Overview Hardware and Software
Overview Hardware and Software
Overview Hardware and Software
2
Care for network and computer hardware
As you know, a computer is made up of hardware and software. In some ways the analogy
can be made to humans that the hardware is your body and the software is your mind. If
the processor is the computer's "brain" then the software is what that brain "thinks". Each
and every thing that happens inside the computer is controlled by some form of software:
from the high level spreadsheets, games and other applications, to the low-level device
drivers that tell your hardware exactly what it has to do to make them work properly.
One of the great strengths of the PC platform, which has led to its overwhelming success in
the marketplace, is its modularity. Most PCs are made up of many different individual
components, which can be mixed and matched in thousands of different configurations. This
lets you customize the PC you either buy or build to meet your exact needs. The picture
below identifies the most common external hardware components of hardware.
GAGE @ 1
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
This section discusses some of the major components of a typical, modern PC. Some PCs
have some of these combined into one physical unit, but inside, somewhere, you'll find most
if not all of these pieces. (Most modern PCs also have components not listed here; )
System Case
The most familiar PC case style is probably the desktop case design.
These cases are designed to set horizontally on the desk (hence the name).
Variations of the basic desktop design include narrow cases, referred to as baby AT
cases, and short desktops, called low-profile cases.
Tower cases sit vertically on the floor beneath the desk. This case design came
about to free up workspace on the desktop.
Tower cases offer extended drive bay capacities that make them especially useful
in file server applications where many disk, CD-ROM, and tape drive units may be
desired.
GAGE @ 2
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
compensate for this problem, most tower cases include a secondary fan unit to
increase airflow through the case and thereby dissipate more heat.
Mini towers and mid towers are short towers designed to take up less vertical space.
Power supply
Your computer is obviously an electronic device, and its many components of course require
power. Like the case, most people don't give much thought to the power supplied to the
system.
External Power: External power refers to the power that is delivered to the back
of the system case.
Power Supply: The power supply is the small box that sits inside your case and takes
the external power you supply to the computer. Its main job is to transform this
power into a form the rest of the computer can use.
The following is a list of PC problems that often are related to the power supply:
GAGE @ 3
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
■ Small brownouts that cause the system to reset
■ Smoke
1. Check the AC power input. Make sure the cord is firmly seated in the wall socket
and in the power supply socket. Try a different cord.
2. Check the DC power connections. Make sure the motherboard and disk drive
power connectors are firmly seated and making good contact. Check for loose
screws.
3. Check the DC power output. Use a digital multimeter to check for proper
voltages. If it’s below spec, replace the power supply.
4. Check the installed peripherals. Remove all boards and drives and retest the
system. If it works, add items back in one at a time until the system fails again. The
last item added before the failure returns is likely defective.
■ Surge suppressors
■ Line conditioners
GAGE @ 4
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
Limited protection
Surge protector: In addition to protecting the power lines, it is critical to provide
protection to your systems from any connected phone lines.
In many areas, the phone lines are especially susceptible to lightning strikes, which
are the leading cause of fried modems and damage to the computer equipment
attached to them
The motherboard is the base of the modern computer system. It is amazing how little
attention this critical component gets in mainstream circles, considering how much it does--
though this situation is now improving, fortunately. If the processor is the "brain" of the
computer, then the motherboard is the central nervous system and circulatory system, plus
much more, all rolled into one. Here are the main parts of the motherboard and its related
devices:
GAGE @ 5
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
Motherboard: The motherboard is the main circuit board in the computer where
everything comes together. This is where you plug in your processor, memory, cache,
video card and other cards. It is also where you connect your peripherals.
System Chipset and Controllers: The chipset is to direct traffic and control the
flow of information inside the computer.
System Buses: The system buses are the electrical channels through which various
parts of the computer communicate. It is over the system buses that your video
card gets information from the processor, the processor saves data to your hard
disk, etc.
BIOS: The system BIOS (which stands for Basic Input/Output System and is
pronounced "bye-oss" or "bye-ose") to act as an intermediary between your system
hardware (the chipset, motherboard, processor and peripherals) and your system
software (the operating system).
Cache: The system cache is a small, high-speed memory area that is placed between
the processor and the system memory. The value of the cache is that it is much
faster than normal system memory.
