Fundamentals of Computer PDF
Fundamentals of Computer PDF
Fundamentals of Computer PDF
Fans are dedicated to cool the Information is written to an EEPROM chip after
Electrically erasable it is manufactured. EEPROM chips are also
Graphics-processing unit EEPROM programmable read-only called Flash ROMs. An EEPROM chip can be
erased and re-written without having to remove
(GPU). memory
the chip from the computer.
ITE PC v4.0 ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 23 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 24
Random-access Memory (RAM) Memory Modules
Temporary storage for data and programs that are being accessed
by the CPU Dual Inline Package (DIP) is an individual memory chip. A
DIP had dual rows of pins used to attach it to the
Volatile memory, which means that the contents are erased when motherboard.
the computer is powered off
More RAM means more capacity to hold and process large Single Inline Memory Module (SIMM) is a small circuit board
programs and files, as well as enhance system performance. that holds several memory chips. SIMMs have 30-pin and
Types of RAM: 72-pin configurations.
Dynamic Random Access Memory (DRAM) Dual Inline Memory Module (DIMM) is a circuit board that
Static Random Access Memory (SRAM) holds SDRAM, DDR SDRAM, and DDR2 SDRAM chips.
Fast Page Mode DRAM (FPM Memory) There are 168-pin SDRAM DIMMs, 184-pin DDR DIMMs,
Extended Data Out RAM (EDO Memory) and 240-pin DDR2 DIMMs.
Synchronous DRAM (SDRAM)
RAM Bus Inline Memory Module (RIMM) is a circuit board
Double Data Rate SDRAM (DDR SDRAM)
that holds RDRAM chips. A typical RIMM has a 184-pin
Double Data Rate 2 SDRAM (DDR2 SDRAM)
configuration.
RAMBus DRAM (RDRAM)
ITE PC v4.0 ITE PC v4.0
Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 25 Chapter 1 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 26
Fingerprint scanner
Video Ports Input Devices
Input devices used to enter data or
A video port connects a instructions into a computer:
monitor cable to a computer.
Mouse and Keyboard
Video Graphics Array (VGA)
Digital camera and digital video
Digital Visual Interface (DVI) camera
High-Definition Multimedia Biometric authentication device Digital camera
Interface (HDMi)
Touch screen
S-Video
Scanner
Component/RGB
There are three common system resources: When the CPU receives an interrupt
request, the CPU determines how to fulfill
Interrupt Requests (IRQs) this request.
Then, ask closed-ended Problem may be simpler than the customer thinks.
(yes/no) questions
Checking for obvious issues can save time.
“Have you changed your
password recently?” If this step turns up nothing, continue to the next step
of the troubleshooting process.
ITE PC v4.0 ITE PC v4.0
Chapter 2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 33 Chapter 2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 34
Although this utility lists details about the error, you may
still need to research the solution.
ITE PC v4.0 ITE PC v4.0
Chapter 2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 35 Chapter 2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 36
Gather Data from the Computer Gather Data from the Computer
Device Manager When troubleshooting, power on the computer and listen to
the beep code sequence. Document the beep code
A flag of ! indicates the device is acting incorrectly. sequence and research the code to determine the specific
A flag of X indicates the device is disabled. hardware failure.
If the computer boots and stops after the POST, investigate
the BIOS settings to determine where to find the problem.
Device Manager
Refer to the motherboard manual to make sure that the
BIOS settings are accurate.
Conduct research to find software to use to diagnose and
solve problems. Often, manufacturers of system hardware
provide diagnostic tools of their own.
What third-party tools are you aware of to use in computer
troubleshooting?
ITE PC v4.0 ITE PC v4.0
Chapter 2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 37 Chapter 2 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 38
Then, ask closed-ended Problem may be simpler than the customer thinks.
(yes/no) questions
Checking for obvious issues can save time.
“Have you changed your
password recently?” If this step turns up nothing, continue to the next step
of the troubleshooting process.
ITE PC v4.0 ITE PC v4.0
Chapter 4 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11 Chapter 4 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Try Quick Solutions Gather Data from the Computer
May provide additional When system, user, or software errors occur on a
information, even if they computer, the Event Viewer is updated with information
do not solve the problem. about the errors: Event Viewer
Although this utility lists details about the error, you may
still need to research the solution.
