Organization of technical maintenance of computer systems and complexes. Test work for the KSK group in the discipline "maintenance and repair of computer systems and complexes"

Send your good work in the knowledge base is simple. Use the form below

Good work to the site">

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://www.allbest.ru/

maintenance computer chipset interruption

Introduction

1. Theoretical part

1.1 Initial data

2. Practical part

Conclusion

List of sources used

Introduction

In order for your computer to work without failures, it is necessary to periodically carry out Maintenance. Maintenance may include:

Mechanical operations for cleaning computer components from dirt and dust

Operations related to operating system protection

Periodic cleaning operations for unused programs

Registry bug fixes

Organizing information on hard drives

All this will help the computer work at full capacity and delight you with the results of its work.

Mechanical cleaning during maintenance should be carried out for home computers at least twice a year, for computers used in the office at least four times. To do this, the computer is disassembled and its components are blown with compressed air. If necessary, use a soft brush along with air. This evaluates the condition of the power supply, processor, video card, and system fans. If they make extraneous sounds during operation, replace them with new ones.

Maintenance of the operating system (cleaning) is necessary to speed up the boot of the computer, maintain its performance and prevent errors and failures during operation.

Very often a situation arises that some time after purchasing a new computer or reinstalling the operating system, the computer begins to take longer to boot and programs run slower. This is caused by user activity who forgets to uninstall programs they are not using. However, there are programs that, even when uninstalled, “forget” to delete some files, folders and registry keys created by them. In this case, you need to remove these traces using special utilities. Organizing information on hard drives, called defragmentation, serves to speed up the reading of files from the hard drive, which directly affects the speed and comfort of working with the computer.

All these operations (maintenance) must be carried out depending on the intensity of work on the computer at intervals from once a month to once every six months.

The main objective of this work is to consolidate theoretical knowledge in the discipline being studied, obtain practical skills in carrying out maintenance and diagnostics of VT equipment, which will help to better navigate the future in professional issues.

1. Theoretical part

Maintenance is a set of measures aimed at creating optimal conditions for the operation of equipment in order to extend the trouble-free service life of the computer.

Kinds technical condition object (SVT)

The indicated most important reliability properties characterize certain technical conditions of the object.

According to GOST 27.002-89, there are five main types of technical condition of objects:

Serviceable condition - the condition of an object in which it meets all the requirements of regulatory, technical and (or) design (project) documentation.

Faulty state is the state of an object in which it does not meet at least one of the requirements of regulatory, technical and (or) design (project) documentation.

Operable state - the state of an object in which the values ​​of all parameters characterizing the ability to perform specified functions comply with the requirements of regulatory and technical and (or) design (project) documentation.

Inoperable state - a state of an object in which the values ​​of at least one parameter characterizing the ability to perform specified functions do not meet the requirements of regulatory, technical and (or) design (project) documentation.

Limit state - a state of an object in which its further operation is unacceptable or impractical, or restoring its operational state is impossible or impractical.

The transition of an object (product) from one higher technical state to a lower one usually occurs as a result of events: damage or failure.

Failure is an event consisting in a violation of the operational state of an object.

Damage is an event consisting in a violation of the serviceable state of an object while maintaining a serviceable state.

GOST 15467-79 introduced another concept that reflects the state of an object - a defect.

A defect is each individual non-compliance of an object with established standards or requirements. A defect reflects a condition other than failure.

There are two types of preventative actions:

Active

Passive

During active preventive maintenance, operations are performed whose main purpose is to extend the trouble-free life of the PC. They come down mainly to periodic cleaning of both the entire system and its individual components.

Passive prevention usually means measures aimed at protecting the PC from external adverse influences. We are talking about installing protective devices in the power supply network, maintaining cleanliness and acceptable temperature in the room where the PC is installed, reducing vibration levels, etc.

Active preventive maintenance methods:

System backup. This operation allows you to restore system functionality in the event of a fatal hardware failure. For backup, you need to purchase a high-capacity storage device.

Cleaning. One of the most important elements of preventative maintenance is regular and thorough cleanings. Dust settling inside a PC can cause many problems. Firstly, it is a heat insulator, which impairs the cooling of the system. Secondly, dust necessarily contains conductive particles, which can lead to leaks and even short circuits between electrical circuits. Finally, certain substances contained in dust can accelerate the oxidation process of contacts, which will ultimately lead to a breakdown in electrical connections.

Installing the microcircuits in their places. During maintenance, it is very important to eliminate the effects of thermal displacement of microcircuits. Since the PC heats up and cools down when turned on and off, the chips installed in the sockets gradually “crawl out” of them. Therefore, you will have to find all the components installed in the sockets and put them in place.

Cleaning connector contacts. It is necessary to wipe the connector contacts so that the connections between the nodes and components of the system are reliable. You should pay attention to the expansion connectors, power supply, keyboard and speaker connections located on the motherboard. As for the adapter boards, you need to wipe the printed connectors that are inserted into the slots on the motherboard and all other connectors.

Preventative maintenance of hard drives. To ensure the safety of your data and improve the performance of your hard drive, it is necessary to perform some maintenance procedures from time to time. There are also several simple programs with which you can, to some extent, insure yourself against data loss.

Data defragmentation. As you write files to your hard drive and delete them, many of them become fragmented, i.e. are broken into many parts scattered throughout the disk. By periodically defragmenting files, you solve two problems at once. First, if files occupy contiguous areas on the disk, then the movement of the heads when reading and writing them becomes minimal, which reduces wear on the head drive and the disk itself. In addition, the speed of reading files from disk increases significantly. Secondly, data is easier to recover if the files are recorded as a single unit.

Tools for preventive support:

1 Set of disassembly and assembly tools.

2 Diagnostic devices and programs for PC testing.

3 Instruments for measuring voltage, resistance and probes.

4 Chemicals for wiping contacts, spray gun with

coolant and a compressed air cylinder.

5 Specialized available tools, device for

replacement of microcircuits.

6 Test connectors for testing serial and parallel ports.

7 Memory testing devices.

8 Testing equipment.

1.1 Initial data

Number of PCs - 4

Table 1 Hard drive capacity.

HDD capacity GB

Chipset type AMD-750

Number and type of printers:

1. Samsung SCX 4200,

Paper consumption 45 thousand l/year

Component failure rate:

1. Keyboard 8.8E-06;

2. Mouse 6.1E-06;

Current PC status: 70xx

Additional task: Check interrupt settings.

2. Practical part

2.1 Analysis of the PC state and measures to restore the working state of the PC

According to the instructions, AMD-750 chipset. AMD-750 is a chipset for AMD Athlon and Duron processors. This is a rather old and no longer produced logic set. In terms of its characteristics, the AMD-750 is clearly inferior to its competitors: VIA Apollo KX - for the Slot A platform and VIA Apollo KT133 and others - for the Socket A platform. Therefore, it is not recommended to buy a motherboard on this chipset. AMD-750 is the first chipset aimed at mainstream processors that are electrically and logically incompatible with Intel processors, but compatible with them in software. The latter circumstance is significant, since it allows for trouble-free operation of the same system and application software, developed for the traditional architecture and instruction system, which have become classic, and for which, of course, taking into account all the latest achievements, processors and specialized sets are designed and produced.

The processor bus controller (FSB) built into the AMD-750 chipset provides data transfer at a frequency of 200 MHz at a processor bus clock speed of 100 MHz. This bus consists of three high-speed independent channels: 13 bits - processor request channel, 13 bits - system probe channel, 72 bits - data transfer channel (8 bits ECC - error correcting code). The peak data transfer rate reaches 1.6 GB/s (200 MHz x 8 bytes - 1.6 GB/s).

