mouse, the mouse will be on IRQ 12. For a system with a serial mouse, the mouse will be on whatever IRQ is assigned to the COM port the modem is using. This is usually COM1, which uses IRQ 4.
Note: IRQ1, which is generated by the keyboard, is not usually listed here as it always causes a wake-up from power management, and cannot normally be disabled.
BIOS Settings - Integrated Peripherals
This section discusses settings that control your system's integrated peripherals. These settings are used to enable or disable integrated peripheral support, and set the various resources they use. If in addition to the standard integrated peripherals (serial and parallel ports , floppy and disk drives, etc.) you have integrated video, sound or other devices, you may find controls for them in this section.
Integrated Floppy Disk Controller
This setting enables or disables the integrated floppy disk controller (FDC). The default for this is "Enabled". If for some reason you are using a plug in floppy disk controller card, you will want to disable the integrated controller.
Integrated IDE Controllers
This setting enables or disables the integrated primary and secondary IDE/ATA controllers . If you are using an add in IDE controller card (which there is normally no need to do), or if you are not using IDE devices at all (for example, if you use SCSI devices), you can disable the built in controller here.
On some BIOSes a single setting controls both the primary and secondary channels; the options in this case are "Disabled", "Primary", "Secondary" and "Both". Other BIOSes have two separate "Enabled"/"Disabled" settings, one for the primary channel and one for the secondary channel.
The default on most systems is to enable both IDE channels. This is usually an acceptable setting for most PCs, but some systems can exhibit strange behavior if the secondary IDE channel is enabled but there are no drives on it; for example, Windows 95 may try to set up a drive controller device on the secondary channel and then get confused when nothing is on it. It is therefore prudent to disable the secondary IDE channel unless you are using it. This will also free up the IRQ used by the secondary channel (IRQ15) for use with other devices, if you need it.
44 | P a g e
Integrated Serial Port 1 / Serial Port 2
This setting lets you specify the resources for the first and second serial ports on the motherboard. The exact name used for the various options varies (some call them "COM1", "COM2", etc. while others just list the I/O address and IRQ options). For each serial port setting you will typically find these:
• 3F8/IRQ4 (COM1): Sets the serial port to the I/O address and IRQ normally used by COM1. This is usually the default for the first serial port. • 2F8/IRQ3 (COM2): Sets the serial port to the I/O address and IRQ normally used by COM2. This is usually the default for the second serial port. • 3E8/IRQ4 (COM3): Sets the serial port to the I/O address and IRQ normally used by COM3. • 2E8/IRQ3 (COM4): Sets the serial port to the I/O address and IRQ normally used by COM4. • (Other options): Some systems now let you select other IRQs to assign to the onboard ports, to use if you are trying to avoid a resource conflict. • Disabled: Disables the serial port.
Normally you will set the first serial port to the resource settings for COM1, and the second to COM2. If you are using an internal modem and you want it to be set up by your system as COM2, the easiest way to do this without generating any conflicts is to disable the second serial port here, to prevent interference.
Integrated Parallel Port
This setting lets you specify the resources for the integrated parallel port. On most systems you are allowed to choose one of the typical resource settings allocated to parallel ports, or to disable the port:
• 378/IRQ7 (LPT1): Sets the parallel port to the I/O address and IRQ normally used by LPT1. This is usually the default. • 278/IRQ5 (LPT2): Sets the parallel port to the I/O address and IRQ normally used by LPT2. • Disabled: Disables the integrated parallel port.
Integrated Parallel Port Mode
Parallel ports have several different modes of operation. The original parallel ports were used only for one way communication from the PC to the printer; newer ones include bi directional communication and other abilities. The normal choices for this setting are:
45 | P a g e
• SPP: Sets the parallel port to function as a Standard Parallel Port. This is the default (and slowest) option. • EPP: Sets the parallel port to Enhanced Parallel Port mode. Sometimes also called "Bi directional" • ECP: Sets the parallel port up as an Enhanced Capabilities Port. This setting requires the use of a DMA channel, usually specified through another BIOS setting .
Generally speaking, you will usually want to use EPP or ECP. ECP has enhanced performance but greater compatibility problems, overall. I usually use EPP.
Note: This setting is either locked out or ignored if the parallel port is disabled.
Parallel Port ECP DMA Channel
If your system supports ECP parallel port mode and you have the port set to use ECP, you must use this setting to assign a DMA channel for use by the port. The usual options are "DMA 1" and "DMA 3".
Note: This setting is either locked out or ignored if the parallel port is disabled, or if the parallel port mode is not set to ECP.
Warning: Some BIOSes allow this to be set to DMA channel 2 as well, which is normally reserved for the floppy disks. This will often create a resource conflict if chosen.
PS/2 Mouse Enable
On systems that support a PS /2 style mouse, this setting enables or disables this port. If you are using the port you should enable this, otherwise you should disable it so that the interrupt reserved for the PS/2 mouse (IRQ12) can be used for another purpose. Some systems have an "Auto" setting for this parameter, which is really ideal, since it will only enable PS/2 support if you actually have one connected.
USB Enable
Use this setting to enable USB (Universal Serial Bus) devices on motherboards that support USB. If you are not using USB, leave this setting at its default ("Disabled").
46 | P a g e
BIOS Settings - Security / Password Settings
This section lets you set security passwords to control access to the system at boot time and/or when entering the BIOS setup program. Some systems have a single password, while many newer ones now have two: a supervisor and a user password.
Warning: If you set a password on your system, make sure you write it down in at least two places. If you lose the password you will be locked out of your own system, and then you will have to resort to techniques like these . :^) For most users, a password is unnecessary. In a shared office environment, it can be very helpful however, to control access to the PC.
Supervisor Password
Select this option to set the supervisor password. The supervisor password is the higher level password of the two normally present on the system. On most systems, when the supervisor password has been set, it must be entered in order to access the BIOS setup program, or to change the user password.
User Password
Select this option to set the user password. The user password is the lower level password of the two normally present on the system. The user password usually allows the system to be booted, but does not allow access to the BIOS setup program. The supervisor password must be used to enter the BIOS setup program.
Note: On some systems, either the supervisor or user passwords will allow access to the BIOS setup program. In this case the existence of two passwords may be to allow a single password to be set up for an administrator, which will work for multiple machines, while the user password is individual for each machine.
