PCHW V Unit - WordPress.com

advertisement
Unit – IV - Installation and Preventive Maintenance
Introduction – system configuration – pre installation planning – Installation practice – routine
checks – PC Assembling and integration – BIOS setup – Engineering versions and compatibility
– preventive maintenance – DOS – Virus – Data Recovery
1. List the applications for special system configuration.

DTP

CAD, CAM

Supermarket

Games

Image Processing

Voice Reorganization

Process control

Network Server

Bank

Data Center
2. List the hardware items for common applications.

Scanner, Laser Printers

Plotter

High Resolution display

Joy stick

CD-ROM, DVD-ROM

Digital Camera

Microphone

Bar code Reader
3. What are the aspects that the user should consider while buying a computer product?
 Hardware and modules used
 Manufacturing quality/reliability
 Ease of maintainability and product engineering
 Upgradeability provision
 Warranty duration
1
Probability of failure
4. Draw the Bath Tub Curve for Product life time.
Infant
Mortality
(25 Weeks)
Product Life
(25 Years)
Wear & Tear
Period
5. What are the factors to be considered while choosing hardware modules?

Performance level required: low, medium, high

Type of usage: light, medium, heavy

Nature of application: personal, commercial, govt service

Criticality of system application: low, high

Location of site: rural, urban

Product engineering: industry standard, non-standard
6. List the different levels of hardware configuration.
S.No
1
2
3
4
5
6
7
8
Hardware Item
Processor Type
Processor Clock
RAM Capacity
HDD Type
HDD Capacity
Monitor Size
Power Supply
CD-ROM drive
Entry Level
Celeron
900 MHz
128 MB
IDE
20 GB
14 Inch
250 Watts
48X
Mid Level
Pentium III
1.2 GHz
128 MB
IDE
40 GB
15 Inch
250 Watts
52X
High Level
Pentium 4 in FRC
2.4 GHz
3 GB
SCSI
40 GB
17 Inch
300 Watts
52X
7. What is the advantage of using AC stabilizer?
All PCs have SMPS with built-in ac input stabilizer. However, if the ac input supply is
too bad to be managed by the PC, an external AC stabilizer is essential. The use of a
stabilizer is essential if you have a hard disk in the system. If a UPS is installed, the built-in
stabilizer in the UPS handles the voltage fluctuations.
2
8. What are the requirements are need in pre-installation planning?

Placement / Site Selection

Air Conditioning

AC Power Interference

AC Stabilizer

Power Supply Capacity
9. Do we need to air condition the room wherein the PC is kept?
The necessary of air condition depends on the environment. The PC has a built-in cooling
arrangement which is sufficient in general. But if the user operating the PC in a very hot
environment, user should provide for external cooling of the room. A simple window air
conditioner is sufficient.
10. List some of the PC SMPS ratings.
PC Model
SMPS Wattage
PC-8088
63.5 W
PC/XT
130 W
AT-286
192 W
Celeron PC
200 W
Pentium III PC
250 W
Pentium IV PC
300 W
11. What are the abnormal aspects / defects in the PC after unpacking?
After unpacking the PC, carry out a through visual check to detect any of the following
abnormal aspects / defects:

Loose connection

Incorrect setting of DIP switches

Broken wire or cables

Loose Screws

Missing Screws

Wrong Connection

Missing Jumpers

Physical Damage to cabinet or peripherals
3
12. Why hard disk drive is shipped by the manufacturer with a ‘tie-down’?
The hard disk drive is shipped by the manufacturer with a ‘tie-down’ pin or clip on the
positioning mechanism to prevent movement of the heads during transport.
13. Write short notes on Pre-shipment burn.
In order to minimize the chances of problems with a new PC soon after you get it home, it's a
good idea to have the PC tested before shipment. This is sometimes called a "burn-in" test,
and is done to pre-screen systems to weed out bad components. Since most component
failures occur very quickly, running tests on a system for 24 hours or so can eliminate some
common faults. Obviously, it is to everyone's advantage if a problem is discovered before the
PC is delivered to the customer rather than afterwards.
14. What are essential steps to remove a motherboard?