GAGE @ 6
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
There are several important basic electrical components that are commonly found in the
circuits of virtually all PC parts and peripherals. These devices are the fundamental building
blocks of electrical and electronic circuits, and can be found in great numbers on
motherboards, hard disk logic boards, video cards and just about everywhere else in the PC,
including places that might surprise you.
There are many variants of each of the components shown below; so the diagrams should
only be considered examples.
Resistor: As you could probably guess from the name, a resistor increases the
resistance of a circuit. The main purpose of this is to reduce the flow of electricity
in a circuit.
GAGE @ 7
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
Capacitor: A capacitor is a component made from two (or two sets of) conductive
plates with an insulator between them. The insulator prevents the plates from
touching.
Capacitors block DC current and let AC current pass, while inductors do the
opposite.
Transformer: A transformer is an inductor, usually with an iron core, that has two
lengths of wire wrapped around it instead of one. The two coils of wire do not
electrically connect, and are normally attached to different circuits. One of the
most important components in the world of power, it is used to change one AC
voltage into another.
GAGE @ 8
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
Diode / LED: A diode is a device, typically made from semiconductor material, that
restricts the flow of current in a circuit to only one direction.
GAGE @ 9
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
Jumpers
Jumpers are small devices that are used to control the operation of hardware devices
directly, without the use of software.
Jumper: The jumper itself is a small piece of plastic and metal that is placed across
two jumper pins to make a connection, or removed to break a connection. They come
in a few standard sizes (and some non-standard ones I'm sure); only one or two sizes
are commonly seen on PCs. Jumpers are sometimes also called shunts.
Jumper Pins: A set of pins, across two of which a jumper is placed to make a
specific connection.
GAGE @ 10
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
2. Occupational health and safety (OHS)
Organizations will develop procedures for safe working practices as a tool for implementing
their OH&S policies and training staff.
Computer hardware devices and consumables such as printer paper boxes can be very heavy
and care should be taken when manually handling these objects. Manual handling is one of
the most common causes of accidents in the workplace.
Manual handling is defined as:“any activity that involves lifting, lowering, carrying, pushing,
pulling, holding or restraining. It may also include stretching, bending, sustained and
awkward postures, and repetitive movements.”
Recommendations on practices to reduce the risk of manual handling injury at work include:
Regardless of the industry in which you work, there are legal requirements that insist on
establishing a safe work environment.
secure and promote the health, safety and welfare of people at work
protect people at a place of work against risks to health and safety arising out of any
activities of people at work
promote a safe and healthy environment for people at work that protects them from
injury and illness and that is adapted to their physiological and psychological needs
provide for consultation and cooperation between employers and workers in achieving
the above
ensure that risks to health and safety at a place of work are identified, assessed and
eliminated or controlled
develop and promote community awareness of occupational health and safety issues
GAGE @ 11
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
Protect people (whether or not at a place of work) against risks to health and safety
arising from the use of machinery that affects public safety.
Computer hardware should be located close to a suitable electrical outlet and free from any
other hazards. The use of long extension cords is a trip hazard. If no power outlet is
available, a new fixed power outlet may need to be installed. At work place every one of as
take care of ourselves and the material
Access control list A list of permissions for objects such as files or folders. These permissions will
(ACL) determine the level of access that a user or group has to an object.
A backup copies files to a second medium such as disk or tape as a precaution in case the
Backup
first medium fails.
The requirements that need to be met, so that a business can perform the required
Business requirements
business tasks.
Materials which are used up and need continuous replenishment, such as printer paper
Consumables
and toner.
Diagnostic testing The testing performed to establish the likely cause of a problem.
Environmental Conditions such as temperature, humidity and air quality which need to be considered,
conditions when locating computer hardware.
Interoperability The ability of a computer system to work with another computer system.
Any activity that involves lifting, lowering, carrying, pushing, pulling, holding or
Manual handling
restraining.
Redundancy Having a secondary peripheral computer system or network device which takes over
GAGE @ 12
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
Surge protector A device designed to protect against electrical surges and spikes.
Uninterruptible Power
A device designed to protect against electrical power blackouts.