BIOS Settings - Hardware Device Settings / "CPU Soft Menu"
The newest rage in motherboard design is the so called "jumperless" motherboard. While this name is an exaggeration these boards do have jumpers , just fewer of them than a regular motherboard the idea is sound: to move many of the low level hardware selection functions from hardware jumpers to regular BIOS settings, accessed through a BIOS settings group sometimes called a "CPU soft menu". Abit has popularized this type of motherboard.
47 | P a g e
This section describes the settings that are found in this setup group on jumperless motherboards. Regular jumpered motherboards will of course not have a section of this sort in their BIOS setup.
Warning: Setting the values in this section incorrectly can possibly damage your processor or other hardware.
CPU Name/Type
The BIOS will automatically detect and display the type of CPU in the PC, including the manufacturer and family name (e.g., "Intel Pentium", "AMD K6"). This value cannot be changed.
CPU Operating Speed
This setting allows you to select the operating speed of your processor directly. When you set this value, the BIOS will automatically set the "External Clock" and "Multiplier Factor" values for you, and lock them so they cannot be changed. For example, setting this value to "166" will set the external clock to 66 MHz, and the multiplier to 2.5X. To manually control the external clock and multiplier factor values, you must set this parameter to "User Defined".
External Clock
This setting controls the clock speed of the memory bus on the motherboard, and is normally 50, 60, 66 or 75 MHz. The internal processor speed is the product of the external clock speed of the motherboard and the multiplier used by the processor.
Note: When the CPU Operating Speed parameter is set to a specific number, the External Clock parameter is computed by the BIOS and this setting is disabled.
Multiplier Factor
This setting controls the multiplier that is used to determine the internal clock speed of the processor relative to the external or motherboard clock speed. The usual values are 1.5X, 2X, 2.5X, 3X, 3.5X and so on.
Note: When the CPU Operating Speed parameter is set to a specific number, the External Clock parameter is computed by the BIOS and this setting is disabled.
48 | P a g e
CPU Power Plane
This setting controls how the voltage for the processor is to be specified. There are three different options. Depending on which one you select, the BIOS will change the other available voltage settings:
• Single Voltage: This option is, of course, for conventional processors that use a single voltage only. Selecting this option enables the "Plane Voltage" setting and disables the other voltage settings. • Dual Voltage: Select this option for processors that use split rail or dual voltage. This option enables the "I/O Plane Voltage" and "Core Plane Voltage" settings. • Via CPU Marking: Selecting this option will allow you to specify the CPU marking (specification) code for your processor, which will tell the BIOS how to set the voltage automatically. This is done using the "CPU Marking" BIOS setting, and the other voltage settings are disabled. The code is usually a five character code such as "SY016" that is found on the top surface or bottom surface of the CPU.
Plane Voltage
When the CPU Power Plane is set to "Single Voltage", this parameter allows you to choose what the voltage should be. This should be set to the correct voltage for your particular CPU . When CPU Power Plane is set to anything other than "Single Voltage", this setting will not be present.
I/O Plane Voltage
When the CPU Power Plane is set to "Dual Voltage", this parameter allows you to choose what the I/O or external voltage should be. When CPU Power Plane is set to anything other than "Dual Voltage", this setting will not be present.
Core Plane Voltage
When the CPU Power Plane is set to "Dual Voltage", this parameter allows you to choose what the core or internal voltage should be. When CPU Power Plane is set to anything other than "Dual Voltage", this setting will not be present.
CPU Marking
When the CPU Power Plane is set to "Via CPU Marking", this parameter allows you to choose what the marking code is for your CPU, which will tell the BIOS what voltage(s) the CPU requires. You may not know what your code is, or it may not be listed, so you
49 | P a g e may want to use the manual settings ("Single Voltage" or "Dual Voltage") in this case. When CPU Power Plane is set to anything other than "Via CPU Marking", this setting will not be present.
BIOS Settings - Auto Configuration and Defaults
In addition to the automatic configuration options offered in several specific areas of the BIOS setup (memory timing, hard disk autodetection, etc.) most BIOSes also offer a menu selection to automatically set all options in the BIOS to predefined settings.
Note: Auto configuration selections will not generally replace the settings in the Standard Setup section, in order not to wipe out any specific settings you have entered for your floppy or hard disk drives, or the current date and time .
Warning: It is prudent to record your system's current settings on paper before loading any default settings so that you know what you have changed and can undo the automatic settings if necessary. You may also find it useful to reference this procedure to help set your key settings again after doing a default load
Auto Configuration with BIOS Defaults / Failsafe Settings
Select this option to replace most of the current BIOS settings with predefined settings (coded into the BIOS) that are intended to put the system into as stable a state as possible. This means in most cases the slowest memory timings, performance enhancing features turned off, etc. In general, you will want to use this setting if your system becomes unstable after you make many changes, to return it to a known good state.
This will not be an optimal setting in the vast majority of cases; you will want to make modifications after you do this, to improve performance . It is very useful for troubleshooting; if your system doesn't work before you run this and then it does work afterwards, you know that an incorrect BIOS setting was likely your problem.
Auto Configuration with Optimal Settings
Select this option to replace most of the current BIOS settings with predefined settings (coded into the BIOS) that are intended to put the system into what the designers consider an optimal state. You can use this when you first start up your system to get it "close" to what you want it to be when you have made all the changes you feel are necessary for maximum performance. Don't expect these optimal settings to truly be optimal however; the designers can't possibly anticipate how you specifically are going to use your system.
50 | P a g e
BIOS Settings - Exit Setup
There are generally two ways to exit the BIOS setup program . Most BIOSes have two menu entries that you choose from, to exit either saving your changes, or discarding them. Others exit by hitting the {Esc} key and then ask you if you want to keep changes or discard them.
Save and Exit Setup
Choose this setting to exit the BIOS setup program and save changes to the BIOS CMOS memory . Make sure you select this in order to keep your changes; many times users accidentally forget to do this and then wonder why their system's behavior didn't change even though they modified settings.
Exit Setup Without Saving
Choose this setting to exit the BIOS program discarding all changes made. The BIOS will normally ask for confirmation ("Are you sure?") before exiting. Note that the BIOS program does not keep track of whether or not you actually make changes to any of the settings, the way for example a word processor would, in order to determine if it should warn you. It will warn you every time you tell it to exit without saving.
Hard Disk Drives(HDD)
The hard disk drive in your system is the "data center" of the PC. It is here that all of your programs and data are stored between the occasions that you use the computer. Your hard disk (or disks) are the most important of the various types of permanent storage used in PCs (the others being floppy disks and other storage media such as CD ROMs, tapes, removable drives, etc.) The hard disk differs from the others primarily in three ways: size (usually larger), speed (usually faster) and permanence (usually fixed in the PC and not removable).