ITE PC v4.0 ITE PC v4.0
Chapter 4 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 13 Chapter 4 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 14
Gather Data from the Computer Gather Data from the Computer
Device Manager When troubleshooting, power on the computer and listen to
the beep code sequence. Document the beep code
A flag of ! indicates the device is acting incorrectly. sequence and research the code to determine the specific
A flag of X indicates the device is disabled. hardware failure.
If the computer boots and stops after the POST, investigate
the BIOS settings to determine where to find the problem.
Device Manager
Refer to the motherboard manual to make sure that the
BIOS settings are accurate.
Conduct research to find software to use to diagnose and
solve problems. Often, manufacturers of system hardware
provide diagnostic tools of their own.
What third-party tools are you aware of to use in computer
troubleshooting?
ITE PC v4.0 ITE PC v4.0
Chapter 4 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 15 Chapter 4 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 16
Evaluate the Problem, Implement the
Solution Close with the Customer
Research possible solutions: Discuss the solution with the customer
Have the customer confirm that the problem has been
Prioritize solutions to try. solved
Try easiest solutions first. Document the process
After an unsuccessful try, Problem description
undo any changes you have Solution
made. Components used
Unnecessary changes could Amount of time spent in solving the problem
complicate finding the solution.
Discussion
Share with the others, your lists of additional
hardware and software maintenance tasks and
additional benefits of preventive maintenance.
Share the samples of work order forms and liability
release forms you have collected. Q and A
Share your list of third-party software diagnostic tools
that can be used to troubleshoot computers.
Step 5 Evaluate the problem and implement the solution Use a work order to collect information
Step 6 Close with the customer Description of problem
Open-ended questions
What were you doing when the problem was identified?
Closed-ended questions
Are you currently logged into your network?
ITE PC v4.0 ITE PC v4.0
Chapter 5 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 61 Chapter 5 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 62
ITE PC v4.0
Chapter 5 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 71
Purpose of this Presentation
To provide to instructors an overview of Chapter 6:
List of chapter objectives
Chapter 6: Laptops
Overview of the chapter contents, including
and Portable
student worksheets
Devices student activities
some potential student misconceptions
6.3 Compare and contrast desktop and laptop 6.2.3 Worksheet: Laptop Docking Stations
components 6.3.4 Worksheet: Laptop Expansion
6.4 Explain how to configure laptops 6.4.1 Worksheet: ACPI Standards
6.5 Compare the different mobile phone standards 6.7.2 Worksheet: Research Laptop Problems
6.6 Identify common preventive maintenance
techniques used for laptops and portable devices
6.7 Describe how to troubleshoot laptops and portable
devices
ITE PC v4.0 ITE PC v4.0
Chapter 6 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 3 Chapter 6 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 4
Optional Virtual Laptop Activities Introduction
6.2.1 Explore the different views of the virtual laptop Do you know when the first laptops were developed?
6.2.2 Explore the virtual laptop keyboard Who do you think used the early laptops?
6.2.3 Explore the different views of the docking station One of the original laptops was the GRiD Compass
1101. It was used by astronauts on space missions in
6.4.2 Replace components and devices in the virtual
the early 1980s.
laptop
It weighed 11 lb (5 kg) and cost US $8,000 - $10,000!
This chapter focuses on the differences between laptops
and desktops and describes the features of PDAs and
Smartphones.
Bluetooth
status LED
Standby
Battery LED
status LED Parallel port
AC power
Battery bay connector
Battery Docking
latches connector
Pointer controller
Eject
button
Docking Exhaust Ethernet RJ-11 Serial Parallel Keyboard
port
connector fan port port port port
Mouse
External-diskette-drive port
connector
Step 5 Evaluate the problem and implement the solution Description of problem
Open-ended questions
Step 6 Close with the customer
What was happening when you first experienced the
problem?
Closed-ended questions
Is the laptop currently using the battery as the power
source?
ITE PC v4.0 ITE PC v4.0
Chapter 6 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 37 Chapter 6 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 38
Participate in discussion of various teaching strategies While using the virtual laptop, begin thinking of ways to
to use with the virtual laptop. use this in teaching (both students and instructors).
Participate in discussion or journal your answers to
discussion questions.
ITE PC v4.0
The expected lifetime of the printer ITE PC v4.0
Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 9 Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 10
Wi-Fi or IEEE 802.11 is a standard for wireless communication. NOTE: You should know the components of a laser printer and the
steps required to print a page.