Advantages of the chipset: cheapness of the board based on it, fairly high-quality implementation of UDMA-66 and memory controller, stability.

Disadvantages of the chipset: lack of support for PC133 SDRAM, AGP 4x, UDMA-100, built-in audio and much more.

Conclusion: a chipset for super-budget machines that do not need extra (or not extra...) bells and whistles.

Figure 1 - AMD-750 chipset diagram (simplified).

Table 2 Brief technical specifications AMD-750 chipsets.

Chipset modifications

Supported processors/platform

AMD Athlon/Duron Slot A, Socket A

North Bridge

South Bridge

FSB frequency

Memory frequency

Supported memory (maximum capacity)

ATA mode

Graphics slot

Other options

ISA, USB support

Unique Phoenix Bios Chipset Error Codes.

BIOS manufacturers provide the user with fairly wide options for changing the operating modes of almost all computer components. This, first of all, assumes that the PC owner has certain qualifications and quite consciously makes changes to the BIOS parameters.

Users often do not see the difference between the software and hardware parts of a computer. This can be explained by the high degree of integration of system components. Accurately understanding the differences between computer components provides the key to understanding the role of the BIOS. The term BIOS is used to describe the basic input/output system. Essentially, the BIOS is an “intermediate layer” between the software and hardware parts of the system.

BIOS is not like standard software because it is located in chips located on the system board or adapter cards. The BIOS in a PC can usually be found in the following system components:

· ROM of the system board;

· ROM of the adapter board (for example, video adapter);

· Data on disk loaded into RAM (device drivers).

The system BIOS contains drivers for the main components (keyboard, floppy drive, hard drive, serial and parallel ports, etc.) necessary to initially start the computer.

Phoenix provides technical support and documentation at: http://www.phoenix.com;

Troubleshooting solutions

It should be borne in mind that often a malfunction is associated with banal incompatibility of various hardware components of the computer and is corrected by replacing it with components of a different type (manufacturer).

Computer malfunction can occur for two reasons:

1. Due to the installation of incorrect operating modes for computer components.

2. Due to a breakdown of one or more computer components.

To troubleshoot problems, you need to check all components using special software. There is also a POST program built into the bios.

When you start the computer, a separate test is performed for each individual piece of equipment (processor, memory, video card, keyboard, input/output ports, etc.). Each test has its own unique number, which is called a POST code. The POST code is written to the Manufacturing Test Port (address 0080H) before each individual POST test begins.

After the POST test code is written to the Manufacturing Test Port, the testing procedure for the corresponding equipment begins. If the testing procedure fails, the POST code of the last procedure (which caused the error) remains in the Manufacturing Test Port. If you know the POST code of the last procedure, you can determine the device that caused the error.

The POST code output to the diagnostic port is accompanied by an audio signal output to the system speaker. The sound signal generation scheme is as follows:

The eight-bit code is converted into four two-bit groups

*The value of each group increases by one

* Based on the received value, a short sound signal is generated

For example: code 16h = 00 01 01 10 = 1-2-2-3

Table 3 lists the main Phoenix BIOS POST codes.

Table 3 POST codes.

Description

Description

Checking the current processor operating mode.

Hardware interrupt vectors are being installed.

Prohibits execution of non-maskable NMI interrupts.

Launching a monitoring system for voltages and temperatures and fan operation.

Determining the type of installed processor.

The coprocessor is initializing.

The initial initialization of the interrupt and DMA controllers is performed.

I/O and interrupt controller resources are disabled.

Early initialization of chipset registers.

Serial ports are detected and installed.

Sets the POST in progress software flag, indicating that POST is currently in progress.

External IDE controllers are being configured.

The CPU software resources are being initialized.

Parallel ports are discovered and installed.

Initializing ISA Plug snd Play devices.

Initializing the cache memory. Level 1 and 2 cache registers are set.

I/O and interrupt controller resources are enabled. These resources are configured in accordance with the Setup settings.

Initialization of input/output resources (Super I/O).

The motherboard devices are being configured.

Initializing the IDE controller.

The values ​​of the BIOS variable block in the Data Area are set.

Enables generation of a non-maskable interrupt (NMI).

Setting the values ​​of alternative registers.

Extended BIOS Data Area/Initialization in progress

Setting the MSW (Machine Status Word) register value.

Testing and initializing a mouse with a PS/2 interface.

Initialize PCI devices that support Bus Mastering mode.

The floppy drive controller is initializing.

Initializing the keyboard controller.

Determining the number of connected devices with an ATA interface.

The ROM BIOS checksum is checked. If an error occurs, a sound will be output from the system speaker.

The hard drive controllers are being initialized.

Determining the cache size.

Configuring hard drive controllers.

The system timer (8254) initialization process is in progress.

Initializing the DMA controller.

The programmable interrupt controller is being reset.

Configuring the CDROM drive.

The generation of requests for dynamic RAM regeneration is checked. If an error occurs, a sound will be output from the system speaker.

Constructing a configuration table for multiprocessor systems.

The keyboard controller is running a self-test. If an error occurs, a sound will be output from the system speaker.

Search and initialize BIOS for additional devices. If an error occurs, a sound will be output from the system speaker.

Line resolution A20.

The hard drives are checked using the SMART procedure.

The procedure for determining the amount of installed RAM is performed.

The contents of ROM are copied into RAM.

Initializing POST Memory Manager

The Power Management system is being configured.

Resetting 512 KB of main memory.

The unauthorized access protection system is being launched.

During testing of address memory lines, a failure was detected on address line xxxx.

Hardware interrupts are enabled.

While testing data lines, a failure was detected on address line xxxx.

Determining the number of connected devices with ATA and SCSI interfaces.

The cache memory is enabled.

Set the system time according to the Real Time Clock (RTC).

The RAM testing process is in progress. If an error occurs, a sound will be output from the system speaker.

The status of the Key Lock is being checked. If this key is active, receiving SCAN codes from the keyboard is prohibited and a corresponding message is displayed on the monitor screen.

Determination of CPU clock frequency and system bus frequency.

Programming the keyboard controller for the auto-repeat frequency and the waiting time before entering auto-repeat mode according to the BIOS Setup settings.

Initializing Phoenix Dispatch Manager.

The message "Press F2 to enter SetUp" is removed from the screen

Re-initialization of registers.

A check is made for pressing the F2 key.

The chipset is reinitialized.

If the F2 key was detected in the previous step, the BIOS Setup program is launched.

The system BIOS code is unpacked and rewritten into Shadow RAM.

The system reboot flag, performed by pressing the CTRL+ALT+DEL key combination, is cleared.

The cache controller is reinitialized.

Displays the message "Press F1 to resume, F2to Setup" if errors are detected.

The cache size is re-determined.

Completing the POST procedure. The system is being prepared for loading the OS.

Advanced configuration of chipset registers.

Produces a sound signal before loading the OS.

The chipset registers are configured in accordance with the CMOS Setup settings.

Completing the Quiet Boot procedure - accelerated system boot mode (if the Quick Boot option is set to Enabled).

Determining the CPU clock frequency.

Password request (if this is provided in the BIOS Setup settings).

Initializing interrupt vectors in the vector table.

Searches for boot devices.

The checksums of individual BIOS blocks are calculated. If an error occurs, a sound will be output from the system speaker.

Initializing DMI parameters.

The RAM parity error checking circuit is reset to zero.

Initialize the PCI bus and set PCI controller parameters.

Creating a menu for selecting a boot device.

Initializing detected video adapters.

