Questions
1. What is the difference between the CPU and the chipset? Are both components essential in the operation of a computer? Explain.
The CPU stands for Central Processing Unit. It is commonly known as a processor and is responsible for all the processing operations of a computer. Without it there is no any operation of a computer that can be possible. The processors are very vigorous during operations and usually dissipate a lot of heat when being used for operation. The CPUs are categorized using their clock speeds and front side buss speeds. As technology advances, higher speed CPUs are manufactured day by day that can operate at a much faster speed and dissipating as little heat as possible. The CPUs have different amount of cores which also have different amount of power consumption. (Chandra, 2004)
The chipset on the other hand consists of the north bridge and the south bridge. They are very important components in the computer. They however do not generate as much heat as the CPU. The north bridge is mainly concerned with the CPU’s front side buss speeds and the Random Access Memory (RAM) while the south bridge is concerned with the operation of USB devices, IDE, PCI cards and the BIOS. (Startech, 2004)
All CPUs must be accompanied by coolers which include heat sinks and fans while the chipset’s coolers are optional as they do not generate as much heat as the CPU. In most cases, the chipsets are cooled using only heat sinks.
2. A user calls you up and wants to know how they can create an icon on their Windows XP desktop system to launch their favorite game program. List the steps necessary to complete this task.
i. Take the cursor to the start button
ii. Click and choose All programs
iii. Move across to the programs and move the favorite game program.
iv. Check for the icon of the favorite game program and right click on it.
v. Choose the option for create short cut and left click on it.
vi. The icon for your favorite game program should appear on the desktop
vii. Whenever you want to launch the program simply double click on it and it will launch or right click on it and then choose open.
3. What are five things you should include in a computer preventative maintenance plan?
A computer preventive maintenance plan should have the strategies for both the hardware and software maintenance of the computer. (Kyle, 2004) They include but not limited to the following;
a) Physical/hardware measures
i. A can of compressed air – This is used for cleaning the CPU fan by blowing off the dust from the CPU.
ii. Damp clean piece of cloth for cleaning the monitor. The cloth can be made wet using a cleaning solution or some few drops of water.
b) Software
i. Run disk clean up utility
ii. Rearrange fragmented files with Disk Defragmenter Utility.
iii. Record any repair and maintenance done
iv. Record any repairs done
v. Back up your data regularly
vi. Protect your computer with antivirus.
4. What are six of the possible symptoms of a problem with the electrical system?
i. Memory errors – when you find the computer frequently experiences memory errors during its operations. (Richard, 1997)
ii. Data errors – errors occurring on the storage data or in the form of execution of programs. (Richard, 1997)
iii. Brownouts – in such a situation, a computer does not operate at its full functionality.
iv. Reboots – When a computer reboots without the user issuing the command
v. Cut-outs – When a computer goes off abruptly without any warning.
vi. When a computer reboots and it comes up with advanced Startup options. (Richard, 1997)
5. Describe the difference between Socket B and Socket J?
Socket B is a Land Grid Array (LGA socket) which is used by the latest generation of server-class intelCore i7 and Xeon microprocessors. It supports triple-channel. It also supports two QuickPath interconnect links with frequencies up to 3.2 GHz. This socket supersedes socket 775. Socket B replaces the server-oriented socket J in the entry level. (Tyan, 2010)
Socket J is a CPU interface which was introduced in 2006 by Intel. It is used for Quad-core processors. The processor interface has no pin holes. It is intended as a successor to Socket 604 and it also takes much of its design from the LGA 775. (Ushio, 2010)
6. Describe how you would install an Intel processor in socket 775?
The processor is complex and a very delicate component of a computer. Therefore a lot of care needs to be taken when installing it into the socket. If mishandled, it can be damaged and hence rendered useless. The processors are also very sensitive to static electricity and an electrostatic discharge may cause it to malfunction. You should first ground yourself before touching the RAM. (Tyan, 2010)
This is the procedure for installing the processor
i. Locate the socket on the mother board
ii. Press the lever with your thumb and move it to the left until it is released from the retention tab
iii. Lift the load lever and then the load plate with your thumb. Push the PnP cap from the load plate window in order to remove it.
iv. Position the CPU properly over the socket and ensure that the socket alignment keys fit into the CPU notches. Close the load plate and push the load lever until it also snaps on the retention tab.
v. The CPU can only fit in one direction. If the CPU is not fitting freely, you should change the orientation as it should fit freely. Do not force it to fit as you may damage the processor.
vi. After fitting the CPU, you can then install the CPU heat sink and the CPU fan.
7. Define SCSI and describe the two locations where you might find one?
Small Computer System Interface (SCSI) is a set of standards which are used for the physical connection and transferring of data between computers and other peripheral devices. The standards define different commands and electrical interfaces. The SCSI technology is most commonly used for hard discs and tape drives. SCSI hides the complexity of the physical format and it is also very intelligent. Any device that attaches to the SCSI does so in a similar manner. (Schmidt, 1997)
8. A user calls you up and wants a new monitor because his monitor is flickering. What are five things you can check first that may cause monitor flicker?
i. Circuit –try fixing the power on to another source of mains power.
ii. Electromagnetic interference – this can be caused by the presence of any electromagnetic signals generator
iii. Video hardware outside the monitor – try moving the video hardware away from the monitor
iv. Cell phones – whenever there is an incoming call on any cell phone placed next to the monitor, the monitor will flicker. Try moving the phone away from the monitor
v. Source of electricity next to the monitor – this can be caused by the presence of an extension board or a socket next to the monitor. Try moving the monitor away from the socket.