Hard disk drives are almost as amazing as microprocessors in terms of the technology they use and how much progress they have made in terms of capacity, speed, and price in the last 20 years. The first PC hard disks had a capacity of 10 megabytes and a cost of over $100 per MB. Modern hard disks have capacities approaching 100 gigabytes and a cost of less than 1 cent per MB! This represents an improvement of 1,000,000% in just under 20 years, or around 67% cumulative improvement per year. At the same time, the speed of the hard disk and its interfaces has increased dramatically as well.
Your hard disk plays a significant role in the following important aspects of your computer system:
51 | P a g e
• Performance: The hard disk plays a very important role in overall system performance, probably more than most people recognize (though that is changing now as hard drives get more of the attention they deserve). The speed at which the PC boots up and programs load is directly related to hard disk speed . The hard disk's performance is also critical when multitasking is being used or when processing large amounts of data such as graphics work, editing sound and video, or working with databases.
• Storage Capacity: This is kind of obvious, but a bigger hard disk lets you store more programs and data.
Top view of a 36 GB, 10,000 RPM, IBM SCSI server hard disk, with its top cover removed. Note the height of the drive and the 10 stacked platters. (The IBM Ultrastar 36ZX.)
• Software Support: Newer software needs more space and faster hard disks to load it efficiently. It's easy to remember when 1 GB was a lot of disk space; heck, it's even easy to remember when 100 MB was a lot of disk space! Now a PC with
52 | P a g e
even 1 GB is considered by many to be "crippled", since it can barely hold modern (inflated) operating system files and a complement of standard business software.
• Reliability: One way to assess the importance of an item of hardware is to consider how much grief is caused if it fails. By this standard, the hard disk is the most important component by a long shot. As I often say, hardware can be replaced, but data cannot. A good quality hard disk, combined with smart maintenance and backup habits, can help ensure that the nightmare of data loss doesn't become part of your life.
Introduction to File Systems
• File systems. Important topic most crucial data stored in file systems, and file system performance is crucial component of overall system performance. In practice, is maybe the most important.
• What are files? Data that is readily available, but stored on non volatile media. Standard place to store files: on a hard disk or floppy disk. Also, data may be a network away.
• Most systems let you organize files into a tree structure, so have directories and files.
• What is stored in files? Latex source, Nachos source, FrameMaker source, C++ object files, executables, Perl scripts, shell files, databases, PostScript files, etc.
• Meaning of a file depends on the tools that manipulate it. Meaning of a Latex file is different for the Latex executable than for a standard text editor. Executable file format has meaning to OS. Object file format has meaning to linker.
• Some systems support a lot of different file types explicitly. Macintosh, IBM mainframes do this. Knowledge of file types built into OS, and OS handles different kinds of files differently.
• In Unix, meaning of a file is simply a sequence of bytes. How do Unix tools tell file types apart? By looking at contents! For example, how does Unix tell executables apart from shell scripts apart from Perl files when it executes it?
o Shell Scripts start with a #.
o Perl Scripts start with a #!/usr/bin/perl. In general, if file starts with #!tool, Unix shell interprets file using tool.
53 | P a g e
o How about executables? Start with Unix executable magic number. Recall Nachos object file format.
o What about PostScript files? Start with something like %!PS Adobe 2.0, which printing utilities recognize.
Single exception: directories and symbolic links are explicitly tagged in Unix.
• What about Macintosh? All files have a type (pict, text) and the name of program that created the file. When double click on the file, it automatically starts the program that created file and loads the file. Have to have utilities that twiddle the file metadata (types and program names).
• What about DOS? Have an ad hoc file typing mechanism built into file naming conventions. So, .com and .exe identify two different kinds of executables. .bat identifies a text batch file. These are enforced by OS (because it is involved with launching executables). Other file extensions are recognized by other programs but not by OS.
• File attributes:
o Name
o Type in Unix, implicit.
o Location where file is stored on disk
o Size
o Protection
o Time, date and user identification.
• All file system information is stored in nonvolatile storage in a way that it can be reconstructed on a system crash. Very important for data security.
• How do programs access files? Several general ways:
o Sequential open it, then read or write from beginning to end.
o Direct specify the starting address of the data.
o Indexed index file by identifier (name, for example), then retrieve record associated by name.
54 | P a g e
Files may be accessed more than one way. A payroll file, for example, may be accessed sequentially by paycheck program and indexed by personnel office. Nachos executable files are accessed directly.
• File structure can be optimized for a given access mode.
o For sequential access, can have file just laid out sequentially on disk. What is problem?
o For direct access, can have a disk block table telling where each disk block is. To access indexed data, first traverse disk block table to find right disk block, then go to the block containing data.
o For more sophisticated indexed access, may build an index file. Example: IBM ISAM (Indexed Sequential Access Mode). User selects a key, and system builds a two level index for the key. Uses binary search at each level of index, then linear search within final block. Notice how memory hierarchy considerations drive file implementation.
• Easy to simulate a sequential access file given a direct access file just keep track of current file position. But simulating direct access file with a sequential access file is a lot harder.
• Fundamental design choice: lots of file formats or few file formats? Unix: few (one) file format. VMS: few (three). IBM lots (I don't know just how many).
• Advantage of lots of file formats: user probably has one that fits the bill.
• Disadvantage: OS becomes larger. System becomes harder to use (must choose file format, if get it wrong it is a big problem).
• Directory structure. To organize files, many systems provide a hierarchical file system arrangement. Can have files, and then directories of files. Common arrangement: tree of files. Naming can be absolute, relative, or both.
• There is sometimes a need to share files between different parts of the tree. So, structure becomes a graph. Can get to same file in multiple ways. Unix supports two kinds of links:
o Symbolic Links: directory entry is name of another file. If that file is moved, symbolic link still points to (non existent) file. If another file is copied into that spot, symbolic link all of a sudden points to it.
o Hard Links: sticks with the file. If file is moved, hard link still points to file. To get rid of file, must delete it from all places that have hard links to it.
55 | P a g e
Link command (ln) sets these links up.
• Uses for soft links? Can have two people share files. Can also set up source directories, then link compilation directories to source directories. Typically useful file system structuring tool.