Switch off the system, monitor and printer

Remove all daughterboard’s

Remove the keyboard connector from the rear side of the system box

Remove the SMPS power connectors from the system board

Remove the front h panel connector

Remove all I/O Connectors

Remove FDDs and HDDs

Remove screws and the rubber washers on the motherboard

Lift the motherboard gently and take it out of the system box
15. What are the routine checks should follow by the engineer?

FDD Jumper: Drive Select

FDD Cable: Twist

FDD Terminator

Memory Jumpers

Cable Connectors Orientation

Processor Heat sink / Cooling Fan
16. What are the advantages in assembling a PC?
 Saving money
 Choosing exact configuration
4
 Gaining expertise which will be useful when the system fails
 Ease of future up gradation
17. What are the steps involved in motherboard stuffing?
 Installing socket processor: The Pentium 4 motherboard uses a processor socket such as
socket 423. Pull the locking lever away from the socket, then raise the lever to a 90degree angle. Place the processor gently into the socket matching the pin no. 1 on the
socket and the processor chip without applying force.
 Installing the processor cooling fan: The Pentium 4 comes with a specific fan. Open the
levers of the retention mechanism. Place the fan into the retention mechanism. Close the
levers.
 Installing Slot-1 processor: The slot-1 in the motherboard has a cartridge holder. While
shipping the motherboard, the upright struts are put in folded down position. Pull them up
and make them in upright position. Insert the processor cartridge into the cartridge holder.
 Memory modules: hold the DIMM above the DIMM socket and align the two modules
in the bottom edges of the DIMM with the two keys in the socket. Insert the bottom edge
of the memory module into the socket.
18. List the PC Assembling sequence.

System box preparation

Motherboard stuffing

Motherboard Installation

IDE Drives Preparation

Drive Installation

Daughterboard’s Installation

Cables Connection

Power Connections

BIOS Setup

Loading Software: Operating System and Special I/O Drivers
19. What are the softwares items needed to assemble a PC?

Operating system (to be purchased separately)

Motherboard drivers (Come on a CD with motherboard)

Device Drivers (Come with devices)
5
20. What are the basic tools need to assemble a PC?

Philips Screwdriver

Flat Screwdriver

Pliers (need nose)

Marker Pen
21. Write short notes on Motherboard installation.
Mount the motherboard into the cabinet using the original screws with a Phillips headed
screwdriver. Gently place the board inside the cabinet adjusting such that the mounting holes
on the motherboard are in alignment with the holes on the cabinet. Fix the motherboard by
screwing in the mounting screws.
22. What are a BIOS setup and a standard CMOS setup?
 The BIOS has a setup utility program for specifying the system configurations and
settings. When u switch on the system, the BIOS gets control and it starts POST.
 “Standard CMOS setup” option enables you to enter some basic hardware configurations
and set the system clock and error handling.
23. What are the hard disk drive specifications? Or Define Type User.
If the hard disk drive is a special one, user can use “Type User” to define the drive
specifications manually. If user selects Type User, relevant data has been entered for the
following items:
CYLS
number of cylinders
HEAD
number of read/write heads
PRECOMP
write precompensation cylinder
LANDZ
landing zone cylinder
SECTOR
number of sectors
SIZE
capacity (displayed according to the configuration)
MODE
access mode: Auto
Normal (HD<528 MB)
Large (for MS-DOS only)
LBA (HD>528 MB and supports logical block addressing)
6
24. What is a swap floppy drive?
This item allows you to enable to Swap floppy drive or not. When enabled, the BIOS swaps
floppy drive assignments so that drive A becomes drive B, and drive B becomes drive A.
25. Write the date format in Standard CMOS setup.
The date format is:
Day: Sun to sat (Display only; calculated by BIOS)
Month: 1 to 12
Data: 01 to 31
Tear: 1901 to 2099 (set by user)
26. Write the time format in Standard CMOS setup.
Time: to set the time, highlight the “Time” field and use the <PgUp> / PgDn> or + / keys to set the current time.
The Time format is:
Hour: 00 to 23
Minute: 00 to 59
Second: 00 to 59
27. List the Hard disk drive access modes.
The Hard disk access modes are:

Auto mode

Normal mode (HD < 528 MB)

Large mode (for MS-DOS only)

LBA ( HD>528MB & Supports Logical Block Addressing)
28. What are the types of Video display adapter?