9. You have been asked to upgrade a user's PC from Windows XP to Windows Vista. What are the different installation methods that are available for this type of upgrade?
Custom Upgrade - it will leave most of the system files in the computer intact as it upgrades the already existing operating system. (Ed B., Ed Bott (Author)
New installation – this clears the initially existing operating system in the computer and installs a fresh version of the new operating system. (Ed B., Ed Bott (Author)
10. What is Task Manager and what are the different ways you can launch it?
Task manager shows all the programs and processes that are running in your computer. It can also be used for ending non-responsive programs in the computer. The task manager can also be used for switching from one process to another. (Steve, 20090
11. What is the difference between a blue screen error and a system lockup error? What should you do in each case?
The blue screen is also known as Stop error or a bug check. It is usually displayed by the Microsoft windows operating systems after encountering a critical error that causes a system to crash. The message is usually displayed on a blue screen thus the name. they are usually hardware or driver related and causes a computer to stop responding in order to stop any further damage to the hardware. This type of error usually causes a system to fail starting from the hard drive. In order to correct the error, it is required that one boots the system from the windows set-up CD, to correct the problem by performing a repair install or by using the recovery Console with the Checkdisk (CHKDSK) utility. (Robert, 2006)
System lockup error is a type of error occurring since an instruction is either not recognized by an operating system is violating one of the laid procedural rules. The system lock up error usually causes malfunctioning of the system but does not halt the operation of the operating of the computer as in the case of the blue screen. (Joseph, 2010)
12. What are the three ways for securing a wireless network?
Change Your Router’s Default Password – this will help prevent hackers from gaining access into your system. (Jahanzeb & Jahanzeb Khan (Author)
Upgrade Your WiFi Encryption – the encryption algorithm used should not be one that can be easily accessed by anybody at will. There should be a constant upgrading of the encryption so as to ensure that no one can crack the algorithm. (Jahanzeb & Jahanzeb Khan (Author)
Use a Firewall – this can be achieved by applying the router’s firewall and the individual PC firewall. This will help in ensuring that all the network resources are properly protected from any kind of external attack. (Jahanzeb & Jahanzeb Khan (Author)
13. How can you use the BIOS setup to secure a workstation from unauthorized use?
The BIOS setup can be used for protecting a work station from an authorized use through the use of passwords. Any person, who does not know the password, will not be able to access the workstation thus preventing any unauthorized use. There are other security tools which help in denying any person access to the system unless he/she is authorized to use the system. (Adrian, 2004)
References
Adrian W. (2004) Breaking Through the BIOS Barrier: The Definitive BIOS Optimization Guide
for PCs Prentice Hall PTR Publishers
Chandra T. (2004) CPU Design. Springer Publishers 1st edition
Ed Bott, Ed Bott (Author)
› Visit Amazon's Ed Bott Page
Find all the books, read about the author, and more.
See search results for this author
Are you an author? Learn about Author Central
Carl S. & Carl Siechert (Author)
› Visit Amazon's Carl Siechert Page
Find all the books, read about the author, and more.
See search results for this author
Are you an author? Learn about Author Central
Craig S. (2009) Windows 7 Inside Out. Microsoft Press
Jahanzeb K. & Jahanzeb Khan (Author)
› Visit Amazon's Jahanzeb Khan Page
Find all the books, read about the author, and more.
See search results for this author
Are you an author? Learn about Author Central
Anis K. (2003) Building Secure Wireless Networks with 802.11Wiley Publishers
Joseph M. (2010) Fatal System Error: The Hunt for the New Crime Lords Who are Bringing
down the Internet. PublicAffairs Publishers
Kyle M. (2004) Computer Troubleshooting Manual Haynes Publishing Group
Richard C. D. (1997) The Electrical Engineering Handbook, Second Edition CRC Press
Publishers
Robert B. P. (2006) Blue Screen. Putman Publishers
Schmidt F. (1997) The SCSI Bus and IDE Interface: Protocols, Applications and Programming
Addison-Wesley Professional Publishers
StarTech (2004) Computer Chipset Cooling Kit.
Steve S. (2009) Hacking Windows XP Microsoft Press
Tyan (2010) Tyan B7015F72V2R Barebone System - Intel 5520 - Socket B - Xeon (Dual-core)
Ushio (2010) SOCKET-J-10 SOCKET G9.5 MAX-250V 10A
Xeon (Quad-core), Xeon (Hexa-core) - 144GB Memory Support - Gigabit Ethernet - 4U Rack
Joseph Menn (Author)
› Visit Amazon's Joseph Menn Page
Find all the books, read about the author, and more.
See search results for this author
Are you an author? Learn about Author Central