• Graph structure introduces complications. First, must be sure not to delete hard linked files until all pointers to them are gone. Standard solution: reference counts. Second, only want to traverse files once even if have multiple references to same file. Standard solution: marking. cp does not handle this well for soft links; tar handles it well.
• What about cyclic graph structures? Problem is that cycles may make reference counts not work can have a section of graph that is disconnected from rest, but all entries have positive reference counts. Only solution: garbage collect. Not done very often because it takes so long.
• Unix prevents users from making hard links create cycles by only allowing hard links to point to files, not directories. But, with .. still have some cycles in structure.
• Memory mapped files. Standard view of system: have data stored in address space of a process, but data goes away when process dies. If want to preserve data, must write it to disk, then read it back in again when need it.
• Writing IO routines to dump data to disk and back again is a real hassle. What is worse, if programs share data using files, must maintain consistency between file and data read in via some other mechanism.
• Solution: memory mapped files. Can map part of file into process's address space and read and write the file like a normal piece of memory. Sort of like memory mapped IO, generalized to user level. So, processes can share persistent data directly with no hassles. Programs can dump data structures to disk without having to write routines to linearize, output and read in data structures.
• Used for stuff like snapshot files in interactive systems.
• In Unix, the system call that sets this up is the mmap system call. How is sharing set up for processes on the same machine? What about processes on different machines?
56 | P a g e
• Next issue: protection. Why is protection necessary? Because people want to share files, but not share all aspects of all files. Want protection on individual file and operation basis.
o Professor wants students to read but not write assignments.
o Professor wants to keep exam in same directory as assignments, but students should not be able to read exam.
o Can execute but not write commands like cp, cat, etc.
For convenience, want to create coarser grain concepts.
o All people in research group should be able to read and write source files. Others should not be able to access them.
o Everybody should be able to read files in a given directory.
• Conceptually, have operations (open, read, write, execute), resources (files) and principals (users or processes). Can describe desired protection using access matrix. Have list of principals across top and resources on the side. Each entry of matrix lists operations that the principal can perform on the resource.
• Two standard mechanisms for access control: access lists and capabilities.
o Access lists: for each resource (like a file), give a list of principals allowed to access that resource and the access they are allowed to perform. So, each row of access matrix is an access list.
o Capabilities: for each resource and access operation, give out capabilities that give the holder the right to perform the operation on that resource. Capabilities must be unforgivable. Each column of access matrix is a capability list.
Instead of organizing access lists on a principal by principal basis, can organize on a group basis.
• Who controls access lists and capabilities? Done under OS control. Will talk more about security later.
• What is the Unix security model? Have three operations read, write and execute. Each file has an owner and a group. Protections are given for each operation on basis of everybody, group and owner. Like everything else in Unix, is a fairly simple and primitive protection strategy.
• Unix file listing:
57 | P a g e
• 4 drwxr xr 2 martin faculty 2048 May 15 21:03 ./
• 2 drwxr xr x 7 martin faculty 512 May 3 17:46 ../
• 2 rw r 1 martin faculty 213 Apr 19 22:27 a0.aux
• 8 rw r 1 martin faculty 3488 Apr 19 22:27 a0.dvi
• 4 rw r 1 martin faculty 1218 Apr 19 22:27 a0.log
• 72 rw r r 1 martin faculty 36617 Apr 19 22:27 a0.ps
• 6 rwxr xr x 1 martin faculty 2599 Apr 5 18:07 a0.tex*
• How are files implemented on a standard hard disk based system? It is up to OS to implement it. Why must OS do this? Protection.
• What does a disk look like? It is a stack of platters. Each platter may have two surfaces (one per side). There is one disk head per surface. The surfaces revolve beneath the heads, with the heads riding on a cushion of air. The heads move back and forth between the platters as a unit. The area beneath a stationary head is a track. The set of tracks that can be accessed without moving the heads is a cylinder. Each track is broken up into sectors. A sector is the unit of disk transfer.
• To read a given sector we first move the heads to that sector's cylinder (seek time), then wait for the sector to rotate under the head (latency time), then copy data off of disk into memory (transfer time).
• Typical hard disk statistics: (Sequel 5400 from August 1993, 5.25 inch 4.0Gbyte).
o Platters: 13
o Read/Write heads: 26
o Tracks/Surface: 3,058
o Track Capacity (bytes): 40,448 60,928
o Bytes/Sector: 512 520
o Sectors/Track: 79 119
o Media Transfer Rate (MB/s): 3.6 5.5
o Track to track Seek: 1.3 ms
58 | P a g e
o Max Seek: 25 ms
o Average Seek: 12 ms
o Rotational Speed: 5,400 rpm
o Average Latency: 5.6 ms
• How does this compare to timings for a standard workstation? DEC Station 5000 is a standard workstation available in 1993. Had a 33 MHz MIPS R3000, 60 ns memory. How many instructions can execute in 30 ms (about time for average seek plus average latency)? 33 * 30 * 1000 = 990,000. Plus, many operations require multiple disk accesses.
• What does disk look like to OS? Is just a sequence of sectors. All sectors in a track are in sequence; all tracks in a cylinder are in sequence. Adjacent cylinders are in sequence. OS may logically link several disk sectors together to increase effective disk block size.
• How does OS access disk? There is a piece of hardware on the disk called a disk controller. OS issues instructions to disk controller. Can either use IO instructions or memory mapped IO operations.
• In effect, disk is just a big array of fixed size chunks. Job of the OS is to implement file system abstractions on top of these chunks.
Different types file system
When there is a valid need to properly store and to organize your business computer files your company should not be constrained with using only a single type of filing system. In effect there is more than one type of file system that can be used for your purpose. To actually be more precise there are a total of four different styles or types of systems at your command. These systems are your disk file systems; the network file systems as well as the various special purposes file systems. We will briefly cover each of these systems in turn.
The disk file system is perhaps the most common means employed for storing and maintaining both personal and business related files. These are easy to use and can be used at your home or at your place of employment. The maintenance and the storage of these files are facilitated only by the data storage devices themselves such as by the use of the common disk drive. The disk file system used by an organization can use either the FAT, NTFS, HFS or a few of the lesser known methods which we will not discuss here. It is better to keep to the major types of systems in order to facilitate compatibility.
59 | P a g e
Another quickly growing type of file system is the Flash file system. This is the choice of system if your intention is to store your data on the portable flash memory devices. The popularity of these storage media devices has grown alongside the popular mobile devices and the closely related flash memories. Though it is a common misunderstanding to employ the use of the usual disk file system on the flash device it quickly becomes apparent that by doing so will simply not bring out the best results of this system.
