Maintenance of devices of computer systems and complexes. Control work for the CSC group in the discipline "maintenance and repair of computer systems and complexes"

  • 22.08.2020

≫ How to do Maintenance computer by hand? Step-by-step instruction

Published: May 12, 2015

Buying a home computer is always a great joy for the whole family. Internet access, access to a huge amount of various information, work, study and recreation - this is only a small fraction of what a computer can provide us.
But quite often it also happens that after three or four months the joy of their owners begins to be overshadowed by the problems that arise with the PC. The computer starts to suddenly turn off, freeze, the operating system constantly restarts or malfunctions. Most users do not even suspect that some of these problems could have been avoided if the maintenance of their “digital friend” was done on time, and on their own.

Causes of personal computer failure

  • Technical marriage. No one is immune from its manifestation. Unfortunately, it is almost impossible to identify it when buying, but, as a rule, it appears for the first time during the operation of the device, and very rarely after a few months.
  • Infection of the computer with viruses. All viruses behave differently. Some can sit quietly and quietly for years, while the actions of others appear immediately - they can delete files, encrypt them, copy your personal data via the Internet, etc. In any case, this can lead to excessive load on the computer, damage to the operating system and as a result - to fatal errors in its work.
  • Incorrect operation of the software. The problem is caused both by the imperfection of the environment for creating software, and by the mistakes made by programmers during development.
  • Overheating of the components of the system unit. It is this cause of PC failure that is the main one in the absence of elementary, regular maintenance. Overheating of components occurs due to a violation of the normal cooling of the chips, for this reason, the cooling components - radiators and fans ("coolers") gradually become clogged with dust and dirt and cease to function correctly.

What is required for maintenance?

Despite the apparent complexity, almost any user can perform maintenance. To do this, we need a simple toolkit:

  1. Toothpick.
  2. A can of compressed air (available at computer stores) or a vacuum cleaner.

If you don't have a Phillips screwdriver, you can get one from any hardware store. Ask the sales assistant to show you a screwdriver with which you can unscrew the screws on the system unit and choose from the ones offered the one that suits you best in terms of ease of use.

A can of compressed air is also an optional item for maintenance if you have a good vacuum cleaner with a reverse mode. (Such vacuum cleaners not only suck in air, but can also blow it out, creating a directional jet under pressure). The spray can perform the same function, the only difference is that its air jet is more powerful than that of a vacuum cleaner, so using it as a blowing device is more preferable.

Maintenance procedure


Service interval

This maintenance should be performed at least once a month. But if, when examining the system unit, it is found that dust accumulations are very large for a month, then the frequency of this operation should be increased.

Don't be afraid to hurt something inside- if you do everything carefully, then the probability of damage from suction or blowing dust is zero, but the benefit will be obvious. With excessive heating of the chips of the system unit, not only the chips themselves suffer, but also the connectors in which they are installed or soldered. Constant overheating gradually destroys the structure of the motherboard and the "seat", respectively, the service life of the device is sharply reduced.

Having performed this operation once, it is easy to make sure that there is nothing difficult in it, and in the future, it will become as commonplace as dusting your house.

  • 1. System software.
  • 1. basic software
  • 2. operating systems
  • 3. utilities
  • 2. Application software.

Software (SW) is understood as a set of software and documentary tools for the creation and operation of data processing systems by means of computer technology. In the very general plan software for computer technology can be divided (depending on the purpose) into system, instrumental and applied (like any classification, this division is conditional).

Software is either data for use in other programs, or an algorithm implemented as a sequence of instructions for a processor.

The software is designed to:

to ensure the operability of the computer;

facilitate interaction between the user and the computer;

expand the resources of the computing system;

improve the efficiency of resource use;

increase the productivity and quality of the user's work.

Computer jargon often uses the word "software" from English software, which was first used in this sense in an American Mathematical Monthly article by Princeton University mathematician John W. Tukey in 1958. In the field of computing and programming, software is the totality of all information, data, and programs that are processed by computer systems.

System software.

