Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
605 views20 pages

CHM - Unit-6: Assembly of Desktop Computers

The document provides instructions for assembling a desktop computer. It outlines the key components needed, including the processor, motherboard, RAM, hard drive or SSD, power supply, case, graphics card, and cooling system. It describes how to properly ground yourself to prevent electrostatic discharge, open the computer case, install the power supply, connect the CPU to the motherboard, install RAM, install the motherboard, and connect case connectors. It further details how to install the hard drive, connect the power supply to components, finish assembly, provide power, connect display and input devices. Proper configuration is key to ensuring the computer functions properly without issues.

Uploaded by

sudeepta sarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
0% found this document useful (0 votes)
605 views20 pages

CHM - Unit-6: Assembly of Desktop Computers

The document provides instructions for assembling a desktop computer. It outlines the key components needed, including the processor, motherboard, RAM, hard drive or SSD, power supply, case, graphics card, and cooling system. It describes how to properly ground yourself to prevent electrostatic discharge, open the computer case, install the power supply, connect the CPU to the motherboard, install RAM, install the motherboard, and connect case connectors. It further details how to install the hard drive, connect the power supply to components, finish assembly, provide power, connect display and input devices. Proper configuration is key to ensuring the computer functions properly without issues.

Uploaded by

sudeepta sarkar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
You are on page 1/ 20

CHM_UNIT-6

Assembly of Desktop Computers

1. Planning Your Computer: This is a key factor that effects the selection of a computer. Before buying any
computers, you'll need to know what you plan on using the computer for.

2. Components need to buy: Processor, Motherboard, RAM, Hard Drive or SSD, Power, Case, Graphics Card
(optional), Cooling system

3. Ground yourself: Use an antistatic wrist-strap cable to prevent electrostatic discharge (ESD) which can be
deadly to computer electronics. Alternatively, touch a large metal body like a radiator to discharge yourself.

4. Open the case: Unscrew the side panel (or slide it toward the back of the case) to do so.

5. Install the power supply. Some cases come with the power supply already installed, while others will require
you to purchase the power supply separately and install it yourself. Make sure that the power supply is installed
in the correct orientation, and that nothing is blocking the power supply's fan

6. Connect the CPU to the Mother Board: Attach the processor to the motherboard by finding the processor port
on the motherboard's surface. An indicator on CPU and motherboard will show you the correct orientation. Apply
thermal paste to the processor if necessary and attach the heat sink with cooler on top of the CPU.

7. Connect RAM: Attach the RAM to the motherboard by finding the RAM slots and inserting the RAM
appropriately (they should only fit one way).

8. Install the motherboard: Once the standoffs are installed, place the motherboard in the case and push it up
against the back plate. All of the back ports should fit into the holes in the I/O back plate. Use the screws provided
to secure the motherboard to the standoffs through the shielded screw holes on the motherboard.

1
9. Plug in the case connectors. These are likely to be located on the motherboard near the front of the case. The
order in which these are connected will depend on manufacturer. So the Mother Board manual must be followed
while connecting these ports.

Make sure that you connect the USB ports, the Power and Reset switches, the LED power and hard drive lights,
and the audio cable.

There is typically only one way that these connectors can attach to the motherboard. Don’t try to force anything
to fit.

10 Install your hard drive. This process will vary slightly depending on your case, but should typically go as
follows:

 Remove any front panels on the case (if you're installing an optical drive, you will usually install it near
the top of the case).
 Insert the hard drive into its slot (usually near the middle of the case from inside only).
 Tighten any screws needed to hold the drive in place.
 Plug the hard drive's SATA/PATA cable into the SATA/PATA (IDE PORT) port on the motherboard.

11. Connect the power supply to any necessary components. Make sure that Power Supply must be connected
to Motherboard, Hard drive or SSD, Optical drive and other components if necessary.

12. Finish your computer assembly: Once you've placed and connected the various internal components for your
computer and connected various cables including power supply and data cable, the installation is finished and
close the cover of the case and tighten the screw properly.

13. Provide Power Supply: Connect one end of a power supply cable to SMPS and the other end is plug into a
wall outlet power supply and switch on the computer.

14. Connect Display Unit: Connect a LCD or a CRT monitor to the computer using a VGA cable and provide power
supply to the monitor.

15. Connect Key Board and Mic: Connect Key Board and Mice to the computer properly using back panel ports
and also connect other I/O devices if necessary.

If everything is connected properly than the computer will start functioning properly without any problem.

Configuring Laptops and Power settings


When purchasing a laptop directly from a manufacturer, such as Dell, Lenovo or HP, you often have the option
to configure your system with your choice of CPU, screen, memory, storage and other key components. Here's a
summarized version of our laptop buying guide that breaks down all the different components.

CPU: Go for Core i5


When it comes down to choose a CPU, you should choose a CPU for the best balance of performance and price
and the best one is CORE i5. For budget laptops, a Core i3 chip will provide remarkably better performance than
a Pentium or Celeron.