ITE PC v4.0 ITE PC v4.0
Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 11 Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 12
Laser Printing Process WARNING
The laser printer process involves six steps to print The primary corona wire or grid, or the conditioning
information onto a single sheet of paper roller, can be very dangerous.
The voltage runs as high as -6000 volts.
Only certified technicians should work on the unit.
Before working inside a laser printer, you should make
sure that voltage is properly discharged.
Download the upgrade file from the manufacturer's Print-job buffering is the ability of the printer to capture
website and run a setup file to install it. as much of the print job into its internal memory as
possible.
Consult the documentation for memory requirements:
Memory specifications
Memory population and availability
Advantages:
All devices are built in
Serial Low cost Disadvantages:
Parallel
(Centronics USB Firewire One upgrade for all devices One problem effects all
Easy connection and setup devices
and DB-25)
Uses one port for all devices Not designed for heavy use
Scanner Maintenance
Troubleshooting Printers and Scanners
The scanner surface should be kept clean. If the glass
becomes dirty, consult the manufacturer's user manual. Step 1 Gather data from the customer
To prevent liquid from leaking into the scanner case, do not Step 2 Verify the obvious issues
spray glass cleaner directly on the device. Dampen a cloth with
cleaner, and then apply gently to the glass. Step 3 Try quick solutions first
If the inside of the glass becomes dirty, check the Step 4 Gather data from the computer
manual for instructions on how to open the unit or
remove the glass from the scanner. Step 5 Evaluate the problem and implement the solution
If possible, clean both sides of the glass. Step 6 Close with the customer
When the scanner is not in use, keep lid
closed.
Never lay anything heavy on a scanner.
Store handheld scanners in a safe place.
ITE PC v4.0 ITE PC v4.0
Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 51 Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 52
1. Gather Data from the Customer 2. Verify the Obvious Issues
Customer information Some of the areas to investigate or have the customer
Company name, contact name, address, phone number confirm include:
Printer or scanner information Loose cable connections Out of paper
Manufacturer, model, OS, network environment, connection Errors on equipment display Printer queue
type
Errors on computer screen Paper jams
Description of problem
Equipment power Low ink warning
Open-ended questions
What were you doing when the problem was identified?
Closed-ended questions
Can you print from an application?
Delete the print job from the Capabilities, speeds, and uses
Printer will not print
queue and print again
Connection types, cables, and interfaces
Printer is printing unknown Uninstall and reinstall the Installing and sharing printers
characters print driver
Installing scanners
ITE PC v4.0
Chapter 7 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 63
Purpose of this Presentation
To provide to instructors an overview of Chapter 8:
List of chapter objectives
Chapter 8: Overview of the chapter contents, including
Networks student worksheets
student activities
student labs
There are two types of ring Easy to troubleshoot, since each host is connected to
topologies: the central device with its own wire.
Single-ring and Dual-ring
Open Systems Interconnect (OSI) model Provides connectivity between hosts in the
Internet network
IP, ICMP, RIP, ARP
Standards defining how devices communicate on a network
Ensures interoperability between network devices Network Describes the standards that hosts use to
Access access the physical media
ITE PC v4.0 ITE PC v4.0
Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 65 Chapter 8 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 66
Q and A
Yes
Yes
Review Need to Manually Prompted
scan manually
treat or to Restart
report treat or computer
delete restart?
delete?
No
No
Schedule future
Test all aspects to
automatic
ensure the update has
updates and
not caused issues
scans
ITE PC v4.0 ITE PC v4.0
Chapter 9 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 21 Chapter 9 © 2007 Cisco Systems, Inc. All rights reserved. Cisco Public 22
Step 5 Evaluate the problem and implement the solution Description of problem
Open-ended questions
Step 6 Close with the customer What changes were made to the security settings?
Closed-ended questions
Are the protection software signature files up-to-date?
4. Gather Data from the Computer 5. Evaluate Problem & Implement Solution
Third-party software, such as anti-virus and anti- 1. Evaluate the information gathered from the
spyware applications, can report on the files that have customer and from the laptop
been infected.
2. Determine possible solutions
There are several tools available in the operating
system that a technician can use: 3. Implement the best solution
Verify that the signature file is current. 4. If a proposed solution doesn’t correct the problem,
Check the security software log file for entries. reset the computer back to the original state and try
Task Manager is used to check for unknown applications that another proposed solution.
are running.
NOTE: Never ask a customer to reveal a password.