System software is a set of programs that provide effective control of computer system components, such as a processor, RAM, input-output channels, network and communication equipment, etc. System software organizes the process of processing information in a computer and provides a normal working environment for application programs; it is designed to control a computer, organize problem solving and user interaction with computer hardware. It is so closely related to the hardware that it is sometimes considered part of the computer. The richer the system software, the more productive the work on the computer becomes.

System software includes operating systems, service software (shells, utilities, anti-virus tools) and maintenance programs (test programs, control programs).

Basic software.

Basic software in computer architecture occupies a special position. On the one hand, it can be considered as an integral part of the hardware, on the other hand, it is one of the software modules of the operating system.

Operating system.

An operating system (OS) is a set of special software tools designed to manage computer booting, launch and execution of other user programs, as well as to plan and manage the computing resources of a personal computer. It provides control over the processing of information and interaction between the hardware and the user.

Operating system features include:

  • Implementation of a dialogue with the user;
  • input, output and data management;
  • planning and organization of the process of processing programs;
  • distribution of resources (RAM and ultra-fast memory, processor, external devices);
  • launching programs for execution;
  • Various auxiliary maintenance operations;
  • transfer of information between various internal devices;
  • software support for peripheral devices.

The main necessity of the OS is that it hides complex unnecessary details of interaction with the hardware from the user, forming a layer between them.

One of the most important functions of the OS is the automation of the processes of input-output of information, the management of the execution of applied tasks solved by the user.

Based on the functions performed, OS can be divided into three groups: single-tasking (single-user), multi-tasking (multi-user) and network.

Single-tasking operating systems are designed for the work of one user at any given moment with one specific task. Their appearance was stimulated by the creation of a large class of personal computers. An example of such an operating system is the MS DOS operating system, which was widely used until the early 1990s.

Multitasking operating systems provide for the collective use of a PC in a multiprogram time-sharing mode, while the PC memory contains several task programs and the processor distributes computer resources between tasks. Examples include UNIX, OS/2, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows Me, Microsoft Windows XP operating systems.

Network operating systems are associated with the emergence of local and global networks and are designed to provide access to all computer network resources, such as Novell Net, Microsoft Windows NT, UNIX, IBM LAN operating systems.

Depending on the number of simultaneously processed tasks and the number of users who can serve the OS, there are four main classes of OS:

single-user single-tasking: - support one keyboard and can work with only one (at the moment) task;

single-user single-tasking with background printing, which allow, in addition to the main task, to run one additional one, focused on printing information. This speeds up the work when issuing large amounts of information for printing;

single-user multitasking, which provide one user with the parallel processing of several tasks;

multi-user multi-tasking - allow several users to run several tasks on one computer. These operating systems are very complex and require significant machine resources.

To be complete, an OS must contain at least the following major components.

file system.

Drivers for external devices.

Command language processor.

One of the primary tasks of the operating system should be considered the management of the disk drive and access to it. It is no coincidence that early PC operating systems contained the abbreviation DOS (Disk Operating System - disk operating system) in their name. For this, the file system is used. Any application program has access to the file system, for which all programming languages ​​have special procedures. For a PC, the file system is, to a certain extent, the basis of system software.

Support for a wide range of external devices is one of the most important functions of the OS.

In modern operating systems, there is an intermediate level between application programs and hardware, a kind of buffer called API (application programming interface). The API provides the programmer with the ability to call certain general-purpose routines that access specific hardware resources. As new hardware becomes available, the API is also updated, but this may not be enough.

Correct work with the hardware is provided by drivers. Drivers are programs that expand the capabilities of the OS to manage input / output devices, RAM, etc. With the help of drivers, it is possible to connect new peripheral devices or non-standard equipment to the computer. Each type of external device has its own driver. Standard device drivers form a set of basic input / output system (BIOS), which is often stored in the ROM of the PC system unit.

Every OS has a command language that allows you to perform certain actions - accessing a directory, launching application programs, etc. The analysis and execution of user commands is carried out by the OS command processor.

To communicate with the OS, a shell is often used - this is what the user sees on the monitor screen when working with the system. In essence, this is a kind of application program that is loaded on top of the OS and implements a command language that serves to allow the user to access system functions. A shell is just a kind of utility for entering information that provides convenient access to the operating system, but it is not part of the OS.