We next have the network file system which is quickly gaining in popularity not only in the business environment but in private homes as well. This system makes use of what is known as remote file access protocol. This protocol provides users the necessary access for files which are stored on a common server.
The last type of file system that we will briefly discus is the special purpose file system. Simply put, any file system which is not a network or a disk file system would fall under this new category of file system. Generally these types of systems are in house designed specifically for a particular purpose by the computer department of major corporations. This type of data bases and file structures do not adapt very well from one field of use to another. As an example you would not want to try and use a specially designed meat production file system for use with an auto industry company complex.
60 | P a g e
. 4 Unit – 2 Input and output devices The computer will be of no use unless it is able to communicate with the outside world. Input/output devices are required for users to communicate with the computer. In simple terms, input devices bring information INTO the computer and output devices bring information OUT of a computer system. These input/output devices are also known as peripherals since they surround the CPU and memory of a computer system. Some commonly used Input/Output devices are listed in table below.
Input Devices Output Devices Keyboard Monitor Mouse LCD Joystick Printer Scanner Plotter Light Pen Touch Screen Input devices Keyboard It is a text base input device that allows the user to input alphabets, numbers and other characters. It consists of a set of keys mounted on a board.
Alphanumeric Keypad/ Function Keys Special function Keys Cursor Movement Keys
Numeric Keypad
Figure 1.7 : Qwerty Keyboard Layout Alphanumeric Keypad It consists of keys for English alphabets, 0 to 9 numbers, and special characters like + − / * ( ) etc.
61 | P a g e
Function Keys There are twelve function keys labeled F1, F2, F3, , F12. The functions assigned to these keys differ from one software package to another. These keys are also user programmable keys. Special-function Keys These keys have special functions assigned to them and can be used only for those specific purposes. Functions of some of the important keys are defined below. Enter It is similar to the ‘return’ key of the typewriter and is used to execute a command or program. Spacebar It is used to enter a space at the current cursor location. Backspace This key is used to move the cursor one position to the left and also delete the character in that position. Delete It is used to delete the character at the cursor position. Insert Insert key is used to toggle between insert and overwrite mode during data entry. Shift This key is used to type capital letters when pressed along with an alphabet key. Also used to type the special characters located on the upper side of a key that has two characters defined on the same key. Caps Lock Cap Lock is used to toggle between the capital lock feature. When ‘on’, it locks the alphanumeric keypad for capital letters input only. Tab Tab is used to move the cursor to the next tab position defined in the document. Also, it is used to insert indentation into a document. Ctrl Control key is used in conjunction with other keys to provide additional functionality on the keyboard.
62 | P a g e
Alt Also like the control key, Alt key is always used in combination with other keys to perform specific tasks. Esc This key is usually used to negate a command. Also used to cancel or abort executing programs. Numeric Keypad Numeric keypad is located on the right side of the keyboard and consists of keys having numbers (0 to 9) and mathematical operators (+ − * /) defined on them. This keypad is provided to support quick entry for numeric data. Cursor Movement Keys These are arrow keys and are used to move the cursor in the direction indicated by the arrow (up, down, left, right). Mouse The mouse is a small device used to point to a particular place on the screen and select in order to perform one or more actions. It can be used to select menu commands, size windows, start programs etc. The most conventional kind of mouse has two buttons on top: the left one being used most frequently. Mouse Actions Left Click : Used to select an item. Double Click : Used to start a program or open a file. Right Click : Usually used to display a set of commands. Drag and Drop : It allows you to select and move an item from one location to another. To achieve this place the cursor over an item on the screen, click the left mouse button and while holding the button down move the cursor to where you want to place the item, and then release it. Joystick The joystick is a vertical stick which moves the graphic cursor in a direction the stick is moved. It typically has a button on top that is used to select the option pointed by the cursor. Joystick is used as an input device primarily used with video games, training simulators and controlling robots.
63 | P a g e
Figure 1.8 : Mouse Figure 1.9 : Joystick Scanner Scanner is an input device used for direct data entry from the source document into the computer system. It converts the document image into digital form so that it can be fed into the computer. Capturing information like this reduces the possibility of errors typically experienced during large data entry.
Figure 1.10 : A Flat -bed Scanner Hand held scanners are commonly seen in big stores to scan codes and price in formation for each of the items. MIC
A microphone (colloquially called a mic or mike ; both pronounced /ˈma ɪk/ [1] ) is an acoustic to electric transducer or sensor that converts sound into an electrical signal . Microphones are used in many applications such as telephones, tape recorders , karaoke systems, hearing aids , motion picture production, live and recorded audio engineering, FRS radios, megaphones , in radio and television broadcasting and in computers for recording voice, speech recognition, VoIP, and for non acoustic purposes such as ultrasonic checking or knock sensors. Most microphones today use electromagnetic induction (dynamic microphone), capacitance change (condenser microphon e), piezoelectric generation, or light modulation to produce an electrical voltage signal from mechanical vibration. Light Pen It is a pen shaped device used to select objects on a display screen. It is quite like the mouse (in its functionality) but uses a light pen to move the pointer and select any object on the screen by pointing to the object.
64 | P a g e
Users of Computer Aided Design (CAD) applications commonly use the light pens to directly draw on screen. Touch Screen It allows the user to operate/make selections by simply touching the display screen. Common examples of touch screen include information kiosks, and bank ATMs.
Output Devices Monitor - A monitor is the screen on which words, numbers, and graphics can be seem. The monitor is the most common output device.
Compact Disk Some compact disks can be used to put information on. This is called burning information to a CD.
NOTE: A CD can also be an input device.
Printer - A printer prints whatever is on the monitor onto paper. Printers can print words, numbers, or pictures.
Speaker - A speaker gives you sound output from your computer. Some speakers are built into the computer and some are separate.
Disk Drives - A disk drive is used to record information from the computer onto a floppy disk or CD.
Floppy Disk - A floppy disk is used to record information on. The information is stored on the floppy disk and can be used later or used on another computer
Headphones - Headphones give sound output from the computer. They are similar to speakers, except they are worn on the ears so only one person can hear the output at a time.
Monitor Monitor is an output device that resembles the television screen and uses a Cathode Ray Tube (CRT) to display information. The monitor is associated with a keyboard for manual input of characters and displays the information as it is keyed in. It also displays the program or application output. Like the television, monitors are also available in different sizes.