Cleaning the screen.

Starting the Quiet Boot procedure - accelerated system boot mode (if the Quick Boot option is set to Enabled).

Activating protection against boot viruses.

The contents of the VGA BIOS ROM (video adapter BIOS) are rewritten to temporary memory.

Performing BIOS INT 19h interrupt. Control of the boot process is transferred to the initial sector bootloader.

Displays information about the BIOS version on the screen.

The output is no error message screen.

The type and clock frequency of the processor is displayed on the monitor screen.

Initialize the system error handling routine.

Initialization of the EISA bus controller and devices.

Initializing the extended CMOS block.

The keyboard is being tested.

The docking station (laptop) is initializing.

The key press sound mode is activated.

Handling interrupts from unknown devices.

USB bus initialization.

Initializing and setting up chipset registers.

A search is made for unserviceable interrupt requests. If an error occurs, a sound will be output from the system speaker.

Initialization and configuration of chipset bridges (north and south).

Initializing the POST display service procedure.

Initialization of the central processor.

Displaying the message "Press F2 to enter SETUP"

Initializing the system timer.

Prohibition on the use of cache memory.

Initialization of the Super I/O chip (input/output resources).

Testing memory in the range of 512 and 640 KB.

The status of the Recovery jumper is checked, which allows you to perform a forced BIOS recovery.

Testing Extended Memory (extended memory).

Checking the BIOS checksum.

Checking Extended Memory address lines.

If it is detected that the BIOS checksum is calculated incorrectly, control is transferred to the BIOS.

Transferring control to a module generated by the board manufacturer.

Launch of multiprocessor system support.

Configuring cache registers.

Initialization of special (non-standard) equipment.

APIC controller initialization.

Programming interrupt controllers, DMA controllers.

Enable the use of cache memory.

The contents of the Boot Block are copied to Shadow RAM.

Preparing the SMMRAM memory area - SystemManagement Mode RAM, which stores the SMI (System Management Interrupt) processing procedure.

RAM testing is in progress.

A message about the size of the L2 cache is displayed on the screen.

Interrupt vectors are being initialized.

The real time clock is being initialized.

A message indicating that Shadow RAM is being used appears on the screen.

Finding and checking the video adapter, as well as its initialization.

A message about Upper Memory Blocks (UMB) appears on the screen.

Initializing System Management Mode.

Error messages are displayed on the screen.

Produces a single beep before loading the OS.

The system configuration is being checked. As well as compliance with the current system configuration and information in CMOS. The message "Press F1 to resume, F2 to Setup" may be displayed.

Checks information about keyboard errors and then displays corresponding messages on the screen.

If the problem is still in Bios, then the solutions are as follows:

1. Reset BIOS

Resetting the BIOS is bringing the parameter values ​​to the state selected by the motherboard manufacturer as the safest.

The need for this arises in several cases:

1. The computer does not respond to pressing the power button with an ATX power supply or does not show any signs of life with an AT (recommended if this happened after an attempt to overclock the central processor or system bus using BIOS parameters).

2. The computer turns on, but makes some strange sounds and does not want to load the operating system (recommended if this happened when changing parameters such as the time and depth of RAM regeneration, etc.).

3. The computer works, but is not stable. After a while it freezes, or its performance is too low (it is recommended to experiment with different parameters if you cannot find the cause of the malfunction).

5. You are trying to set up someone else's computer, but the CMOS Setup Utility program has an unknown password.

6. You have forgotten the password to boot your computer, and you need to work on it.

There are two ways to reset the BIOS:

1. Turn off your computer. Find the jumper on the motherboard responsible for Clear CMOS; as a rule, it is located near the battery. Place it from the original position (1-2) to position (2-3). Wait 10-15 seconds, move the jumper back to position (1-2). In addition, it is better to disconnect the power cable from the power supply.

2. Turn off the computer. Find the coin cell battery on the motherboard. Carefully pull it out of the slot, bending the lock, and place it separately. Wait 1 minute. Insert the battery back.

2. BIOS update

Updating the ROM BIOS can improve system performance. However, sometimes the update procedure can be complicated, at least much more complicated than connecting ROM chips. The ROM BIOS program increases the “intellectual level” of computer components.

Updating the BIOS can often improve your computer's performance and capabilities. It is thanks to BIOS that different operating systems can function on any PC-compatible computer, despite the difference in hardware. Since the BIOS controls the hardware, it must take into account its features.

Updating the ROM BIOS may be necessary in the following cases:

R When installing an LS-120 (SuperDisk) or Iomega Zip drive;

H When adding bootable USB devices;

H When adding hard drives larger than 8.4 or 137 GB (48-bit LBA mode);

H When adding UltraDMA/33, UltraDMA/66 or UDMA/100 IDE hard drives;

R When adding bootable CD-ROM drives (El Torito specification);

R When adding or improving Plug and Play support;

H When correcting errors related to changing the system date in 2000 and leap years;

H When correcting known bugs or compatibility issues with certain hardware and software;

H When replacing the processor;

R When adding support for the Advanced System Configuration and Power Interface (ACPI);

R When adding/modifying a function to control the processor's temperature or fan operation;

H When installing USB devices;

Ch When implementing technology to protect against unauthorized opening of the system unit.

Determining the BIOS version

To replace or update the BIOS, the following information is required:

h Motherboard model;

Ch Current BIOS version;

Processor type (for example, Pentium MMX, AMD K6, Cyrix/IBM 6x86MX, MII, Pentium II, Pentium III/4, AMD Athlon, Athlon XP, etc.).

You can identify the BIOS by the messages that appear on the screen when you turn on the system. True, the BIOS version is displayed on the screen for only a few seconds. Often it can also be found among the CMOS parameters.

BIOS update procedure (If necessary)

Updating the BIOS using the Bios update procedure

1. Download the latest BIOS from http://www.phoenix.com and save it to a floppy disk (Flash drive).

2. Use this drive to boot.

3. In DOS mode, unzip the downloaded file.

4. In the “MAIN MENU”, you need to select “Updating BIOS from a file”.

5. After completing the procedure, remove the drive and turn off the power.

6. Restart the PC while holding down the key and enter the BIOS menu. You need to select "LOAD SETUP DEFAULTS" to activate the new BIOS, then configure other BIOS menu items.

If you still need to replace the ROM BIOS chip, follow these steps:

1. Save all CMOS memory settings.

3. Remove the housing cover.

4. Remove any components that are blocking easy access to the BIOS ROM chip. Don't forget to wear an antistatic wrist strap! If you did not have time to purchase it, then before performing the described steps, touch the system chassis with your hand.

5. Using a chip removal tool or screwdriver, remove the BIOS ROM chip from its socket on the system board.

6. Install the new ROM BIOS chip into the system board socket.

8.Replace the case cover, connect the power cable, and turn on the computer.

10. Restart your computer.

3. Replacement of the microcircuit

The procedure for replacing a BIOS chip may be useful if you previously created a backup copy of the system BIOS, and there was a need to replace the damaged original with it. You can also use this procedure if the system has a removable Flash-ROM chip installed (this is typical for systems that do not have a BIOS recovery jumper).

To replace the BIOS chip, follow these steps:

1. Save all CMOS memory settings.

2. Turn off the power and unplug the power cable.

3. Remove the case cover and remove any components that prevent easy access to the ROM BIOS chip. Don't forget to wear an antistatic wrist strap! If you do not have one, touch the system chassis with your hand before performing these steps.