2
RAM: Roll with 8GB
It has been already tested that a 8GB of RAM has a good multitasking and high productivity facility. More the
RAM size greater the performance of the laptop. Hardcore multitaskers and gamers will benefit from 16GB.

Storage: 256GB SSD or better


If possible, a solid-state drive (SSD) is preferred rather than a hard drive, because the SSD offers a much faster,
more responsive system. If you don't need to keep a lot of media files or PC games on your storage drive, you
can use a 256GB SSD, rather than a more-expensive 512GB model.

Screen: At Least 1920 x 1080 resolution


A full 66 percent of consumer laptops come with low-resolution screens, most of which are 1366 x 768 pixels. At
that resolution, you'll have to do a ton of scrolling and window switching, because you can't fit much text on the
display at once and can't stack full windows side by side. So the display screen should not be less than 1920 x
1080 (1080p) resolution for HD performance.

Battery: Bigger is better


The battery type of a laptop is a great issue. Other than the business model most of the laptop comes with low
power battery type. If the battery power is more the laptop will function more hours compare to low power
battery.

Wi-Fi Card: 2x2 is better


In a laptop Wi-Fi is highly essential. Now all the laptops have 802.11ac Wi-Fi, which is the current standard of Wi-
Fi. If a card is labeled as 2x2, it has two antennas, each of which can carry its own data stream. On a standard
802.11ac network, a 2x2 card can transfer at a rate of up to 867 Mbps, while a 1x1 card tops out at 433 Mbps.

Windows Version: Don't go Pro


Some companies will give you a choice of Windows 10 Home or Pro when you're configuring your laptop. While
Windows 10 Pro offers extra features such as remote desktop, BitLocker encryption and group policy manager.
Most of these extras are useful only for a large businesses with IT departments. So, Pro is not worth with an extra
cost of Rs.10000 or more.

4G Cards: Only for deep pockets


A few laptops allow you to get a built-in, 4G LTE card so you can stay connected on the road. However, you'll
have to pay extra cost more than Rs.20000/- + data usage charges extra. If you rely on your laptop for business,
having built-in 4G is a nice convenience, but it's probably cheaper to just use your phone as a hotspot and connect
to it.
Bottom Line
Unless you're buying a really inexpensive laptop, go for a 1080p screen, a Core i5 CPU, at least 8GB of RAM and
an SSD that has 256GB or more.

Speakers: Preferred Dolby Digital Sound


Laptops have the built in speakers and those speakers are at the right and the left side of the laptop. One can
easily find them on the laptop. The speaker quality varies in some laptops and normally, they are the same.

I/O Ports
A Laptop must have a standard Keyboard, USB-3-0, Bluetooth VER.5 or higher, Audio and Mic Combo Port, HDMI,
USB-C Port, Card reader Port and RJ45 port (optional)

3
Power settings in Laptop
In a Laptop It is essential that, manage the power properly for a better performance. Windows operating systems
provides many options to manage the laptop's power settings.

Power options can be set to a pre-configured Windows settings, or customize the settings according to user’s
need. Depending on the operating system, the choices may be: Hibernate, Sleep or various custom settings.

Hibernate: Windows XP provides the Hibernate setting, but this option is missing from Windows Vista and
Windows 7. Users complained of numerous computer “freezes” and problems with Hibernate; frequently,
Windows had difficulty starting up after being in the Hibernate mode. Instead, Vista and 7 offer the Sleep setting,
which is much like Hibernate but is more reliable.

Sleep: The Sleep setting enables the computer to save all the work into the computer's RAM. When the computer
wakes from Sleep, the work session is restored. It is not necessary to restart the computer and reopen all the
programs after rousing the computer from Sleep mode. Window has given the ability to choose when you want
your computer to go into Sleep mode, or you can set it to the default Windows settings.

Custom Settings: The best power settings for laptops provide a balance between providing sufficient power for
energy and prevent the laptop from overheating. The laptop's display uses a huge amount of battery power, so
turning down the brightness of the screen is the best choice in saving power. There are other ways to save energy
and to keep the laptop a little cooler when idle, such as when the laptop goes into Sleep mode or shuts down
after the hard drive is idle. Windows allows you to modify your power settings to configure a power plan that
best suits to your laptop. The options for customizing the Windows power plan are found in “Power Options” in
the “Control Panel.”

The default “power saver” feature of Windows power settings is a good basic plan. However, you may want to
experiment with these settings; for example, the default custom setting for the display on battery power is 50
percent brightness. This may be too dark for you. You can adjust the brightness, but doing so will use more
battery power. Alternatively, you can set Windows to reduce hard drive idle time: for example, configure the
hard drive into Sleep mode if the computer is idle for longer than 10 minutes.