CGA

MDA

EGA

VGA

SEGA

SVGA

PGA
7
29. List some of features in Advanced BIOS setup.

Virus warning

CPU internal Cache

External Cache

Boot sequence

Swap floppy drive

Boot Up Floppy Drive
30. What is virus warning in BIOS Setup?
The virus warning feature protects the boot sector and partition table of the hard disk
against overwriting. If any write attempt is made, the BIOS halt the system and displays a
warning message so that user can either allow the operation to continue or run an anti-virus
program to locate and remove the virus.
31. What is a boot up floppy seek?
When enabled, the BIOS will give a seek command to floppy drive A before booting the
system. It can find out whether the floppy drive installed has 40 or 80 tracks. The 360K FDD
has 40 tracks where as 760K, 1.2M and 1.44M FDD’s have 80 tracks.
32. What is a boot up numlock status?
This allows you to enable or disable the numlock function during boot up as per your
personal taste. If set to ‘on’, it turns on numlock key when the system is powered on. If set to
‘off’, it turns off the numlock key so that you can see the arrows on both the numeric keypad
and the main keyboard.
33. What do you meant by Gate A20 option?
This option is related to ‘High Memory Area’ (HMA). It controls the use of A20 address
bit. The A20 gate signal is generated by the keyboard controller logic (8042/8742) and RAM
access above 1MB is handled through it.
34. What is a PCI/VGA palette snoop?
Some non standard VGA display adapters may not show colours properly. This field
allows you to set whether MPEG ISA/VESA VGA cards can work with PCI/VGA or not.
8
When this field is enabled, a PCA/VGA can work with a MPEG ISA/VESA VGA card.
When disabled, a PCI/VGA cannot work with a MPEG ISA/VESA card.
35. Define Typematic Rate & Typematic Delay.

Typematic Rate: The speed of repetition ranging from 6 to 30 characters per second.

Typematic Delay: Initial tine interval before starting the repetition. Typically 500
msec.
36. What is video BIOS shadow?
The video BIOS Shadow allows changing the video BIOS area from ROM to RAM after
copying. Video BIOS shadowing increases the video speed: But may cause problems while
running some operating systems or applications.
37. List some of the advanced chipset features setup?
 DRAM cycle time selection: this field sets the DRAM cycle time. The common options
are 6ns and 70ns.
 MA wait state: this field fixes the wait state of the memory address. The settings are fast
and slow.
 CPU to PCI IDE posting: when enabled, the CPU to PCI IDE posting cycles are treated
as normal I/O write transactions.
 System BIOS cache: when enabled, access to the system BIOS ROM addressed at F0000
– FFFFF are cached to RAM for faster execution.
38. What is meant by 8 bit I/O recovery time?
This option specifies the length of the delay in sysclks inserted between consecutive 8-bit
I/O operations. The settings are 1,2,3,4,5,6,7 or 8.
39. What is meant by16 bit I/O recovery time?
This option specifies the length of the delay in sysclks inserted between consecutive 16bit I/O operations. The settings are 1,2,3,4,5,6,7 or 8.
40. What is the usage of passive release?
When enabled, CPU to PCI bus access are allowed during passive release. Otherwise the
arbiter only accepts another PCI MASTER access to local DRAM.
9
41. What is a delayed transaction?
The chipset has an embedded 32 bit posted write buffer to support delay transactions
cycles. Select enabled to support compliance with PCI specification version 2.1.
42. What is an AGP aperture size?
The field sets aperture size of the graphics. The aperture is a portion of PCI memory
address range dedicated for graphics memory address space. Host cycles that hit the aperture
range are forwarded to the AGP without any transaction. The options available are 4MB, 8M,
16M, 32M, 64M, 128M and 256M.
43. What is SDRAM RAS-to-CAS delay?
This field is used to insert a timing delay between the CAS and RAS strobe signals, used
when DRAM is written to, read from, or refreshed. Fast gives faster performance, and slow
gives more stable performance.
44. What is SDRAM RAS pre-charge time?
If an insufficient number of cycles are allowed for the RAS to accumulate its charge
before DRAM refresh, the refresh may be incomplete and the DRAM may fail to retain data.
Fast gives faster performance, and slow gives more stable performance.
45. What is CAS latency time?
When synchronous DRAM is installed, the number of clock cycles of CAS latency
depends on the DRAM timing. Do not change this field from the default value specified by
the system designer.
46. What are the four selections for power management?
 Disabled: No power management
 Min.Power Saving: Minimum power management
 Max.Power Saving: Maximum power management. Only available - for SL CPU.
 User Define: Each of the ranges are from 1 min. To 1 hr.: Except for HDD Power Down
which ranges from 1 min. To 15 min. (default)
47. What is Video Off method?
This field defines the video off features. There are three options.
10
 V\H SYNC+ Blank: blank the screen and turn off vertical and horizontal scanning.
 DPMS: Allows the BIOS to control the video display card if it supports the DPMS
features.
 Blank Screen: This option only writes blanks to the video buffer.
48. What is video off after?
As the system moves from lesser to greater saving modes, select the mode in which you
want the monitor to blank.
49. How is the modem use IRQ?
This field names interrupt request (IRQ) line assigned to the modem (if any) on your
system. Activity of the selected IRQ always awakens the system.
50. What is Doze Mode?
When enabled, and after the specified time of system inactivity, the CPU clock will run at
a slower speed while all other devices still operate at full speed.
51. What is Standby mode?
After the specified period of system inactivity, the hard disk drive and the video shut off
all other devices still operate at full speed.
52. What is suspend mode?
When enabled, and after the specified time of the system inactivity, all the devices except
the CPU will be shut off.
53. What is HDD Power Down?
When enabled, and after the specified time of system inactivity, the hard disk will be
powered down while all other devices remain active.
54. What is throttle Duty cycle?
When the system enters Doze mode, the CPU clock runs only part of the time. You may
select the percent of time that the clock runs. It is called as throttle Duty Cycle.
55. What is IRQ 8 break suspend?
Either by using enable or disable monitoring of IRQ8 (the Real Time Clock), it does not
awaken the system from Suspend Mode.
11
56. What are integrated peripherals?
The integrated peripherals option in CMOS setup sets the hard disk configuration, mode &
port. Some of the utilities in this section are:

IDE HDD Block mode

IDE Primary Master PIO

IDE Primary Slave PIO

IDE Secondary master PIO

IDE Secondary Slave PIO
57. What is soft off by PWR BTTN?
This field defines the power off mode when using an ATX power supply. The instant off
mode allows powering off immediately upon pressing the power button. In the Delay 4 Sec
mode, the system powers off when the power button is pressed for more than four seconds or
places the system in a very low usage state with only enough circuitry receiving power to
detect power button activity or Resume by Ring activity when pressed for less than 4
seconds.
58. What is onboard FDC controller?
Select enabled to use the floppy disk controller (FDC) on the system board. If you install
a FDC option daughterboard or if the system has no floppy drive, select disabled in this field.
This option allows selection of the onboard FDD port.
59. What is the usage of onboard serial/parallel port?
These fields allow you to select the onboard serial and parallel ports and their address.
The default values for these ports are
Serial port 1
3F8/IRQ4
Serial port 2
2F8/IRQ3
Parallel port
378/IRQ7
60. What are the functions of parallel port mode?
This field determines parallel port mode function
SPP
Standard (Centronics) printer port
EPP
Enhanced parallel port
ECP
extended capabilities port
12
61. Define Supervisor / User Password.
Supervisor Password: The supervisor password sets a password that will be used to protect
the system and setup utility.
User Password: User password sets a password that will be used exclusively on the system.
62. Write short notes on Preventive maintenance.
Preventive maintenance steps are prescribed by the manufacturer should be done periodically
using appropriate materials in PC. One of the essential PM procedures is cleaning dust prone
parts. This has to be done carefully by trained personnel.
63. What are general problem sources on PC?
The general problem sources are:

Dust

High Temperature

Electrical noise / Interference

Magnetic fields

Corrosion

Power fluctuations
64. List some general precautions for PC maintenance.

Switch off the monitor, system unit and printer before switching off the system

Before removing a board or peripheral, remove all the cables, connectors and screws
connected to it.