65 | P a g e
Figure 1.11 : Monitor
Monitor and Types
There are three main types of monitors: the CRT, or Cathode Ray Tube monitor, the LCD Flat Panel monitor, and the TFT LCD monitor.
Each has their own advantages. To learn more about the different types of monitors, just click on any of the links:
CRT (Cathode Ray Tube) Monitor
This is the most inexpensive monitor in the market today. It sports quite a large case, which includes the flat/funnel tubes that displays the images on the screen.
Pixels, made up of phosphors, are the tiny components that make up the image shown onscreen. These pixels are struck by electrons, which make the pixels glow and eventually form the desired image on the screen.
LCD Flat Panel Monitor
Liquid Crystal Display (LCD) monitors were first developed for use with laptop computers. Also known as flat screen monitors, they are becoming more and more common these days. When initially introduced in the market, these flat screens cost quite a fortune. But with its proliferation, prices are continuing to drop.
LCD technology makes use of a liquid crystal solution that are present in two panes of polarized and partitioned glasses. By adjusting the amount of light that passes through these panels through an electric voltage, images are created on the screen. This technology also reduces blurring and color smudging during motion pictures, which makes this type of monitor appropriate for gamers or film enthusiasts.
66 | P a g e
These compact screens are perfect for those who don’t have much space to spare on their office desks or at home. Moreover, due to its technology, the display is also far superior than the CRT monitor’s.
A downside to this type is that, aside from being more expensive, it costs to have some add ons attached to it, such as SVGA, or Super Video Graphics Array technology for improved onscreen display. A DVI input, or Digital Visual Interface, is also recommended for this type of monitor.
TFT-LCD Monitor
A Thin Film Transistor (TFT) – LCD monitor is now being more widely used with LCD monitors, because of of its high level of resolution and sharpness. The only difference is a thin film transistor that is applied to the screen, which results in better control of pixels.
This type of monitor is recommended for those who play animated, colorful, and high resolution games, as well as graphic artists who may need to check out different fonts on the computer screen. Printer
Printers are used to produce paper (commonly known as hardcopy) output. Based on the technology used, they can be classified as Impact or Non-impact printers. Impact printers use the typewriting printing mechanism wherein a hammer strikes the paper through a ribbon in order to produce output. Dot matrix and Character printers fall under this category. Non-impact printers do not touch the paper while printing. They use chemical, heat or electrical signals to etch the symbols on paper. Inkjet, Deskjet, Laser, Thermal printers fall under this category of printers. When we talk about printers we refer to two basic qualities associated with printers: resolution, and speed. Print resolution is measured in terms of number of dots per inch (dpi). Print speed is measured in terms of number of characters printed in a unit of time and is represented as characters per second (cps), lines per minute (lpm), or pages per minute (ppm). Printers and its types Printers are hardware devices which help to take print out of documents from the computer and there are a lot of advantages in using Printers. Printers are efficient devices connected to a computer. They allow the users to print text and images on paper. There are wide varieties of printers which suit all kinds of people. Printers are
67 | P a g e classified based on the printing materials they use and the way they obtain data from the computer. Computer speakers
Computer speakers , or multimedia speakers , are speakers external to a computer, that disable the lower fidelity built in speaker. They often have a low power internal amplifier. The standard audio connection is a 3.5 mm (approximately 1/8 inch) stereo jack plug often color coded lime green (following the PC 99 standard) for computer sound cards. A plug and socket for a two wire (signal and ground) coaxial cable that is widely used to connect analog audio and video components. Rows of RCA sockets are found on the backs of stereo amplifier and numerous A/V products. The prong is 1/8" thick by 5/16" long. A few use an RCA connector for input. There are also USB speakers which are powered from the 5 volts at 500 milliamps provided by the USB port, allowing about 2.5 watts of output power. Computer speakers range widely in quality and in price. The computer speakers typically packaged with computer systems are small, plastic, and have mediocre sound quality. Some computer speakers have equalization features such as bass and treble controls. The internal amplifiers require an external power source, usually an AC adapter. More sophisticated computer speakers can have a subwoofer unit, to enhance bass output, and these units usually include the power amplifiers both for the bass speaker, and the small satellite speakers. Some computer displays have rather basic speakers built in. Laptops come with integrated speakers. Restricted space available in laptops means these speakers usually produce low quality sound. For some users, a lead connecting computer sound output to an existing stereo system is practical. This normally yields much better results than small low cost computer speakers. Computer speakers can also serve as an economy amplifier for MP3 player use for those who wish to not use headphones, although some models of computer speakers have headphone jacks of their own. Types of printer
Inkjet printers - These printers are commonly used in households and small offices. They are cheap to buy and maintain. This printer works with a cartridge, usually a black cartridge. But other individual color cartridges can also be used with it to produce pictures and colored fonts. These printers come in various styles from attractive glossy ones to professional ones.
68 | P a g e
Laser printers – The laser printers uses the toner cartridge and it is fitted into the printer. The print gener ated is of good quality and works fast. These printers print higher volume than the ink jet at the given time. Because of its performance they tend to be more costly and it is best suited for offices and commercial establishments.
‘All in 1’ printers - The se types of printers are for multi tasking. They consist of the laser cartridge, a copier, a scanner and sometimes even fax facility in one single package. With these multiple functionality they are becoming more popular. This really is suited for small of fices or a home office since they tender the printing, scanning and faxing in one single unit. But in big organizations a dedicated machine for each should do better since the quality of print may not be astonishing.
Photo or Snapshot printers - This devic e prints your pictures and photos with fine quality. This is not possible with other types of printers. An inkjet printer can print photos but it cannot meet the outcome given by this kind of printer. These printers have started coming in advanced versions where you can print photos directly from your camera and that does not require your computer to be turned on.
It is a hard task to buy a printer because of the variety in sizes, design and types of printers. Be it your personal use or for company use, you can always find a printing device available in the market which suits your taste of printing needs. Being careful while choosing is more important than buying the printers. Plotter Plotters are used to print graphical output on paper. It interprets com puter commands and makes line drawings on paper using multicoloured automated pens. It is capable of producing graphs, drawings, charts, maps etc.
An Inkjet Printer Flatbed Plotter Computer Aided Engineering (CAE) applications like CAD (Computer Aided Design) and CAM (Computer Aided Manufacturing) are typical usage areas for plotters.