The best power settings balance energy use and productivity. When on battery, configure the laptop power to
reduce display brightness and to go into Sleep mode when idle. For best results, it is advised to shut off the
display after idle for 15 to 20 minutes, and shut off or set Sleep mode for the hard drive after idle time reaches
20 to 30 minutes.

Laptop Components

Adapter: It is a power supply unit for electronic devices. Also called an "AC adapter" or "charger," power
adapters plug into a wall outlet and convert AC voltage to a DC voltage. Computers use multiple DC voltages, and
the power adapter is the external part of the power supply for a laptop.

Battery: It is used to provide power backup in order to operate laptop when AC mains power is not available.
The common laptop battery voltages are 10.8V, 11.1V or 14.8V. All the laptop batteries are rechargeable. The
common laptop battery types include lithium ion (i.e. Li-ion), nickel cadmium (i.e. NiCad) and nickel metal hydride
(i.e. NiMH). Out of these Li-ion is being most commonly found in latest laptops. They are made using various
combination of cells like 3 cells or 4 cells etc.

RAM types: RAM is the short form of Random Access Memory. It is the type of memory which can be accessed
randomly. It is temporary memory which stores data and Laptop uses SO-DIMM (small outline dual in-line
memory module. SO-DIMMs are a smaller alternative to a DIMM, being roughly half the size of regular
4
DIMMs.) DDR SDRAM types which are double data rate synchronous dynamic random access memory (RAM)
class of memory ICs. The common types of SDRAM include DDR1, DDR2, DDR3 and DDR4.

CPU types: Laptop processors are different from the desktop counterparts because the laptop processor must
have to run the laptop when the laptop is not plugged into an outlet. So it consumes limited amount of power.

Most laptop users don't need high-end processors to run productivity software, but for PC gaming and video
editing, you'll need a powerful CPU in addition to sufficient RAM and a dedicated video card. The less power the
laptop uses, the longer the system can run on the battery. Various processors are:

 AMD A8-7100 and Higher


 AMD A9-9410 and Higher
 AMD E1-7010 and Higher
 AMD E2-7110 and Higher
 AMD E2-9010 and Higher
 Intel Core i3-6100U and Higher
 Intel Core i3-7100U and Higher
 Intel Core i5-6200U and higher
 Intel Core i7-6500U and Higher
 Intel Core i7-6700HQ and Higher
 Intel Core i7-7500U and Higher

Laptop Motherboard & block diagram: A laptop motherboard is the primary printed circuit board (PCB)
inside the laptop that contains the components that make the computer work.

Significantly the Laptop


mother boards are thinner and
smaller than a desktop. With a
smaller motherboard, the
components must be closer
together. A poorly designed
motherboard could cause
problems with heat buildup or
interference between
components.

Laptop motherboards also


might have an odd shape or
several notches, allowing them
to fit inside the thin laptop
case, along with other
necessary components.

The laptop motherboard might


not have any expansion slots,
while a desktop board might
have five or more. Rather than
using expansion slots and
expansion cards for items
like sound cards or networking, a laptop motherboard would include those components directly on the
motherboard, and they're called integrated components.

5
Laptop Keyboard:
A typical laptop keyboard layout has
typewriter keys, shift keys, function keys,
and cursor control keys. These include
Shift, Alt, Ctrl, and the special Windows
keys Win and Context. The Win key
appears in the bottom row between the
Fn and Alt keys; the Context key appears
between Alt and Ctrl.

The below figure illustrates a typical


laptop keyboard layout, where all the common keys found on the whopping desktop keyboard have been
miniaturized to laptop size. The design intends to let you type without the risk of fire from your fingers rubbing
together.
 Alphanumeric, or “typewriter,” keys: These are the basic typing keys, each of which is labeled with a
character (a letter, number, or punctuation symbol). When you’re typing on the computer, pressing a
key produces its character on the screen.

 Shift keys: The keyboard sports various shift keys used either alone or in combination with other keys.
These include Shift, Alt, Ctrl, and the special Windows keys Win and Context. The Win key appears in the
bottom row between the Fn and Alt keys; the Context key appears between Alt and Ctrl.

 Function keys: These keys are labeled F1 through F12 and are found on the top row of the keyboard,
right above the number keys.

 Cursor-control keys: These keys can be anywhere around the keyboard, although in this example, they’re
on the top and bottom right. They include the four directional arrow keys, usually found in an inverted T
pattern, as well as the Insert (or Ins), Delete (or Del), Home, End, PgUp (or Page Up), and PgDn (or Page
Down) keys.

Windows 10 Installation steps


Step 1: Go to the BIOS SETUP. Open BOOT option and choose DVD as 1st boot option, choose USB drive as 2nd
boot option than HDD/SDD as 3rd
boot option. Save your BIOS SETUP
and logout from the BIOS setting.

Step 2: Insert the original windows


1o DVD into DVD drive.

Step 3: It will ask you press any key


to boot from DVD. Press any key
within 15 second after showing the
message. Now the computer will
start booting from DVD.