Power off the PC and the peripherals before doing any of the following activities:

Remove or inserting a PCB

Removing or plugging a cable

Connecting or disconnecting any peripherals
65. What are the two basic things that an OS does?
 Manage the hardware resources of the computer for efficient utilization
 Provides user interface, i.e., receives commands from the user, acts on them, and gives
out error messages.
13
66. List the types of operating system.
Operating system can be classified as follows:
Single user system:
The single user system runs one user program at a time, supports only one user at a time.
Example: MS-DOS
Multi user system:
The multi user system permits several user programs to be executed concurrently. A multi
user operating system takes care of switching CPU among the various programs
Example: UNIX, Window 98, etc.,
67. How class the nucleus of MS-DOS is made of?
IO.SYS
MSDOS.SYS
COMMAND.COM
In PC DOS, the first two files are called as IBMBIO.COM and IBMDOS.COM respectively.
68. Explain IO.SYS file.
This file contains extensions to the ROM BIOS. These extensions include correction to
the existing ROM BIOS routines and new routines for newer peripheral devices. ROM BIOS
routines and IO.SYS routines are the lowest level systems software available, that performs
the most fundamental and basic I/O operations.
69. Explain MSDOS.SYS.
This file contains I/O routines that do higher level I/O operations. These routines are
more sophisticated and thus occupy the next level up. They provide the user programs more
comfortable and simple handling of I/O operations than the ROM BIOS routines. Programs
normally call these routines which in turn may call routines in the IO.SYS file and the ROM
BIOS.
70. Explain DOS internal commands.
A command is usually a request to execute a program. Our programs are mostly stored on
disks as distinct disk files. However, not all command programs are kept in separate disk
files. Some of the most important and frequently used command programs are inside
14
COMMAND.COM itself. These are called INTERNAL COMMANDS. To carry out these
commands, it is not necessary to read a program file from disk.
71. Define Command.com.
Command.com is a program with which the user interacts. It provides user interface, and
is called the command processor. It contains routines that interrupt the command typed in the
command mode. It accepts and acts on commands given by the user. Commands are nothing
but requests for execution of a program.
72. Explain DOS external commands.
These are programs that are stored on disks as separate disk files. They are of 3 types
 EXE files
 COM files
 BAT files
While COM and EXE files are programs, a batch file is a text file that contains a number of
conventional program commands. By entering a single command (the batch file’s name),
DOS’s command processor is asked to carry out all the commands inside the batch file.
73. Give the name of some internal commands in DOS.

CLS: To clear the screen

DIR: List the files in directory

DEL: To delete the files

COPY: To copy the file contents from source to target.

DATE: To Display the system date

Type filename: To display the file contents
74. Give the name of some external commands in DOS.

Format Drive: To format a specified drive

FDISK: Configure the hard disk for use

LABEL: Assigns a new volume label to disk

DISKCOPY: Copies the contents of the floppy disk

Backup: Back up one or more files from one disk or another

Restore: Restore one or more backup files from a disk to another disk
15
75. Describe special files in DOS.
The special files contain special configuration commands that are used to configure the
system. Each time when the DOS starts up, it searches the root directory of the drive it was
started from, for the file named CONFIG.SYS (The Configuration file).
76. What are the commands used in AUTOEXEC.BAT?
The following are the two commands that will be useful if included in the
AUTOEXEC.BAT file:

path[(d:)path(;(d:)path)..): Allows user to instruct DOS to search in the specified
directories, when it does not find the command user have entered, in the current directory.