4. Using a chip removal tool or screwdriver, remove the BIOS ROM chip from its socket on the system board.

5. Remove the new EPROM chip from the antistatic packaging.

6. Install the new ROM BIOS chip into the system board socket. A standard rectangular BIOS chip has a bump on one end that matches the cutout on the connector, so you can't insert the chip the wrong way without damaging it.

7. Reinstall all previously removed components.

8. Replace the case cover, connect the power cord, and turn on the computer.

9. Enter any previously saved BIOS settings.

10. Save the BIOS settings and restart your computer.

2.2 Scheduling maintenance of computer equipment

Based on an assessment of the actual PC maintenance activities performed, a maintenance schedule was compiled, located in Table 4.

Table 4 Maintenance Schedule

Job title

Duration of work (hour)

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Data archiving

Backup

Based on the maintenance schedule, a PC maintenance schedule has been drawn up.

Table 5 Calendar plan carrying out maintenance

Job title

Start date

Deadline

Executor

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

Defragmentation

Continuation of table 5

Data archiving

Backup

List of tools required for maintenance:

To clean your PC you will need: a soft brush, a vacuum cleaner.

To test equipment we use programs: Everest, MemTest.

To archive data we use the WinRar v 4.2 program.

For backup we use the Exiland Backup program.

To scan your PC for viruses, we use the Dr.Web СureIt program.

For defragmentation, you can use the standard program built into Windows or Defraggler.

2.3 Carrying out additional work

An additional maintenance task is “Checking interrupt settings.”

Interrupts or IRQ (Interrupt Request) are signals that tell the processor that it is necessary to process a request received from a device, and the controller of this very device sends these signals to the processor, that is, with the help of IRQ the processor responds to various events.

Distribution of IRQ numbers using BIOS

In the system, IRQ numbers are distributed between physical lines twice. The first time this is done by the system BIOS is when the system boots up. Each Plug&Play device (all PCI, modern ISA, integrated devices), or more precisely, its interrupt line, is assigned one number out of ten possible. If there are not enough numbers, several lines receive one common one. If these are PIRQ lines, then it’s okay - if you have normal drivers and support from the operating system (see below for more information on this), everything will work. And if several ISA devices or PCI and ISA devices receive one number, then a conflict is simply inevitable, and then you need to intervene in the distribution process.

First of all, you need to disable all unused ISA devices (they are also present in systems without ISA slots) - ports COM1, COM2 and the disk drive. You can also disable the EPP and ECP modes of the LPT port, then the IRQ7 interrupt will become available.

In BIOS Setup we need the "PCI/PNP Configuration" section. There are two basic ways to influence IRQ number assignments: block a specific number and directly assign a PIRQ line number.

The first method is available for all BIOSes: find the list of “IRQ x used by:” items (in new BIOSes it is hidden in the “IRQ Resources” submenu). Those interrupts that should be assigned exclusively to ISA devices should be set to "Legacy ISA". Thus, when distributing numbers to PCI devices, these interrupts will be skipped. This should be done if any ISA device stubbornly shares the same interrupt with the PCI device, which is why both do not work. Then we find the number of this IRQ and block it in BIOS Setup. PCI device goes to new number IRQ, but the ISA device remains. The conflict has been resolved.

The second, more convenient way to manage IRQ numbers is direct assignment. In the same BIOS Setup submenu there may be items like “Slot X use IRQ” (other names: “PIRQx use IRQ”, “PCI Slot x priority”, “INT Pin x IRQ”). With their help, each of the four PIRQ lines can be assigned a specific number. By the way, in the new AwardBIOS 6.00 you can see which devices (including built-in ones) use a particular line.

Figure 2 - IRQ distribution in BIOS.

Interrupt priorities in Windows Vista and 7

System Information utilities (msinfo32.exe) - shows which devices, under which number.

Figure 3 - System Information utility.

To edit the interrupt number you need to open the registry editor and go to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\PriorityControl

Figure 4 - PriorityControl

Create a new DWORD type parameter and call it IRQ13Priority, where 13 is the IRQ number of the device to which you want to assign priority (for example, for IRQ13Priority - IRQ 13, our digital processor).

Figure 5 - IRQ13Priority.

Double-click on the new value and enter its priority number 1. Enter 1 for priority, 2 for the second, and so on. Be sure not to enter the same priority number for two entries and save it.

2.4 Calculation of spare parts and accessories to ensure stable operation of computer equipment

To calculate disks for backup you need

determine the number of DVDs needed:

N DVD =V HDD (GB)/4.7,(1)

V HDD = 40+80+60+40= 220 GB,

N DVD = 220/4.7= 47.

For backup you will need 47 DVDs.

We will calculate the required amount of hardware needed to maintain the functionality of computing facilities throughout the year.

To calculate the number of spare device devices you need:

1) Determine the probability of failure-free operation of devices using the formula:

where t is the guaranteed operating time of the device;

l - failure rate is:

Keyboard 8.8E-06;

Mouse 6.1E-06;

The probability of failure-free operation of devices is 0.9.

2) Determine the guaranteed operating time of devices using the formula:

t class = 0.10536051565/ 8.8 E-06 = 11972.78 hours,

t mouse =0.10536051565/6.1 E-05= 1727.22 hours,

t HDD =0.10536051565/2.8 E-07= 376287.55 hours.

3) Determine the number of spare devices using the formula:

N=t exploit /t,(4)

where t exploit is the total time of use of the device during the year;

The operating time of the devices per year is approximately 2400 hours. The company has 4 computers. Consequently, the operating time of all devices is 9600 hours.

N class = 9600/11972.78 = 0.8,

N mouse = 9600/1727.22 = 5.55,

N HDD = 9600/376287.55 =0.02.

Taking into account the results of rounding up, we obtain that in order to ensure the operation of the PC throughout the year, it is necessary to have additionally:

1 keyboard;

6 mouse-type manipulators;

1 hard drive.

2.5 Calculation of the quantity of consumables

On assignment, we use two printers: Samsung SCX 4200 and HP LJ 1000.

Printer specifications are shown in Tables 4 and 5.

Table 4 Characteristics of Samsung SCX 4200

computer networks. Working with tables and charts in Excel.

test, added 02/27/2011

Basic information input/output system. Basic interface functions and equipment settings. Basic concepts and operation of BIOS. Information about the computer's system BIOS. ROM memory shadowing. Self-testing of the processor and RAM modules.

abstract, added 12/12/2011

Types of cooling systems (CO) for a personal computer (PC). Main characteristics of typical COs, measures to prevent problems. Organization of air flows in the PC case. Review and testing of SB for the processor, basic testing methods.

course work, added 06/19/2011

Characteristics of technical and preventive maintenance systems for computer equipment. Diagnostic programs for operating systems. Interrelation of automated control systems. Protecting your computer from external adverse influences.

abstract, added 03/25/2015

The design of the system unit of a personal computer, its assembly technology. Design and operating principle of various types of cooling systems, troubleshooting, routine maintenance. Selection of equipment and materials.

course work, added 03/28/2012

  • Repair and maintenance of printers, monitors, uninterruptible power supplies, computer mice. Installation and maintenance of the operating system. Assembling a computer from components. Software required by a technical department employee.