Step 4: This is the first screen of


Windows 10 you will see, where
you choose the OS’ language, time
and currency format, and input
method.

6
Step 5: When you reach the installer screen,
select “Install Now” and follow the instructions
to install Windows 10 on your PC.

Step 6: The setup takes a couple of seconds to


start and asks you to enter the product key for
Windows 10. Type it and press Next. If you are
reinstalling Windows 10, click or tap that you do
not have a product key, and your copy is
automatically activated later. You can also clean
install Windows 10 without providing the key, if
you click or tap on "I don't have a product key."

Step 7: You are shown the license terms. Read


them if you wish and have the time. Then, check
the box for "I accept the license terms" and
press Next.

Step 8: You are asked for the type of installation


you want to perform. To make a clean install of
Windows 10, click or tap "Custom: Install
Windows only (advanced)." Otherwise,
choose Upgrade, and read the instructions from
this guide instead

7
Step 9: You are asked to select where you want
to install Windows. Choose the drive or partition
that you want to use for Windows 10 and
press Next. If you need to configure your
partitions in a specific way, do not hesitate to use
the tools available for creating new partitions,
deleting old ones, formatting, and so on, before
clicking Next.

Step 10: The setup takes some minutes to copy


all the required files and then installs the
Windows 10 operating system. It also installs
updates, if it detects that it can connect to the
internet.

Step 11: Once the installation is done, the


Windows 10 setup automatically reboots, at
least once, to run the first-time configuration
scripts. Wait for the process to finish. If you see
the prompt below, you can skip the waiting by
pressing Restart now.

Step 12: While you wait, Windows 10 shows you


the status of its "Getting ready" activities, letting
you follow the progress.

Windows 10 install process tells you that the


operating system is Getting ready

8
Customization of Windows 10 installation
(setup steps)

Step 13: After the reboots are finished, Windows 10


asks you to choose the region where you live. Select it
from the list, and then click or tap Yes. Always you have
to choose India.

Step 14: You are asked to confirm the keyboard layout


that you want to use. Choose the keyboard you prefer,
and press Yes.

Step 15: If you do not want to use a Microsoft account,


you can install Windows 10 without it. When the
Windows 10 installation asks you about it, choose to
create and use an offline account on your PC. It's also
known as a local user account (or non-Microsoft
account). To do that, click or tap on the "Offline
account" link at the bottom left of the sign-in screen.

Step 16: Enter the password that you want to use for
your offline account and press Next.

9
Step 17: For offline accounts, Windows 10 asks you
to answer three security questions. Choose the
questions you prefer, enter their answers, and
press Next.

Step 18: On the next step, you're asked about your


privacy settings. On the "Choose privacy settings for
your device" screen, select whether you want to
enable or disable features like Location, Diagnostic
data, Find my device, Online speech recognition,
Inking & typing, Tailored
experiences, and Advertising ID. We recommend
that you carefully read what each of these options
does and turn on only those you feel comfortable
with. Press Accept when you are done.

Step 19: Windows 10 takes a while to prepare your


computer or device, your apps, and all your
settings.

Step 20: Finally you will get Windows 10 DESKTOP SCREEN on the monitor

10
Maintenance
The computer is a machine having electrical and electromechanical peripherals. For a longer life of the computer
it needs maintenance periodically. Basically there are three types of maintenance.
Preventive Maintenance:
 Preventive maintenance (PM) is a series of maintenance carried out to prevent system problems. It can be
done as a precautionary measure to avoid any problem in future.

 Preventive maintenance includes PC components such as, mouse, keyboard, drives, and monitor to ensure
smooth functioning of a PC.

 Preventive maintenance can be carried out as per the manufacture’s guide line using appropriate cleaning
materials. Some common problems those must be taken care as a Preventive maintenance are:

 Dust Proofing: Dust may damage HDD, FDD, RAM and other components of a computer. So
precaution should be taken by cleaning the room and other equipment regularly.

 High temperature: It causes data loss, intermittent problem and early failure of electronic
components. Precaution should be taken by providing sufficient cooling and air circulation.

 Electrical Noise: It causes break down of the various circuit and signals. Precaution should be taken
by shielding cables, using isolation circuit etc.

 Magnetic fields: Affects data recorded in a floppy disk. Precaution should be taken by keeping the
PC from Audio speaker and TV.

 Power Fluctuations: Causes unreliable operation and damage of electronic components. . Precaution
should be taken by using CVT, Surge suppressor, isolation circuit etc.

 Improper handling: Corruption of disk & data, damage of key switch of key board. . Precaution should
be taken by handling the computer properly and safely.
Preventive maintenance provides the following benefits:
 It saves by reducing the possibility of a sudden breakdown of the PC and the other associated
components.
 It saves time as troubleshooting the components and their repair procedures take more time as
compared to preventive maintenance procedures.
 It safeguards the data by protecting Hard Disk drive.
 It improves performance and life of the computer and other components
Corrective Maintenance:
 Corrective maintenance is a type of system maintenance which is performed after a fault or problem appears
in a system. Corrective maintenance process is used for diagnosing and fixing existing problems.