prompt(prompt-text): Allows user to set a new DOS prompt. User can make the DOS
prompt include the time, the date the current directory of the default drive, etc.
77. Explain files area in DOS?
The files area occupies the greater portion of the disk space, and is used to store files, and
sub-directories. The files area is divided into smaller units called clusters. A cluster is one or
more consecutive sectors, and the number of sectors in a cluster depends on the disk format.
DOS allocates clusters to a file, one cluster at a time, as and when needed. When a file needs
more space, DOS allocates one or more cluster to it.
78. Draw the Logical organization of Disk.
Boot Record
FAT
Root Dir.
Data Area
System Area
79. Explain system area in DOS.
The system area is divided into three separate areas, namely the boot record, the FAT File
Allocation Table, and the root directory. The size of each area varies among different
formats, but the order of these areas does not change.
16
80. Explain boot record in DOS.
The boot record is the very first sector on the disk. It contains a small program that begins
the process of loading DOS from the disk into the computer’s memory. This program finds
out if the disk is system-formatted by looking for the two DOS system files names in the first
two entries in the root directory. If it does not find them, it gives a error message: Nonsystem diskette.
81. Explain FAT in DOS.
The File Allocation Table gives an account of how the disk space in the files area is used.
Space used for files, space that is not in use, and space that cannot be used due to defects.
DOS maintains two identical copies of FAT.
It is organized as follows. It has an entry for every cluster in the files area. The first two
entries contain a media descriptor value which indicates the format of the disk. The
remaining entries are used to link together the different parts of life. The FAT entry for the
each cluster in a file holds the number of the next cluster.
82. What is a root directory?
The root directory is the next item and is used as a table of contents. Each file on the disk
has a 32 byte entry in it, which contains the name of the file, file name extension, size of the
file, the time and date it was last modified and the starting cluster number. For a given disk
format, the size of the root directory is fixed, and consequently the number of files that could
be placed in the root directory is fixed.
83. Draw the FAT organization.
DIR
NOTES
FAT
TXT
0003
0005
3
0007
4
5
17
EOF
6
7
84. What are the parts of a directory and how much size does each part occupy?
Filename
8 bytes
Filename extension
3 bytes
Attribute
1 byte
Reserved (zeroes)
10 bytes
Time
2 bytes
Date
2 bytes
Starting cluster no
2 bytes
File size
4 bytes
85. Define Load BIOS Defaults & Load Setup Defaults.
Load BIOS Defaults: This option allows user to load the troubleshooting default values
stored in the BIOS ROM. These default settings may not be optimal and disable all high
performance features.
Load setup defaults: This option allow user to load the default values to their system
configuration. These default settings are optimal and enable high performance features.
86. What are the commands used to recover the files?
The commands used to recover the files are:

Undelete

Un-format
87. Explain DOS versions.
MS DOS 3.2 is most suitable for small PCs with 640 KB RAM. This is because of the
small amount of RAM the operating system occupies thereby facilitating more RAM for
application programs.
MS DOS 4.0 incorporates support beyond 32 MB HDD which
previously was DOS limitation requiring third party software like disk manager for
partitioning into smaller logical disks.
88. What is a virus?
A computer virus is a software program which has the ability to attach itself or infect
other programs as well as replicate itself without the PC user’s knowledge.
18
89. What is data recovery?
Data recovery is the process of salvaging data from damaged, failed, corrupted, or
inaccessible secondary storage media when it cannot be accessed normally. Often the data are
being salvaged from storage media such as hard disk drives, storage tapes, CDs, DVDs,
RAID, and other electronics. Recovery may be required due to physical damage to the
storage device or logical damage to the file system that prevents it from being mounted by the
host operating system.
90. List some of the virus actions?
 Most viruses tend to fill up the hard disk with useless data. A virus reproduces, and every
copy of the virus takes up valuable space .
 Scramble the File Allocation Table. Any overwrite to the FAT will cause data to be
irrecoverable lost.
 Wipe out the boot sector or partition table which contain system information. If these
areas are altered, your computer may not function or the infected disk may become
unusable.
 Change data in programs or files and cause erratic results.
91. What are the types of viruses?
There are two types of viruses
 Boot virus: Boot block viruses are those that infect the partition sector or the boot sector
of diskettes. Such viruses gain entry into the system only when booted from an infected
disk. On booting from an infected disk, these viruses get activated and infect the hard disk
by writing its code on the boot sector or partition table.
 File virus: file viruses infect executable files such as .COM, .EXE or overlays such as
.SYS, BIN, .OVR, etc. They infect the files by appending their own code to the
executable files and become active, whenever an attempt is made to execute the file. Due
to this, the infected file grows in size and the date and time will be modified.
92. What is vaccine?
A vaccine is a unique software solution that helps you in the war against the dreaded
computer viruses, present and future. Several products are available in the market. A trial
version copy of VX2000 plus, a popular antivirus tool is included in the CD which may be
upgraded from the developer.
19
93. What a vaccine does?
 Detection: Some vaccine provide a utility that is memory resident. This will indicate the
presence of a virus on the disk being used. Such a utility mostly does not occupy much
space in the RAM.
 Removal: Vaccines provide the facility to kill the viruses that are detected.
 Immunization: Some vaccines provide immunization for floppy diskettes from further
viral attacks. Immunization is possible in some cases only.
94. What are the third party data recovery tools?
There are several data recovery tools available from third party software companies.
EX:

Norton utilities

PC tools

Mace utilities

Some of the features provided by these tools are now also incorporated into DOS.
95. Explain the two important tools in Norton utility.
 Disk tool: This is a utility developed by Peter Norton Computing Inc. This is an easy to
use menu driven software. To run it, type disk tool at the DOS prompt.
 Norton Disk Doctor: To run it type NDD at the DOS prompt.
96. Draw the block diagram of DOS memory map
00000
Interrupt vector table
Dos & BIOS data area
IO.SYS
MS DOS SYS
Device drivers
Initialization portion of
COMMAND.COM
User program area
9FFFF
Transient portion of
COMMAND.COM
20
640k
97. What are the steps to be taken on finding a virus?

Switch off the computer system to ensure that the virus in the memory does not spread
any more.

Confirm if the problem is actually because of the virus. It could be hardware or other
software related problem.

Boot from a clean write-protected floppy diskette.

Check your system for extent of infection and repair or delete all the infected files.
98. What are the precautions to be taken against virus?

Switch off the preview feature in your email browser

Do not open attachments if you are not expecting them

Get and use an anti virus scan program

Backup critical data on a regular basis

Avoid Bootleg or Pirated Software

Treat Floppy Disks and CDs With Suspicion

Check System Requirements.

Scan All Drives.

Update Often.
99. List the Advantages of DOS5.0.
In early DOS versions had insufficient memory area. DOS5.0 can make use of the following
memory areas.
100.

High memory area(HMA)

Extended memory

Emulated expanded memory

Upper memory Blocks(UMBs)
List the floppy disk format in physical dimensions.
Physical Dimensions
Physical size
Slides
Track Density
Tracks per Side
Sectors / Track
Total Sectors
360KB (DSDD)
5.25”
2
48
40
9
720
1.2MB (DSHD)
5.25”
2
96
80
15
2400
21
720K (DSDD)
3.5”
2
135
80
9
1440
1.44MB (DSHD)
3.5”
2
135
80
18
2880
101.
List the floppy disk format in logical dimensions.
LogicalDimensions
Overhead Sectors
 Boot Program
 FAT
 DIR
 Total
Actual Data Space
Sectors / Cluster
Total no. of Cluster in
Space
Cluster no. Range
Dir Entries
102.
360KB (DSDD)
1.2MB (DSHD)
720K (DSDD)
1.44MB (DSHD)
1
4
7
12
708
2
354
1
14
14
29
2371
1
2371
1
6
7
14
1426
2
713
1
18
14
33
2847
1
2847
2-355
112
2-2372
224
2-714
112
2-2848
224
What is the use of HMA?
The high memory area (HMA) is the RAM area consisting of the first 64 kibibytes
(KiB), minus 16 bytes, of the extended memory on an IBM PC or compatible
microcomputer.
103.
What is UMBs?
Upper memory area (UMA) refers to memory between the addresses of 640 KB and
1024 KB (0xA0000–)0xFFFFF) in an IBM PC or compatible. IBM reserved the
uppermost 384 KB of the 8088 CPU's 1024 KB address space for ROM, RAM on
peripherals, and memory-mapped input/output. For example, the monochrome video
memory area runs from 704 to 736 KB (0xB0000–B7FFF).
However, even with video RAM, the ROM BIOS and I/O ports for expansion cards,
much of this 384 KB of address space was unused. As the 640 KB memory restriction
became ever more of an obstacle, techniques were found to fill the empty areas with
RAM. These areas were referred to as upper memory blocks (UMBs).
104.
What is UMA?
Upper memory area (UMA) refers to memory between the addresses of 640 KB and
1024 KB (0xA0000–)0xFFFFF) in an IBM PC or compatible. IBM reserved the
uppermost 384 KB of the 8088 CPU's 1024 KB address space for ROM, RAM on
peripherals, and memory-mapped input/output. For example, the monochrome video
memory area runs from 704 to 736 KB (0xB0000–B7FFF).
22
105.
Draw the diagram for extended memory in DOS.
00000
640K
Conventional RAM
9FFFF
FE000
FFFFFF
100000
BIOS ROM
HMA
10FFFFF
Extended Memory
106.
Define sub directory.
A sub directory also is a table, with entries similar to the root directory. As the
disk could hold a large number of files belonging to different users, it is wise not to
represent all the files in the Root directory. Instead group of files can be representing in
different sub-directories.
`
23
Pre-installation Planning
Answer Key
 Placement / Site Selection
 Air Conditioning
 AC Power Interference
 AC Stabilizer
 Power Supply Capacity
 Typical PC SMPS Ratings
Installation practice
Answer Key
 Unpacking and Checking
 Removing a Motherboard
 Removing and Replacing Daughterboard
 Removing FDD
 Mounting FDD
Routine Checks
Answer Key
 FDD Jumper: Drive Select
 FDD Cable: Twist
 FDD Terminator
 Memory Jumpers
 Cable Connectors Orientation
 Processor Heat sink / Cooling Fan
PC Assembling & Integration
Answer Key
 Advantages of Assembling