    ">
  • Description

    Compact multifunctional 3 in 1 laser device (copier, flatbed scanner, printer)

    Printing technology

    laser printing

    Paper size

    Maximum print speed (A4)

    18 ppm (monochrome)

    Color rendition

    monochrome

    Print resolution up to

    10000 pages

    Warm-up time

    Print control languages

    SPL (Samsung GDI)

    Copy speed monochrome

    18 ppm (maximum)

    First page out time

    Number of copies per cycle

    Scaling

    Scanner type

    tablet

    Guidelines for extracurricular independent work MDK 03.01 Maintenance and repair of computer systems and complexes Professional module PM. 03 Maintenance and repair of computer systems and complexes in specialty 230113 Computer systems and complexes


    1. INTRODUCTION

    The program of extracurricular independent work involves understanding and mastering such sections and topics as “Computer complex and systems”, “File systems”, “Operating systems”, “Machine-dependent properties of operating systems”, “Machine-independent properties of operating systems”, “Operating features in a specific operating system (Windows)", "Features of working in a specific OS (Linux)", "Software", "Organization of technical maintenance of computer equipment (CT)", "Diagnostics and troubleshooting computer systems and systems", "Typical fault finding algorithms".

    This MDK is intended for training mid-level technical specialists.

    The knowledge gained by studying this MDK is necessary when working with a computer, which in the modern world is an integral part of obtaining vocational education and further work of college graduates.

    As a result of studying the professional module, the student must:

    have practical experience:

    Carrying out monitoring, diagnostics and restoration of computer systems and complexes;

    Systems engineering maintenance of computer systems and complexes;

    Hardware debugging software systems and complexes;

    Installation, configuration and setup of the operating system, drivers, resident programs;

    be able to:

    Monitor, diagnose and restore the functionality of computer systems and complexes;

    Carry out system maintenance of computer systems and complexes;

    Take part in debugging and technical testing of computer systems and complexes;

    Installation, configuration and setup of the operating system, drivers, resident programs;

    Comply with safety regulations;

    know:

    Features of monitoring and diagnostics of hardware and software systems; basic diagnostic methods;

    Hardware and software for functional monitoring and diagnostics of computer systems and complexes; capabilities and scope of application of standard and special instrumentation for localizing fault locations of electronic equipment;

    Application of service tools and built-in test programs;

    Hardware and software configuration of computer systems and complexes;

    Installation, configuration and setup of the operating system, drivers, resident programs; techniques for ensuring stable operation of computer systems and complexes;

    Pra-vi-la and norm-we oh-ra-ny work-yes, tech-ni-ki
    safety-no-sti, industrial sa-ni-ta-rii and
    pro-ti-in-the-hot for-you

    The result of mastering the professional module is the students’ mastery of the professional activity Maintenance and repair of computer systems and complexes, including professional (PC) and general (GC) competencies:

    Code Name of learning outcome

    PC 1 Monitor, diagnose and restore the functionality of computer systems and complexes.

    PC 2 Carry out system maintenance of computer systems and complexes.

    PC 3 Take part in debugging and technical testing of computer systems and complexes; installation, software configuration.

    OK 1Understand the essence and social significance of your future profession, show a steady interest in her.

    OK 2 Organize your own activities, determine methods and means of performing professional tasks, evaluate their effectiveness and quality.

    OK 3 Solve problems, assess risks and make decisions in non-standard situations.

    OK 4 Search, analyze and evaluate the information necessary to set and solve professional problems, professional and personal development.

    OK 5 Use information and communication technologies to improve professional activities.

    OK 6Work in a team and team, ensure its cohesion, communicate effectively with colleagues, management, and consumers.

    OK 7 Set goals, motivate the activities of subordinates, organize and control their work, taking responsibility for the results of completing tasks.

    OK 8 Independently determine the tasks of professional and personal development, engage in self-education, and consciously plan professional development.

    OK 9Be prepared for changes in technology in professional activities.

    OK 10 Perform military duties, including using received professional knowledge(for boys).

    Guidelines for extracurricular independent work are an integral part of the educational and methodological complex and represent an addition to textbooks and textbooks as part of the study MDK 03.01 Maintenance and repair of computer systems and complexes, Professional module PM. 03 Maintenance and repair of computer systems and complexes

    2. LIST OF EXTRA-CLASSROOM INDEPENDENT WORK

    Topic No.

    Name of topics

    Type and title of the student's work

    Number of hours to complete the work

    Computer complex and systems

    File systems

    Work with educational literature and notes to complete homework.

    Preparation of an essay on the topic “File systems”

    OS

    Work with educational literature and notes to complete homework.

    Preparing a message on the topic “Operating systems and environments”

    Machine-dependent properties of operating systems

    Work with educational literature and notes to complete homework.

    Machine independent properties of operating systems

    Work with educational literature and notes to complete homework.

    Studying additional and reference literature.

    Features of working in a specific operating system (Windows)

    Work with educational literature and notes to complete homework.

    Features of working in a specific OS (Linux)

    Work with educational literature and notes to complete homework.

    Software

    Work with educational literature and notes to complete homework.

    Preparation of an abstract on the topic “Types of antivirus programs”

    Work with educational literature and notes to complete homework.

    Studying additional and reference literature.

    Work with educational literature and notes to complete homework.

    Studying additional and reference literature.

    Typical fault finding algorithms

    Work with educational literature and notes to complete homework.

    Studying additional and reference literature.

    Total

    3. CONTENT OF STUDENTS' EXTRA-CLASSROOM INDEPENDENT WORK

    NON-CLASSROOM INDEPENDENT WORK No. 1

    1.
    Subject:
    Preparation of the report “Generation of microprocessors”

    2.Number of hours: 9

    3.Goal of the work

    4. study additional and reference literature, prepare for test tasks, write a report on the topic “Generation of microprocessors.”

    Report, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 2

    1.
    Subject:
    Preparation of an essay on the topic “File systems”

    2.Number of hours: 9

    3.Goal of the work: learn to select the necessary literature, isolate the main thing from it, systematize the available material.

    4.General instructions for performing the work: study additional and reference literature, prepare for a survey, write an essay on the topic “File systems”.

    5. Reporting and control form: abstract, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 3

    1.
    Subject:
    Preparing a message on the topic “Operating systems and environments”

    2.Number of hours: 9

    3.Goal of the work: learn to select the necessary literature, isolate the main thing from it, systematize the available material.

    4.General instructions for performing the work: study additional and reference literature, prepare for a survey, write a message on the topic “Operating systems and environments.”

    5. Reporting and control form: message, protection, assessment.

    NON-CLASSROOM INDEPENDENT WORK No. 4

    1.
    Subject:
    Studying additional and reference literature.

    2.Number of hours: 9

    3.Goal of the work

    4.General instructions for performing the work:study additional and reference literature, prepare for the survey, notes on the topic “ Machine-dependent properties of operating systems".

    5. Reporting and control form: summary, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 5

    1.
    Subject:
    Studying additional and reference literature.

    2.Number of hours: 9

    3.Goal of the work: select the necessary literature, isolate the main thing from it, systematize the available material; deepen students' knowledge, skills on the topic being studied.

    4.General instructions for performing the work:Machine independent properties of operating systems".

    5. Reporting and control form: summary, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 6

    1.
    Subject:
    Preparation of a message on the topic “Concept, functions and methods of using the OS software interface”

    2.Number of hours: 9

    3.Goal of the work: learn to select the necessary literature, isolate the main thing from it, systematize the available material.

    4.General instructions for performing the work: study additional and reference literature, prepare for a survey, write a message on the topic “Concept, functions and methods of using the OS software interface.”

    5. Reporting and control form: message, protection, assessment.

    NON-CLASSROOM INDEPENDENT WORK No. 7

    1.
    Subject:
    Preparation of the report “Security in Linux”

    2.Number of hours: 9

    3.Goal of the work: learn to select the necessary literature, isolate the main thing from it, systematize the available material.

    4.General instructions for performing the work: study additional and reference literature, prepare for test tasks, write a report on the topic “Security in Linux.”