 Corrective maintenance may require repairing parts or even replacing them with new ones. Computer
technicians are specifically trained to carry out the corrective maintenance process.

 The diagnostic process can include a physical inspection of a system, the use of a diagnostic computer to
evaluate the system, interviews with system users, and a number of other steps.

 After diagnosis the next step is repair or replacement of damaged components or software.
11
Online Maintenance:
 In Online computer Maintenance process a user will get help to repair the computer through online process
like Telephonic call or through Internet.

 Hardware breakdown problem can be solved quickly through the online service & support center of the
manufacturer.

 Most of the software problem can be solved through online maintenance process by updating various
software and operating system security patches.

 If the system is running slow than the online support site can run a lot of tests on our system to diagnose the
problem and solve the problems by installing some update patches.
Now a day this is the most popular way to get the support. It saves time and money. Few examples of the online
Computer repair are:
 They can schedule the online scan of the system as per the user’s requirement.
 They can update the system patch level online so the system keeps running smoothly.
 They can keep watching on the hardware status logs so it can be repaired in case of need.
 They can keep the track of the performance of the computer.
 They can keep the record of the system security and clean the unwanted files and defends the virus
attacks.
 The online computer repair is the future of the computer support.

Troubleshooting
Troubleshooting in a computer is an intelligent and sophisticated process. A wide variety of computers are
available in the market. So before troubleshooting it is highly recommended that user’s manual should be
carefully fallowed. Successful troubleshooting depends on the fallowing factors. They are:
1. Problem solving approach.
2. Techniques applied in troubleshooting.
3. Tools and test equipment used.
4. Diagnostic support in the PC.
A fault in a computer system affects the normal operation of the computer. The following are some computer
faults that usually we are facing.
1. A program has given a wrong results
2. A program is looping continuously.
3. The CPU not working properly.
4. There is a junk display in the monitor.
5. The printer starts printing suddenly without any print command.
6. The Floppy disk drive or CD-Drive always remains selected.
7. The hard disk drive not reading.
Nature of Faults
Computer faults can be broadly divided into two types. They are as follows.
1. Permanent fault:
If the computer misbehaves consistently than we can say it is a permanent fault. For example any
number of times the program run, the results or the symptoms are same.

12
2. Intermittent fault:
If the computer’s behavior is not consistence than the problem is known as intermittent problem. In this
type of problem the computer will suddenly starts malfunctioning. After a certain time, it recovers from
the fault automatically and again starts functioning properly.
Types of fault
Generally there are two types of computer fault. They are:
1. Hardware fault:
A hardware fault can occur at any time due to electronic problem, mechanical problem, environmental
problem and media problem. All type of hardware problem may be both solid and intermittent problem.
It is easy to find a solid problem but it is very difficult to find an intermittent problem.

2. Software fault:
The software problem may occur in a computer like some programs may not work properly or it may
work for certain type of data. These problems are happening because of the software is not proven,
tested and debugged properly.
Diagnostic programs and Tools:
Diagnostic Program:
 The diagnostic program is a special type program which is provided by the manufacturer. This program is
designed to verify the various functions of computer hardware.

 A hardware problem can be detected by running these programs. To identify an intermittent problem it is
necessary to run the diagnostic program multiple times. It also helps to identify the problem of both
hardware and software.
The various Diagnostic programs are:

 Microsoft Diagnostics: Better known as "MSD.EXE", this is a small DOS utility that takes a brief inventory
of the contents of the PC and shows the result in a text-based format.
 Microsoft Scandisk and Norton Disk Doctor: These programs are used to check for hard disk problems.
This includes file system corruption and hard disk read errors. They should be used when hard disk
problems are suspected.
 Norton Diagnostics: This utility is meant to go beyond the System Information program and actually
perform tests on the hardware to identify problems. It includes tests of the processor and motherboard
and system memory, and will identify some types of resource conflicts.
Various tools:
There are two types of troubleshooting tools:
1. Nodal Testers
2. System Testers
The nodal testers are simple conventional test equipment used to probe in and around the faulty circuit. These
testers include logic probe, logic pulsar, current tracer and oscilloscope.
Logic probe: Logic probe is a hand held low cost test equipment through which ninety percent of the fault can
be diagnosed. It is used to find out the logic state of any node in a circuit including steady states and pulses.
Logic pulsar: The logic pulsar is a hand held tool used to inject pulses at the input of a logic gate. The user can
use a single pulse or a stream of pulses at different frequencies.