69 | P a g e
Unit – 3
Memory
The main memory in the computer system is referred to as RAM (Random Access Memory). It is fast access memory and is used to store data and instructions during computer operations. The main feature of RAM is that it can be read from and written onto any location and can be accessed randomly (hence the name RAM). The contents of RAM are available only as long as the computer is on and are lost once it is switched off. It is, therefore, also called ‘volatile’ memory. Secondary storage can be used to store data and instructions permanently. ROM or Read Only Memory holds data or instructions permanently and as the name suggest, can only be read from but cannot be changed by the users. It is non volatile in nature, which means that contents of ROM are not lost even if the power is switched off. It, therefore, usually contains instructions that are required to get the computer started once it is powered on. The contents of ROM are built into it at the time of manufacturing itself. Random Access Memory (RAM): The primary storage is referred to as random access memory (RAM) because it is possible to randomly select and use any location of the memory directly store and retrieve data. It takes same time to any address of the memory as the first address. It is also called read/write memory. The storage of data and instructions inside the primary storage is temporary. It disappears from RAM as soon as the power to the computer is switched off. The memories, which lose their content on failure of power supply, are known as volatile memories .So now we can say that RAM is volatile memory. Read Only Memory (ROM):
There is another memory in computer, which is called Read Only Memory (ROM). Again it is the ICs inside the PC that form the ROM. The storage of program and data in the ROM is permanent. The ROM stores some standard processing programs supplied by the manufacturers to operate the personal computer. The ROM can only be read by the CPU but it cannot be changed. The basic input/output program is stored in the ROM that examines and initializes various equipment attached to the PC when the switch is made ON. The memories, which do not lose their content on failure of power supply, are known as non volatile memories. ROM is non volatile memory.
70 | P a g e
Primary Memory
Primary memory is the memory that can be directly accessed by the CPU which constantly interacts with it, retrieves data stored therein, goes through instructions and execute them as per the requirement. All the information, data and application are loaded there in uniform manner. Earlier William tubes, delay lines or rotating magnetic drums were used as primary storage which were later replaced by magnetic core memory. Solid state silicon chip technology revolutionized the electronic memory and paved the way for Random Access Memory (RAM). RAM is volatile (temporary) but fast form of memory.
Apart from the main large capacity Random Access Memory (RAM), there are two sub layers of the primary memory.
Processor registers within the processor, which are one of the fastest forms of data storage, contain a word of data (usually 32 or 64 bits). The CPU instructs and helps the Arithmetic and logic unit to perform a number of calculations on this data.
Processor cache, which is meant for enhancing the performance of the computer, links the fast registers to the slower main memory. Cache memory loads the duplicated information that is used most actively. It is much faster than the main memory but relatively can store limited data. It is also much slower but much larger than the processor registers. Cache setup is further split into different levels with smallest and fastest primary cache and relatively larger but slower secondary cache.
SECONDARY STORAGE
You are now clear that the operating speed of primary memory or main memory should be as fast as possible to cope up with the CPU speed. These high speed storage devices are very expensive and hence the cost per bit of storage is also very high. Again the storage capacity of the main memory is also very limited. Often it is necessary to store hundreds of millions of bytes of data for the CPU to process. Therefore additional memory is required in all the computer systems. This memory is called auxiliary memory or secondary storage.
In this type of memory the cost per bit of storage is low. However, the operating speed is slower than that of the primary storage. Huge volume of data are stored here on permanent basis and transferred to the primary storage as and when required. Most widely used secondary storage devices are magnetic tapes and magnetic disk.
1.Magnetic Tape:
Magnetic tapes are used for large computers like mainframe computers where large volume of data is stored for a longer time. In PC also you can use tapes in the form of
71 | P a g e cassettes. The cost of storing data in tapes is inexpensive. Tapes consist of magnetic materials that store data permanently. It can be 12.5 mm to 25 mm wide plastic film type and 500 meter to 1200 meter long which is coated with magnetic material. The deck is connected to the central processor and information is fed into or read from the tape through the processor. It similar to cassette tape recorder.
Advantages of Magnetic Tape:
Compact:
A 10 inch diameter reel of tape is 2400 feet long and is able to hold 800, 1600 or 6250 characters in each inch of its length. The maximum capacity of such tape is 180 million characters. Thus data are stored much more compactly on tape.
Economical:
The cost of storing characters is very less as compared to other storage devices.
Fast:
Copying of data is easier and fast.
Long term Storage and Re-usability:
Magnetic tapes can be used for long term storage and a tape can be used repeatedly with out loss of data.
2.Magnetic Disk:
You might have seen the gramophone record, which is circular like a disk and coated with magnetic material. Magnetic disks used in computer are made on the same principle. It rotates with very high speed inside the computer drive. Data is stored on both the surface of the disk. Magnetic disks are most popular for direct access storage device. Each disk consists of a number of invisible concentric circles called tracks. Information is recorded on tracks of a disk surface in the form of tiny magnetic spots. The presence of a magnetic spot represents one bit and its absence represents zero bit. The information stored in a disk can be read many times without affecting the stored data. So the reading operation is non destructive. But if you want to write a new data, then the existing data is erased from the disk and new data is recorded.
Floppy Disk:
It is similar to magnetic disk discussed above. They are 5.25 inch or 3.5 inch in diameter. They come in single or double density and recorded on one or both surface of the diskette. The capacity of a 5.25 inch floppy is 1.2 mega bytes whereas for 3.5 inch
72 | P a g e floppy it is 1.44 mega bytes. It is cheaper than any other storage devices and is portable. The floppy is a low cost device particularly suitable for personal computer system.
Optical Disk:
With every new application and software there is greater demand for memory capacity. It is the necessity to store large volume of data that has led to the development of optical disk storage medium. Optical disks can be divided into the following categories:
1.Compact Disk/ Read Only Memory (CD-ROM):
CD ROM disks are made of reflective metals. CD ROM is written during the process of manufacturing by high power laser beam. Here the storage density is very high, storage cost is very low and access time is relatively fast. Each disk is approximately 4 1/2 inches in diameter and can hold over 600 MB of data. As the CD ROM can be read only we cannot write or make changes into the data contained in it.
2.Write Once, Read Many (WORM):
The inconvenience that we can not write any thing in to a CD ROM is avoided in WORM. A WORM allows the user to write data permanently on to the disk. Once the data is written it can never be erased without physically damaging the disk. Here data can be recorded from keyboard, video scanner, OCR equipment and other devices. The advantage of WORM is that it can store vast amount of data amounting to gigabytes (109 bytes). Any document in a WORM can be accessed very fast, say less than 30 seconds.