    5. Reporting and control form: report, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 8

    1.
    Subject:
    Preparation of an abstract on the topic “Types of antivirus programs”

    2.Number of hours: 9

    3.Goal of the work: learn to select the necessary literature, isolate the main thing from it, systematize the available material.

    4.General instructions for performing the work: study additional and reference literature, prepare for a survey, write an essay on the topic “Types of anti-virus programs.”

    5. Reporting and control form: abstract, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 9

    1.
    Subject: Studying additional and reference literature.

    2.Number of hours: 10

    3.Goal of the work: select the necessary literature, isolate the main thing from it, systematize the available material; deepen students' knowledge, skills on the topic being studied.

    4.General instructions for performing the work:study additional and reference literature, prepare for a survey, write a summary on the topic “ Organization of technical maintenance of computer equipment (CT)».

    5. Reporting and control form: summary, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 10

    1.
    Subject: Studying additional and reference literature.

    2.Number of hours: 9

    3.Goal of the work: select the necessary literature, isolate the main thing from it, systematize the available material; deepen students' knowledge, skills on the topic being studied.

    4.General instructions for performing the work:study additional and reference literature, prepare for test task, write a summary on the topic “ Diagnostics and troubleshooting of computer complexes and systems».

    5. Reporting and control form: summary, defense, evaluation.

    NON-CLASSROOM INDEPENDENT WORK No. 11

    1.
    Subject: Studying additional and reference literature.

    2.Number of hours: 9

    3.Goal of the work: select the necessary literature, isolate the main thing from it, systematize the available material; deepen students' knowledge, skills on the topic being studied.

    Anything man-made that has value to humans must be maintained in order to fulfill its function. This especially applies to computer technology. So, it is necessary to ensure that all components work, that a lot of dust does not settle inside closed boxes, and much more. You have to make sure that even the wires and connectors do not move away from their places. To avoid problems, it is initially necessary to design and install everything necessary. Manufacturers cope well with these tasks (if we talk about computers and smartphones). But what can be said about why additional intervention is needed? For example, maintenance of computer networks and systems. After all, this is not an easy task! By the way, depending on the complexity, they sometimes say “maintenance of computer and intelligent systems and networks.” What is it, how does it happen, what skills are needed? Let's talk about this.

    What is meant by system maintenance?

    This is a necessary, although not feasible, task, which involves designing, installing and laying cables, as well as setting up the operation of equipment. If you have experience, maintaining computer systems and networks is not difficult. When deciding to do everything yourself, you need to decide on the point from which the connection will go, what route it will take, how it will all be attached, and much more. When setting up computer systems, it is also necessary to solve a whole range of issues: what software to use, how to optimize the operation of equipment, what restrictions to set, how to connect to a local/worldwide network. Do you see? There is a lot of work to be done. And this is not as easy as it might seem at first glance. Therefore, in order to avoid problems with sagging and interfering wires, you have to decide how everything will be done and secured so as not to affect the aesthetic appearance rooms. It should be noted that it makes sense to lay a computer network if more than 3 are used. The fact is that if there are two of them, then the most rational solution is to connect directly. When there is only one computer, then there is really nothing to talk about.

    Maintenance of computer systems and networks - what is it and how is it implemented?

    Let's focus more on the technical part. Three main components of computer network maintenance:

    1. Integrated design.
    2. Installation of cable routes.
    3. Wiring.

    When talking about computer network maintenance, it is impossible to make such an exact list, since it is potentially huge. Let's focus on the most important elements:

    1. Setting up the necessary software.
    2. Optimization of the operating system, RAM, registers.
    3. Checking the functioning of the hardware using the BIOS and eliminating possible problems.
    4. Cleaning disks from junk that has not been used for a long time.
    5. Carrying out diagnostic and restoration work.

    Integrated design

    What is meant by this? This includes creating a plan of what will be done and how. The following technologies can be used:

    1. Using
    2. Using wireless technologies.
    3. Use of optical developments.

    It is necessary to think about what should be laid and how, what will be used for fastening and what are the optimal paths. It also provides for the presence of routers, routers, servers and many other pieces of computer equipment, which is necessary for the full operation of large networks.

    Installation of cable routes and laying of wires

    This is necessary for a more detailed implementation decision:

    1. Use of trays or cable ladders.
    2. Application of plastic boxes.
    3. Use of corrugated pipes.
    4. Application of sewer technology.

    Diagnostics, cleaning and restoration of computer systems

    First, about diagnostics. It is necessary to check all disks for errors, the same action applies to RAM. Then, using special software registers are cleaned and applications that are not used for long periods of time are removed. They also defragment the information that is in the physical disks. And at the very end, they check and restore the functionality of damaged disk sectors (if these problems exist).

    Operation optimization

    An important component when talking about maintaining computer networks and systems. The fact is that for this it is necessary to audit the operation of the registry and clean it of debris, check applications that run along with the operating system and negatively affect the loading speed. At the same time, you can configure the processor so that it shows its maximum (but the negative side of this approach is increased energy consumption and a 10-20% reduced service life).

    Also, to obtain greater performance, it will be useful to disable visual effects and, accordingly, speed up the execution of your own. This procedure will be especially useful for office computers, which usually cannot boast of significant performance. There are still optimization opportunities, but they rather relate to individual programs, such as developing special settings parameters or working with system files in order to ensure future-proof execution of the application at the hardware level.

    The choice between your own forces and a hired company

    It is advisable for professionals to do this type of work. When creating everything with your own hands, you must take into account that you may have to drill the walls (which implies the presence of the appropriate tool) and you need a supply of wires and connecting parts. Maintaining computer systems and networks at home is much easier than at work. You can forget about all this if the work is done by professionals, but there is a problem that they need to pay an amount that is approximately 1000-2000 rubles. In addition, servicing computer networks and systems by professionals will allow you to do all the necessary actions faster than doing it yourself. Although last option will provide valuable experience that will be useful nowhere else.

    Conclusion

    As you can see, it's not very difficult. Of course, working with a computer is easier due to the presence of many recommendations on what and how to do, besides, it does not require manual dexterity, you just need to start the necessary processes, and the machine will do everything itself. This is such a thing - maintenance of computer networks and systems.

    GBPOU RM "Saransk Electromechanical College"

    CONTROL TASKS

    ByMDK 03. 01. Maintenance and repair of computer systems and complexes

    for mandatory test work

    fourth year students of the specialty

    230113 Computer systems and complexes

    SARANSK 2017

    Explanatory note.

    These control tasks are intended to check the level of training in MDK.03.01 “Maintenance and repair of computer systems and complexes” of fourth-year students during the half-semester study of this discipline. These test assignments correspond to the material studied by students during this period, covering almost all the material that will subsequently be necessary when studying further subjects.

    The test assignments cover the following topics:

      "Laptop PC Basics."

      "Internal devices of a laptop PC."

      "External devices of a laptop PC."

      “Installing and upgrading basic PC components”

    After carrying out this work, appropriate conclusions are drawn about the level of students’ training, the possibility of further successful study of the subject, and attention is drawn to typical mistakes made by students to review specific topics in depth with individual students or with the group as a whole.

    The test is presented in 3 versions.

    45 minutes are allotted for the test.

    Criteria for assessing mandatory test work.

    Mandatory test work is one of the forms of knowledge control in the subject “Maintenance and repair of computer systems and complexes” for fourth-year students. Contents and volume educational material, by which students’ knowledge and skills are monitored, is determined work program and a calendar-thematic plan according to MDK.03.01 “Maintenance and repair of computer systems and complexes.”

    The mandatory test includes 9 tasks on covered topics that the student must master.