13
Current tracer: It is a hand held tool which detects current flow in electronic circuits. It is useful shorted
components, track shorts, solder bridges, etc.
Oscilloscope: An oscilloscope helps to reserve all most any problem in a PC. This tool includes three levels of
testing. They are:
1. To test logic levels.
2. To measure signal characteristics such as frequency, pulse width, raise and fall time, noise, etc.
3. To measure the timing relationship between two or more signals.
System testers: The system tester is a sophisticated test tool which is used to isolate the faulty sub system
quickly. The system testers include emulators, functional testers, logic analyzer, etc.
Fault elimination process:
Fault finding is a technique. Sometimes even simple problems cannot be traced in a reasonable amount of time.
A service engineer should learn the techniques of trouble shooting and fault finding techniques. Some of the
common elimination steps are:
1. Check the AC input voltage. The voltage must be within the specification of the computer.
2. The voltage difference between the ground and neutral should be less than 6v.
3. Check the DC output voltage of the SMPS.
4. Check whether all cables are installed properly.
5. Check for loose contact in any connectors.
6. Check whether the cooling fan inside the SMPS is working.
7. Check dust sensitive areas like FDD, optical drive, etc.
8. Inspect for any broken components like resistors, capacitors, IC pins, etc.
9. Check whether any key on the keyboard is stock permanently.
10. Check the address bus, data bus and control bus signals and rule out whether any signal is stuck at 1 or 0.

Systematic Troubleshooting:
Troubleshooting depends on the ability and experience of a hardware engineer. The duration of down time of a
computer reflects the capability and performance of a hardware engineer. There are two types of
troubleshooting.
1. Ad hoc troubleshooting: It is a type of troubleshooting where an engineer can solve the problem for a
short period without doing any proper and systematic diagnosis. In this process though the fault can be
eliminated but it may happen again and again. So this type of troubleshooting does not help an engineer
always.

2. Systematic troubleshooting: It is the process of troubleshooting in a systematic way. Though it is taking


more time as compared to ad hoc troubleshooting, it is reliable and very helpful for a hardware engineer.
The systematic troubleshooting can be carried out in the following steps. These steps are:

 Symptoms observation: The first step in troubleshooting of a computer is observing all the
symptoms caused by the fault. Any problem of a computer can be diagnosed if the symptoms
are studied carefully without missing any point. This technique is highly essential for a multiple
problems of a computer because due to multiple faults it is impossible to locate exact fault. So a
hardware engineer must have a systematic approach to the problem and starts the
troubleshooting with patience and careful observation of the symptoms.

14
 Symptoms analysis: The second and most important step in troubleshooting is systematic
analysis of symptoms of a computer. Careful analysis of symptoms will give clue to the fault
location process. For a multiple symptoms the engineer should try to correlate various symptoms
to identify the exact problem. By analyzing the symptoms properly a hardware engineer can get
the clue and several steps can be skipped during fault location. Hence in this way the
performance and ability of a hardware engineer can be improved.

 Fault Diagnosis: Fault diagnosis is highly sophisticated and scientific process. To diagnosis a fault
an engineer should have inelegant, presence of mind and detective skill. During diagnosis a fault
an engineer should apply multi-dimensional views like:

o Architecture: Before diagnosis an engineer should know the architecture of that


computer. So many problems can be detected by analyzing the behavior of the computer
including both hardware and software (both system & application software).

o Organization: Two computers having same architecture need not have the same
organization. So before diagnosis a fault the hardware engineer should know the
organizational aspect like physical arrangement of various subsystems of that computer.
It will help a lot to diagnosis a fault.

o Engineering Layout: Certain problems are caused simple by physical layout of faults like
faulty cable, loose connection, open wire etc. So to handle these problems an engineer
should thoroughly analyze the physical aspects of circuit diagram, board layout diagram,
cable signals list, jumper setting etc. of that computer.

o Environment: various problems can cause due to environmental condition like high
temperature, dust, voltage fluctuations, electrical interference, magnetic field, humidity
etc. These problems create very confusing symptoms. So while diagnosis problem
environmental effects should be consider.
Fault Rectification:
Fault rectification consists of some simple steps if the problem is diagnosed and the fault is traced properly. The
various steps involved in fault rectification are:
1. Replacing a defective IC or other components.
2. Replacing a defective PCB.
3. Cleaning the connectors.
4. Cleaning the R / W head.
5. Soldering a broken wire or connection.
6. Formatting hard disk drive.
7. Isolating electrical loads.
8. Controlling temperature.
If the fault systems still remain even after doing fault rectification as per the diagnosis then there is more than
one defective component or the defective component not pointed out exactly. If the problem is not solved than
the diagnosis process should be fallowed again.
Logic diagram
It is a flow chart of hardware circuits or program logic. Detailed logic diagrams show all logic functions of the
equipment. In addition, they also include such information as socket locations, pin numbers, and test points to
help in troubleshooting. The detailed logic diagram for a complete unit may consist of many separate sheets.