Saving Money

Choosing Exact Configuration

Gaining expertise which will be useful when the system fails
24

Ease of future up-gradation
 Assembling Preparatory steps

Collecting Hardware and Software Modules

Collecting Tools

Choosing a non metallic surface work area and moisture free environment
 Caution
 Bill of Materials
 Assembling Sequence

System box preparation

Motherboard Stuffing

Motherboard installation

IDE Drives Preparation

Drive Installation

Daughterboard Installation

Cables Connection

Power Connection

Power Connection

BIOS Setup

Loading Software: Operating System and Special I/O Drivers
Preventive Maintenance
Answer Key
 Definition
 Peripherals – PM Types
 Problem Causes

Problem Sources

Dust

High Temperature

Electrical noise / Interference

Magnetic Fields

Corrosion
25

Power Fluctuations

Improper Handling
 Problem sources, Effects and PM Actions
 Peripherals

Keyboard

Printers
 General Precautions
Disk Operating System
Answer Key
 Definition

Single User OS

Multi user OS
 Anatomy of DOS
 Nucleus of the MS-DOS

IO.SYS

MSDOS.SYS

COMMAND.COM
 The Command Processor

Working of COMMAND.COM

Internal Commands

CLS

DIR

DEL Filename

COPY Source Target

DATE

TIME

TYPE Filename

VER

VOL

MKDIR Path

RMDIR Path
26

External Commands

FORMAT Drive

FDISK

LABEL

CHKDSK Drive

MODE Device

Print Command

Backup Command

Restore Command
 Special Files

CONFIG.SYS

AUTOEXEC.BAT
 Hoe DOS gets Control
DOS: Resource Manager
Answer Key
 Floppy Diskette

Physical organization

Logical Organization of the Disk Space
 Files Area
 System Area
 Boot Record
 File Allocation Table
 Root Directory
 How DOS creates, Reads or deletes a file
 Sub-Directory
DOS 5 & DOS 6 advanced features
Answer Key
 HMA, Extended Memory and UMBs
 What is the use of HMA and UMBs?
27
Virus
Answer Key
 Definition
 Virus: Types

Boot Virus

The File Virus
 Vaccine: The Cure

Detection

Removal

Immunization
 Precautions to be taken against virus
 Steps to be taken against a virus
Data Recovery
Answer Key
 Definition
 Data Recovery tools from DOS

UNDELETE

UNFORMAT
 Third Party Data Recovery Tools

Norton Utilities


Disk tool

Make a Disk Bootable

Recover from DOS’s Recover

Revive of a Defective Diskette

Mark a Cluster

Create Rescue Diskette

Restore Rescue Diskette
Norton Disk Doctor

Diagnose Disk

Common Solutions


Make a Disk Bootable

Recover from DOS’s Recover

Revive of a Defective Diskette
Exit Disk Doctor
28
Download