    Mandatory test work is assessed on a five-point system:

    Rating "5":

    Correct completion of all tasks, answers to the questions posed in full.

    Rating "4":

    The material is correctly revealed, the material is 80% complete

    Rating "3":

    Completion of the material by 60%, mastery of the material within the program course.

    Rating "2":

    Gaps in knowledge of the basic educational material are shown, and numerous inaccuracies were made in the answer.

    Option 1

    1. What is the function of laptop external power supply?

    A. Converts AC industrial power supply voltage into DC voltage to power the computer and recharge its battery.

    B. Converts DC industrial power supply voltage into AC voltage to power the computer and recharge its battery.

    C. Charging the battery from an industrial power supply network.

    D. Increasing the industrial power supply voltage to the level required to power a laptop computer.

    2. Which part of the operating system's socket service provides drivers for a PC Card hot-plugged into the PCMCIA slot of a laptop computer?

    A. Card Services.

    B. Auto-detection.

    C. Driver bank.

    D. Universal PnP mechanism

    3. At what maximum distance from the access point can an 802.11b wireless network adapter operate stably?

    A. No more than 500 feet.

    B. Not more than 110 feet.

    C. One mile.

    D. Up to five miles

    4. Which power-saving mode provides the greatest savings in power consumption while allowing full recovery of the work session?

    A. Hibernation mode.

    B. Suspend mode.

    C. Standby mode.

    D. Shutdown.

    5. You installed 1 GB of RAM in one of your clients' laptop computers. After some time, this client complains that the system shows only 700 MB of memory. How do you explain this difference to the client?

    A. One of his staff may have removed one of the memory modules.

    B. One of the memory modules must have failed.

    C. To improve performance, the computer uses BIOS shadowing, so the difference in memory is used to copy the BIOS into it.

    D. In laptops, part of the RAM is used as video memory, and in this case the “missing” memory is used in this capacity.

    6. What is a fuel cell? What is it for?

    7.Definition of the docking station.

    8. In what areas are developers looking for new solutions to increase the operating life of a personal computer?

    9. What is needed to operate a personal computer over a wireless network?

    10. When should you usually consider updating your system BIOS?

    A. When you turn on the computer, nothing is displayed on the screen.

    B. When updating the microprocessor.

    C. When the CMOS BIOS password is lost.

    D. When the CMOS BIOS backup battery runs out.

    11. Which of the following potential errors is least likely to occur when installing RAM modules?

    12 You need to expand the memory on one of your graphic design studio's computers to improve its performance when working with graphic files, which are usually very large. Where can I find out what type of RAM I can use to update my system?

    13. What is the name for a period of low voltage that lasts from several minutes to several hours?

    A. Short-term failure (sag).

    B. Long-term failure (brownout).

    C. Long-term surge.

    D. Short-term spike.

    14. What is the name of the device for protecting computer equipment from fluctuations and interruptions in the AC power supply?

    15. Which device cannot be connected to an uninterruptible power supply?

    Option 2

    1. _____________ is a redefined and enhanced 32-bit version of the PC Card standard, the main purpose of which is to increase the frequency of the PCMCIA bus to support higher performance devices and provide support for 32-bit memory and I/O data.

    C. PCbus.

    D. IEEE bus.

    2. Which of the following procedures for card services to provide the required drivers for a hot-installed PCMCIA card in a laptop computer running the Windows 2000 operating system is not valid?

    A. When you install a card, the Windows 2000 Card Wizard starts, which provides the user with step by step instructions for installing drivers.

    B. The operating system recognizes the card and has the required driver for it, but requires a reboot to install it.

    C. The operating system does not recognize the installed card, for which in this case you need to install an external driver.

    D. The Windows operating system immediately recognizes the card and installs the required driver for it without rebooting the system.

    3. What type of electrical voltage is required to power the LCD panel of a laptop computer?

    A. AC voltage with a frequency of 100 Hz.

    B. Low DC voltage.

    C. Low AC voltage.

    D. 100 GHz DC voltage.

    4. An employee at your company asks for your advice on configuring their laptop to enable hibernation. Which command/dialog box sequence can be used for this purpose in Windows XP?

    A. Start | Programs | System Tools | Power Options | Hibernation.

    B. Start | Setting | Control Panel | Power supply | Sleep tab | The Allow sleep mode checkbox.

    S. Start | Setting | Control Panel | Power supply | Advanced tab | The Allow sleep mode checkbox.

    D. Start | Setting | Power supply | Sleep tab | The Allow sleep mode checkbox.

    5. What happens if you press the + key combination on a computer running Windows XP?

    A. The Windows logo will not appear when Windows boots.

    B. All open windows, including the desktop, are minimized and the login window is displayed.

    C. The network login window appears.

    D. The keyboard will be locked.

    6.What is a port repeater and its purpose of operation?

    7.Power consumption modes.

    8.List the power sources of a laptop computer

    9.What ports are on the laptop case? What devices can be connected to a personal computer?

    10. Which of the following potential errors is least likely to occur when installing RAM modules?

    A. Installation of two modules of different volumes.

    B. Installing one module with tin-plated contacts and the other with gold.

    C. Installation of two modules with different bus frequencies.

    D. Installing a DIMM into the SIMM slot.

    11. What is used to install or replace a microprocessor?

    A. BIOS chip.

    B. HSF system.

    C. ZIF connector.

    D. Operating system.

    12.Your friends asked you to find out the cause of a problem with their computer. They attempted to upgrade it with a new microprocessor using instructions from a book like Computer System Upgrade for Dummies. The system does not show any signs of life, except that when the power is turned on, the power indicator light on the front panel lights up. Having opened the system unit, you find that the heatsink-fan assembly simply sits on top of the microprocessor, not attached in any way. In addition, the lever for securing the processor in the socket is in the upper position. What are your actions in this situation?

    13. What is a period of low voltage that lasts a very short time, on the order of a fraction of a second, called?

    A. Long-term surge.

    B. Short-term surge (spike).

    C. Short-term failure (sag).

    D. Long-term failure (brownout).

    14. What is the name of the device for protecting a computer from minor surges in AC voltage?

    15. What is the difference between the electrostatic discharge effect and the electromagnetic interference effect?

    A. Electrostatic discharge does not damage equipment, but electromagnetic interference can cause serious damage to equipment.

    B. Electromagnetic interference does not damage equipment, but electrostatic discharge can seriously damage equipment.

    C. Electromagnetic interference improves system performance, but electrostatic discharge can cause serious damage to equipment.

    D. Electrostatic discharge improves system performance, and electromagnetic interference can cause serious damage to equipment.

    Option 3.

    1.At what two levels does the operating system support PCMCIA slots?

    A. At the socket level (universal support for all PCMCIA devices).

    B. At the card level (specific drivers to support the functionality of a specific installed card).

    C. At the Device Manager level (the version of Device Manager that supports PC Cards).

    D. At the BIOS level (built-in BIOS support for PC Cards).

    2. In situations where you have to run your laptop on battery power alone, you want to limit power consumption. One of the measures taken to achieve this is to disable the loading of drivers for PC Cards by the Windows operating system, which saves time when booting the computer. How can I disable PC Card support in Windows?

    A. Open Device Manager and expand PCMCIA Adapters. Then select the PC Card controller and open its properties dialog by double-clicking on the controller. In the properties window, select the General tab and in the Device usage drop-down list at the bottom of the window, select the option This device is not in use (disabled).

    B. Launch the Add Hardware Wizard from the Control Panel, double-click on the PC Card Controller item and in the properties window that opens, select the Disable in this hardware profile checkbox.