15
Firmware
Firmware is usually defined as a type of program that runs within an electronic device. Firmware is not
categorized either as hardware or software, but a mix of both. The reason firmware is considered a combination
of both categories is that firmware employs an executable program (.exe) and includes an integrated piece of the
electronic device. Firmware is a combination of software and hardware. Data stored in ROMs, PROMs and
EPROMs are firmware.
Up gradation of system
A system upgrade typically involves adding new hardware or updating software to increase the functionality of
a system. However, system upgrades also have many less-known benefits such as an increase in the lifespan
and better efficiency of computer equipment. Here are five other reasons why you should bother upgrading
your systems:
 Increased employee productivity
 Business growth
 Better IT support
 Improved system security
 Extended warranty

Effective systems upgrades involve making coordinated and consistent improvements. Hardware upgrades
involve changes like swapping your hard drive for a Solid State Drive to boost performance or upgrading your
RAM to improve running efficiency of your system. You could also swap your existing battery for one with a
higher capacity to ensure the ability to work on the go.

Here are five hardware updates that can help you evade system hang-ups:

1. RAM – You can update to 4GB or 8GB ram in under $50.


2. Hard drive – You can switch a traditional hard drive for a solid-state drive for better performance.
3. Video card – If you’re a gamer or animation artist, you may want to invest in purchasing a video card or
graphics card for improved visuals.
4. Processor – You could also replace your Central Processing Unit and opt for one with a more advanced
processor.
5. Monitor – You could either replace your monitor for one with a better and bigger display or add monitors
to your existing one for easy multitasking.

Software upgrades and software updates


Software updates or upgrades are successful only when your systems are compatible with them. The difference
between a software update and a software upgrade is like the difference between servicing your old bike and
buying a new one.

Software update
A software update is also referred to as a software patch and is a free downloadable app that fixes shortcomings
in the existing version of your software. Software updates are typically created to address security issues or small
bugs that exist within a system. The most common type of software update is one that protects your operating
system from weaknesses that hackers or viruses are exploiting.

Software upgrade
A software upgrade is a completely new version of a software that includes significant changes that can enhance
your current version. Sometimes, you need to buy the new version of a software upgrade to access it. Other
times, software companies offer new versions to users of old software versions for free. Typically when the latter
occurs, you have to be registered with the software company to access the upgrade. That’s why it’s important
for you to ensure that all systems on which you have software installed are registered with the software
company.
16
Virus concepts
VIRUS stands for “Vital Information Resources Under Siege”. A computer virus is a malicious software program
loaded onto a user’s computer without the user’s knowledge and performs malicious actions. The term
'computer virus' was first formally defined by Fred Cohen in 1983. Computer viruses never occur naturally. They
are always induced by people.

In more technical terms, a computer virus is a type of malicious code or program written to alter the way a
computer operates and is designed to spread from one computer to another. A virus operates by inserting or
attaching itself to a legitimate program or document that supports macros in order to execute its code. In the
process, a virus has the potential to cause unexpected or damaging effects, such as harming the system software
by corrupting or destroying data.

How does a computer virus attack?


Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until
circumstances cause the computer or device to execute its code. In order for a virus to infect your computer, you
have to run the infected program, which in turn causes the virus code to be executed.

This means that a virus can remain dormant on your computer, without showing major signs or symptoms.
However, once the virus infects your computer, the virus can infect other computers on the same network.

How do computer viruses spread?


In a constantly connected world, you can deal a computer virus in many ways. Viruses can be spread through
email and text message attachments, Internet file downloads, and social media scam links. Your mobile devices
and smartphones can become infected with mobile viruses through shady app downloads. Viruses can hide
disguised as attachments of socially shareable content such as funny images, greeting cards, or audio and video
files.

What are the signs of a computer virus?

A computer virus attack can produce a variety of symptoms. Here are some of them:
 Frequent pop-up windows. Pop-ups might encourage you to visit unusual sites. Or they might prod you
to download antivirus or other software programs.

 Changes to your homepage. Your usual homepage may change to another website, for instance. Plus,
you may be unable to reset it.

 Mass emails being sent from your email account. A criminal may take control of your account or send
emails in your name from another infected computer.

 Frequent crashes. A virus can inflict major damage on your hard drive. This may cause your device to
freeze or crash. It may also prevent your device from coming back on.

 Unusually slow computer performance. A sudden change of processing speed could signal that your
computer has a virus.

 Unknown programs that start up when you turn on your computer. You may become aware of the
unfamiliar program when you start your computer. Or you might notice it by checking your computer’s
list of active applications.

 Unusual activities like password changes. This could prevent you from logging into your computer.

17
What are the different types of computer viruses?

1. Boot sector virus: This type of virus can take control when you start — or boot — your computer. One
way it can spread is by plugging an infected USB drive into your computer.

2. Web scripting virus: This type of virus exploits the code of web browsers and web pages. If you access
such a web page, the virus can infect your computer.

3. Browser hijacker: This type of virus “hijacks” certain web browser functions, and you may be
automatically directed to an unintended website.