3.Erasable Optical Disk:
These are optical disks where data can be written, erased and re written. This also applies a laser beam to write and re write the data. These disks may be used as alternatives to traditional disks. Erasable optical disks are based on a technology known as magnetic optical (MO). To write a data bit on to the erasable optical disk the MO drive's laser beam heats a tiny, precisely defined point on the disk's surface and magnetises it.
Memory Packages
SIP
There are many applications of the Internet that require the creation and management of a session, where a session is considered an exchange of data between an associations of participants. The implementation of these applications is complicated by
73 | P a g e the practices of participants: users may move between endpoints, they may be addressable by multiple names, and they may communicate in several different media sometimes simultaneously. Numerous protocols have been authored that carry various forms of real time multimedia session data such as voice, video, or text messages. The Session Initiation Protocol (SIP) works in concert with these protocols by enabling Internet endpoints (called user agents) to discover one another and to agree on a characterization of a session they would like to share. For locating prospective session participants, and for other functions, SIP enables the creation of an infrastructure of network hosts (called proxy servers) to which user agents can send registrations, invitations to sessions, and other requests. SIP is an agile, general purpose tool for creating, modifying, and terminating sessions that works independently of underlying transport protocols and without dependency on the type of session that is being established. Computer Memory Types and Memory Technology
Memory Types
In order to enable computers to work faster, there are several types of memory available today. Within a single computer there is no longer just one type of memory. Because the types of memory relate to speed, it is important to understand the differences when comparing the components of a computer.
SIMM (Single In-line Memory Modules)
SIMMs are used to store a single row of DRAM, EDO or BEDO chips where the module is soldered onto a PCB. One SIMM can contain several chips. When you add more memory to a computer, most likely you are adding a SIMM.
The first SIMMs transferred 8 bits of data at a time and contained 30 pins. When CPU's began to read 32 bit chunks, a wider SIMM was developed and contained 72 pins.
72 pin SIMMS are 3/4" longer than 30 pin SIMMs and have a notch in the lower middle of the PCB. 72 pin SIMMs install at a slight angle.
DIMM (Dual In-line Memory Modules)
DIMMs allow the ability to have two rows of DRAM, EDO or BEDO chips. They are able to contain twice as much memory on the same size circuit board. DIMMs contain 168 pins and transfer data in 64 bit chunks.
DIMMs install straight up and down and have two notches on the bottom of the PCB.
74 | P a g e
SODIMM (Small Outline DIMM)
SO DIMMs are commonly used in notebooks and are smaller than normal DIMMs. There are two types of SO DIMMs. Either 72 pins and a transfer rate of 32 bits or 144 pins with a transfer rate of 64 bits.
RDRAM - RIMM
Rambus, Inc, in conjunction with Intel has created new technology, Direct RDRAM, to increase the access speed for memory. RIMMs appeared on motherboards sometime during 1999. The in line memory modules are called RIMMs. They have 184 pins and provide 1.6 GB per second of peak bandwidth in 16 bit chunks. As chip speed gets faster, so does the access to memory and the amount of heat produced. An aluminum sheath, called a heat spreader, covers the module to protect the chips from overheating.
SO RIMM
Similar in appearance to a SODIMM and uses Rambus technology. Technology
DRAM (Dynamic Random Access Memory)
One of the most common types of computer memory (RAM). It can only hold data for a short period of time and must be refreshed periodically. DRAMs are measured by storage capability and access time.
Storage is rated in megabytes (8 MB, 16 MB, etc).
Access time is rated in nanoseconds (60ns, 70ns, 80ns, etc) and represents the amount of time to save or return information. With a 60ns DRAM, it would require 60 billionths of a second to save or return information. The lower the nanospeed, the faster the memory operates.
DRAM chips require two CPU wait states for each execution.
Can only execute either a read or write operation at one time.
FPM (Fast Page Mode)
At one time, this was the most common and was often just referred to as DRAM. It offered faster access to data located within the same row.
EDO (Extended Data Out)
75 | P a g e
Newer than DRAM (1995) and requires only one CPU wait state. You can gain a 10 to 15% improvement in performance with EDO memory.
BEDO (Burst Extended Data Out )
A step up from the EDO chips. It requires zero wait states and provides at least another 13 percent increase in performance.
SDRAM (Static RAM)SDRAM, DDR, RAMBUS
Introduced in late 1996, retains memory and does not require refreshing. It synchronizes itself with the timing of the CPU. It also takes advantage of interleaving and burst mode functions. SDRAM is faster and more expensive than DRAM. It comes in speeds of 66, 100, 133, 200, and 266MHz.
DDR SDRAM (Double Data Rate Synchronous DRAM)
Allows transactions on both the rising and falling edges of the clock cycle. It has a bus clock speed of 100MHz and will yield an effective data transfer rate of 200MHz.
Direct Rambus
Extraordinarily fast. By using doubled clocked provides a transfer rate up to 1.6GBs yielding a 800MHz speed over a narrow 16 bit bus.
Cache RAM
This is where SRAM is used for storing information required by the CPU. It is in kilobyte sizes of 128KB, 256KB, etc. Other Memory Types
VRAM (Video RAM)
VRAM is a video version of FPM and is most often used in video accelerator cards. Because it has two ports, It provides the extra benefit over DRAM of being able to execute simultaneous read/write operations at the same time. One channel is used to refresh the screen and the other manages image changes. VRAM tends to be more expensive.
Flash Memory
This is a solid state, nonvolatile, rewritable memory that functions like RAM and a hard disk combined. If power is lost, all data remains in memory. Because of its high speed, durability, and low voltage requirements, it is ideal for digital cameras, cell phones, printers, handheld computers, pagers and audio recorders.
76 | P a g e
Shadow RAM
When your computer starts up (boots), minimal instructions for performing the startup procedures and video controls are stored in ROM (Read Only Memory) in what is commonly called BIOS. ROM executes slowly. Shadow RAM allows for the capability of moving selected parts of the BIOS code from ROM to the faster RAM memory
Cache Memory
The cache memory is very important to the PC system and its speed. Cache sits on newer processor as L1 (level 1) memory and as L2 memory. This allows kind of a buffer for the CPU. The CPU (Central Processing Unit ) is faster than the rest of the system in most cases and needs a place to store information that can be accessed fast, this is where L1 and L2 come in. The cache minimizes the number of outgoing transactions from the CPU, it sends and receives information from the system memory and passes it to the CPU so the CPU can do more of its work internally thus speeding overall pc performance.