    C. Launch the Add/Remove Programs Wizard from the Control Panel, double-click on the PC Card Controller item and in the properties window that opens, select the Disable in this hardware profile checkbox.

    D. In the MMC console, expand the System node, select the PC Card Controller item and select the Disable in this hardware profile check box.

    3. What RAM modules are usually installed in laptop computers?

    A. RIMM modules.

    B. SODIMMs.

    C. PCMCIA modules.

    D. SD modules.

    4. Which PCMCIA slot can accept all types of PC Cards?

    C. Type III.

    5. What is the main difference between desktop and laptop computers? (Choose all correct answers.)

    A. Thermal characteristics of the system.

    B. Electricity consumption level.

    C. Processor operating frequency.

    D. RAM capacity

    6. In what year and which company developed the PCMCIA interface for expanding RAM?

    7. Year of manufacture of the touch screen and operating technology.

    8.What symptoms indicate that the installed memory of one type, but not recommended by the manufacturer, stops working?

    9.What processors are used in laptop computers?

    10. How to properly apply heat-conducting paste between the microprocessor and the heatsink?

    A. In a thin, even layer.

    B. In a thick, even layer.

    C. Along the edges of the heat sink.

    D. Along the edges of the microprocessor heat spreader.

    11. Which aspect is most important when choosing memory to expand your computer's installed memory?

    A. Type and speed of memory already installed.

    B. Microprocessor speed.

    C. Computer front bus frequency.

    D. Maximum memory capacity supported.

    12. Your company sends you to install several computers at a facility located in a region with a dry and hot climate. In summer it is very hot and dry, and in spring and winter there are frequent dust storms. How to install computers in such circumstances?

    13. What conditions are most favorable for the occurrence of electrostatic discharge?

    A. Working on rubber mats.

    B. Use of instrumentation.

    S. Low relative humidity environment.

    D. Moving too close to an active power source.

    14. What is the phenomenon of gradual deterioration called? electrical contact between

    integrated circuit and its socket due to partial exit of the microcircuit from

    A. Rust.

    B. Degradation.

    C. Creeping loss of contact.

    Option 1

    6. Fuel cells are a new source of energy for portable computers. In them, electricity is generated as a result of electrochemical reactions between fuel and oxidizer. Hydrogen is used as fuel. The oxidizing agent is usually oxygen, but can also be chlorine. The by-products of the reaction between fuel and oxidizer are water vapor and heat.

    7. A docking station, or docking port, is a special device into which

    You can insert a laptop computer to expand its functionality. A laptop connected to the docking station can

    work with various stationary devices.

    8. To increase the operating life of a laptop computer, developers are looking for new opportunities in the following areas: developing better batteries; improving the energy-saving characteristics of devices; improving energy management practices.

    9.Wireless network adapter, connection drivers and access point.

    Option 2.

    Port Repeater - These devices contain regular PC ports, such as parallel and serial, which become available to the laptop when the device is connected to it. The purpose of these devices is to allow the user to connect standard, non-portable devices, such as monitors, printers, full-size keyboards, mice and speakers, to a laptop computer.

    7. Power consumption modes:

    Standby mode, which turns off certain computer components, such as the hard drive and monitor, until a system event occurs, such as a key press or mouse movement.

    In suspend mode, power is cut to all system components except memory.

    In sleep mode, or hibernate, the contents of memory are written to disk,

    and the system turns off completely. Upon turning on the system, switched to mode

    hibernation, the memory contents stored on the disk are restored to memory,

    thus restoring the system state before entering hibernation mode.

    8. Power sources for a laptop computer: rechargeable batteries, external power supplies, car batteries.

    9. Ports: USB, serial, parallel, VGA / SVGA, power connector, flash card reader slot, CD / DVD drive. Absolutely any external device that the user needs can be connected to these ports and connectors.

    Option 3.

    1.A ,B

    5.A ,B

    6. In 1989 International Association of Memory Card Manufacturers personal computers developed a PCMCIA interface for expanding RAM.

    7. 1983 - year of manufacture of the touch screen. It is divided using special technology into horizontal and vertical stripes, the intersection of which corresponds to the X and Y coordinates of the screen and the touch on which is detected. This technology is also used for the touchpad of a laptop.

    8. Symptoms indicating that the installed memory of one type, but not recommended by the manufacturer, stops working: the system does not work at all; When loading, error beeps are generated; short-term memory errors occur during operation; During the POST procedure, fewer tested memory cells are displayed than the actual amount of installed memory; The computer freezes when loading the operating system.

    9. Processors used in laptop computers: AMD, Core Duo, intel.

    ≫ How to do computer maintenance yourself? Step-by-step instruction

    Published: May 12, 2015

    Buying a home computer is always a great joy for the whole family. Internet access, access to a huge number variety of information, work, study and leisure - this is only a small part of what a computer can provide us with.
    But quite often it happens that after three or four months, the joy of their owners begins to be overshadowed by problems arising with the PC. The computer suddenly turns off, freezes, the operating system constantly reboots or malfunctions. Most users do not even suspect that some of these problems could have been avoided if they carried out timely maintenance of their “digital friend”, and on their own.

    Reasons for personal computer failure

    • Technical defect. No one is safe from its manifestation. Unfortunately, it is practically impossible to identify it upon purchase, but, as a rule, it appears for the first time during the operation of the device, and very rarely after a few months.
    • Infecting your computer with viruses. All viruses behave differently. Some can sit unnoticed and quietly for years, while the actions of others appear immediately - they can delete files, encrypt them, copy your personal data over the Internet, etc. In any case, this can lead to excessive load on the computer and damage to the operating system and, as a consequence, to fatal errors in its work.
    • Incorrect operation of the software. The problem is due to both the imperfection of the environment for creating software and the mistakes made by programmers during development.
    • Overheating of system unit components. It is this reason for PC failure that is the main reason in the absence of basic, regular maintenance. Overheating of components occurs due to a disruption in the normal cooling of chips; for this reason, cooling components - radiators and fans (“coolers”) gradually become clogged with dust and dirt and cease to function correctly.

    What will be needed for maintenance?

    Despite the apparent complexity, almost any user can perform maintenance. To do this we need simple tools:

    1. Toothpick.
    2. A can of compressed air (available at computer stores) or a vacuum cleaner.

    If you don't have a Phillips head screwdriver, you can purchase one at any hardware store. Ask the sales consultant to show you a screwdriver with which you can unscrew the screws on the system unit and choose from those offered the one that suits you best in terms of ease of use.

    A can of compressed air is also an optional attribute for maintenance if you have a good vacuum cleaner that has a reverse mode. (Such vacuum cleaners not only suck in air, but can also blow it out, creating a directed jet under pressure). The canister performs the same function, the only difference is that its air stream is more powerful than that of a vacuum cleaner, so using it as a blowing device is more preferable.

    Maintenance procedure


    Maintenance frequency

    This maintenance should be performed at least once a month. But if, upon inspection of the system unit, it is discovered that dust accumulations are very large over a month, then the frequency of this operation should be increased.

    Don't be afraid to damage something inside– if you do everything carefully, then the likelihood of damage from dust being sucked in or blown out is zero, but the benefits will be obvious. When the system unit's chips become overheated, not only the chips themselves suffer, but also the connectors in which they are installed or soldered. Constant overheating gradually destroys the structure of the motherboard and the “footprint”, and accordingly, the service life of the device sharply decreases.

    Having performed this operation once, it is easy to make sure that there is nothing difficult about it, and in the future, it will become as commonplace as cleaning dust in your home.