4. Resident virus: This is a general term for any virus that inserts itself in a computer system’s memory. A
resident virus can execute anytime when an operating system loads.

5. Direct action virus: This type of virus comes into action when you execute a file containing a virus.
Otherwise, it remains dormant.

6. Polymorphic virus: A polymorphic virus changes its code each time an infected file is executed. It does
this to evade antivirus programs.

7. File infector virus: This common virus inserts malicious code into executable files — files used to perform
certain functions or operations on a system.

8. Multipartite virus: This kind of virus infects and spreads in multiple ways. It can infect both program files
and system sectors.

9. Macro virus: Macro viruses are written in the same macro language used for software applications. Such
viruses spread when you open an infected document, often through email attachments.

How to remove computer viruses


You can take two approaches to removing a computer virus. One is the manual do-it-yourself approach. The
other is by enlisting the help of a reputable antivirus program.

1. Want to do it yourself? There can be a lot of variables when it comes to removing a computer virus. This
process usually begins by doing a web search. You may be asked to perform a long list of steps. You’ll
need time and probably some expertise to complete the process.

2. If you prefer a simpler approach, you can usually remove a computer virus by using an antivirus software
program. For instance, Norton Antivirus or Quick Heal or any other Antivirus can remove many infections
that are on your computer. These Antivirus products can also help protect you from future threats.

Antivirus
Antivirus software is a vital component of your overall online and computer security strategy in its protection
against data and security breaches along with other threats. Antivirus software is a program or set of programs
that are designed to prevent, search for, detect, and remove software viruses, and other malicious software like
worms, trojans, adware, and more.

18
What Does Antivirus Software Do?
Antivirus software provides protection against these types of threats by performing key tasks:
 Pinpointing specific files for the detection of malicious software
 Scheduling automatic scans
 Scanning either one file or your entire computer at your discretion
 Deleting malicious codes and software
 Confirming the safety of your computer and other devices

What are the different types of antivirus protection?

Several types of antivirus programs have evolved over the years. When setting up your umbrella of protection,
it’s important to understand the more common antivirus programs available.

Malware signature antivirus:


Malware, or malicious software, installs viruses and spyware on your computer or device without your
knowledge. Malware can steal your login information, use your computer to send spam, crash your computer
system, and essentially give cybercriminals access to your devices and the information stored on them, and even
the ability to monitor and control your online activity.

Malware signature antivirus software detects malware signatures, which are digital fingerprints of malicious
software. Antivirus protection can scan for specific malicious codes, identify specific viruses, and disable these
programs.

System monitoring antivirus


This is where system monitoring antivirus software comes into play. This antivirus protection can monitor
software and computer systems for behavior that is suspect or different of the user.

For instance, alerts are created when a user connects to unfamiliar sites or attempts to access a large number of
files, or when there’s a significant increase in data usage.

Machine learning antivirus


Another form of protection can be machine learning techniques, which monitor “normal” computer or network
behaviors. The machine learning antivirus software is able to limit activities by programs or computers if they
look suspicious.

More specifically, machine learning detection implements algorithms to facilitate malware detection that is
broader in scope. This type of antivirus protection is beneficial because it works with other antivirus applications
to provide multiple layers of protection.

Some Antivirus Names

Norton Antivirus: Norton antivirus from Symantec is one of the most popular antiviruses that are used all over
the world. Many corporates placed their trust in this popular security software. This is a patented antivirus that
protects your PC from any kind of online and offline threats. This antivirus offers social networking protection
and 24/7 support.

McAfee Antivirus: It offers antivirus security for home usage, home offices and also large organizations. The
company offers a range of security technology including Data Center Security, Database Security, Endpoint
Protection, Mobile Security and much more. It delivers proactive and proven solutions and services in order to
keep your systems safe and secure.

19
TrendMicro Antivirus: You can secure your home PC as well as your business data by using the TrendMicro
antivirus. This antivirus is smart, simple and secure that fits all your security requirements. This antivirus offers
smart protection for your PC and is simple to use. It also offers mobile security and it does not slow down the
processing of your machine.

Avira Antivirus: Avira offers free and paid antivirus software ranges for both Mac and PC. The software maker
uses the same award-winning technology for building both free and premium antivirus software. The antivirus
helps you keep your PC malware-free. The antivirus is light yet powerful and simple and easy to use.

Kaspersky Antivirus: This popular antivirus software offers security against computer viruses, Trojans, spyware,
rootkits and many others. The best part is this antivirus does not undermine the performance of your PC. Your
PC will respond as fast it used to before installation of Kaspersky antivirus. The heuristic scanner rapidly reacts
to the new and emerging threats as well.

AVG Antivirus: The AVG antivirus is available for your PC, Mac, Tablet and also mobile. Their award-winning
antivirus software is a must-have for any kind of device that you want to protect. The best part is it is a free
antivirus and offers the range of service that equals any paid antivirus software.

20

You might also like