Supply (UPS)
Computer security covers a lot of territory: locking your computer room and your machine,
protecting your login accounts with passwords, using file protection to keep your data from
being destroyed, encrypting network communications lines, and using special shields to keep
electromagnetic emanations from leaking out of your computer. But when people talk about
computer security, they usually mean what in this chapter we call computer system security.
computer system security ensures that your computer does what it's supposed to do–even if
its users don't do what they're supposed to do. It protects the information stored in it
from being lost, changed either maliciously or accidentally, or read or modified by those not
authorized to access it.
1. System Access Controls. Ensuring that unauthorized users don't get into the
system, and by encouraging (and sometimes forcing) authorized users to be
security-conscious–for example, by changing their passwords on a regular basis.
2. Data Access Controls.
Monitoring who can access what data, and for what purpose.
3. System and Security Administration.
Performing the offline procedures that make or break a secure system–by clearly
delineating system administrator responsibilities, by training users appropriately,
and by monitoring users to make sure that security policies are observed.
4. System Design.
Taking advantage of basic hardware and software security characteristics; for
example, using a system architecture that's able to segment memory, thus isolating
privileged processes from non privileged processes.
GAGE @ 13
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
Denial of service Worms Packet replay
attacks
Intrusion attacks Trojan horses Password
cracking
Social Packet
engineering modification E-mail cracking
Viruses
Security means “The protection of the system against threats using both technical and
administrative controls”. Security encompasses hardware, software, people and data. To
effectively implement security requires appropriate controls, and these controls should
implement specific policy statements that have been dictated by the requirements of the
system, the needs of the organization and any legal constraints. We consider database
security in relation to the following situation:
Theft and fraud,
Loss of confidentiality (secrecy),
Loss of privacy,
Loss of availability.
Computer-Based Controls
Non-Computer-Based Controls
1. Computer-Based Controls
Authorization
Backing-up
Encryption
Authorization
The granting of a right or privilege which enables a subject to legitimately have access to a
system or object.
GAGE @ 14
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
Backing-up
The process of periodically taking a copy of the database and journals (and possibly
programs) onto offline storage media.
It is always advisable to have a backup copy of the database taken at regular intervals ad
kept in secure location.
Encryption
The encoding of the data by a special algorithm those render the data unreadable by any
program without the decryption key.
Data in an IT system is at risk from various sources—user errors and malicious and non-
malicious attacks. Accidents can occur and attackers can gain access to the system and
disrupt services, render systems useless, or alter, delete, or steal information.
IT system may need protection for one or more of the following aspects of data:
Security administrators need to decide how much time, money, and effort needs to be spent
in order to develop the appropriate security policies and controls. Each organization should
GAGE @ 15
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
analyze its specific needs and determine its resource and scheduling requirements and
constraints.
Computer systems, environments, and organizational policies are different, making each
computer security services and strategy unique. However, the principles of good security
remain the same, and this document focuses on those principles.
Although a security strategy can save the organization valuable time and provide important
reminders of what needs to be done, security is not a one-time activity. It is an integral
part of the system lifecycle. The activities described in this document generally require
either periodic updating or appropriate revision. These changes are made when
configurations and other conditions and circumstances change significantly or when
organizational regulations and policies require changes.
To combat the threat from fraud and hackers even from different network attack, most
major Web sites use some form of digital encryption to protect sensitive data.
Encryption is the process of scrambling data in order to make it unreadable without special
knowledge of steps that can lead to unscrambling the code.
With increased online use, business is conducted where the various parties have practically
no contact either face-to-face or even over the phone. Orders on a Web site can be
processed with a few clicks of the mouse. The buyer often never communicates with a
seller, except to enter a form, and the seller just simply processes orders much as it was
done in the past via mail order.
Diagnostics software’s are software’s that used to make fix the computer software
problems.
GAGE @ 16
201
GAGE IT & Business College Department of Technology Section: Information Technology
TTLM for Care for network and computer
2
As well there are operating systems diagnostics are software that fix problems related to
operating system failure.
No
Diagnostic Tool Type What It Does
1
POST Firmware Tests core components of system
2
pen Boot Firmware Tests system components, focusing on peripherals and
Diagnostics I/O devices
3
Open Boot Firmware Display various kinds of system information
commands
4
SC card Hardware and Monitors environmental conditions, performs basic fault
and RSC software software isolation, and provides remote console access
5
Hardware Software Exercises an operational system by running sequential
Diagnostic Suite tests. Also reports failed FRUs
GAGE @ 17