File management and job scheduling programs are programs (files) ready for execution: utilities, programming systems, tool systems, integrated software packages, computer graphics systems, database management systems (DB), application packages and programs.

Communication programs - programs designed to organize the exchange of information between computers.

Testing, control and diagnostic programs are used to check the correct functioning of computer devices and to detect malfunctions during operation, indicate the cause and location of the malfunction.

Memory management programs provide more flexible use of the mainframe.

Print programs output information to the printer.

Service programs.

Another set of programs - office. This is a set of software products that provide the user with additional services in working with a computer and expand the capabilities of operating systems. These are various utility programs used during the operation or maintenance of a computer - editors, debuggers, diagnostic programs, archivers, anti-virus programs and other auxiliary programs. These programs make it easier for the user to interact with the computer. They are adjoined by programs that ensure the operation of computers on the network. They implement network protocols for the exchange of information between machines, work with distributed databases, teleprocessing of information.

Maintenance programs are understood as a set of software and hardware tools for diagnosing and detecting errors in the operation of a computer or computer system as a whole. They include tools for diagnosing and testing the correct operation of the PC and its individual parts, as well as special programs for diagnosing and monitoring the computing environment that automatically check the system's performance. These programs are used to test the performance, adjustment and technical operation of computer equipment by the personnel who serve it. The results of the work of such programs are displayed in a visual form and can be useful to a user with a qualification not lower than a computer operator.

Utilities are auxiliary programs, they expand and supplement the corresponding capabilities of the operating system (OS), mainly for servicing disks and the computer file system.

Packers - programs that allow you to write information on floppy disks in a denser form, that is, create smaller copies of files, as well as combine several files into one (archive).

Antivirus programs - programs designed to prevent infection with computer viruses and eliminate the consequences of infection. Anti-virus protection software provides diagnostics (detection) and treatment (neutralization) of viruses. The term "virus" refers to a program that is able to multiply by infiltrating other programs, while performing various undesirable actions.

Application software

Application software is directly aimed at solving professional problems, reducing labor intensity and increasing user efficiency in various areas human activity. These programs allow you to almost completely automate the tasks solved by the user. The programs of this group are very diverse: from simple word processing programs to powerful publishing systems; from solving simple computational problems to powerful professional systems of mathematical calculations, accounting programs.

Currently, hundreds of thousands of different application programs have been developed and are being used for various applications.

The most widely used programs are:

  • preparation of texts (documents) on a computer - text editors;
  • · preparation of documents of typographical quality - publishing systems;
  • · creation and editing of images - graphic editors;
  • · processing tabular data - spreadsheets;
  • · processing of arrays of information - database management systems;

Text editors and publishing systems provide the ability to prepare documents on a computer. Text editors (NotePad - developed by Microsoft) are capable of performing basic editing functions: typing, making corrections, saving, working with fragments. Word processors (Microsoft Word, - developed by Microsoft), in addition, have the possibility of a variety of design, and some allow you to create documents that are intended to be viewed not on paper, but on a computer (electronic documents). Publishing systems automate the process of layout of printing publications. Publishing systems are distinguished by advanced controls for the interaction of text with page settings and graphic objects, but have weaker capabilities for automating text entry and editing. It is advisable to apply them to documents that are pre-processed in word processors and graphic editors.

Spreadsheets provide work with large tables of numbers. Main purpose spreadsheets- processing of various types of data presented in tabular form, for example, planning and financial, accounting documents, small engineering calculations. The main advantage of spreadsheets, compared to word processors (where tables can also be maintained, small calculations and sorting can be done), is that the content of some cells can automatically change in accordance with the change in the content of others, in other words, formulas can be stored in the cells. In addition, spreadsheet editors have the ability to maintain small databases and visualize data in the form of various tables, charts and graphs, i.e. spreadsheet tools, tabular calculation tools are supported by the ability to create visual reports. They are widely used in accounting, analysis of financial and trade markets, means of processing the results of scientific and economic experiments, i.e. in automating regularly repeated calculations of large amounts of numerical and textual data representing tabular structures. The most popular spreadsheet editors are Lotus1-2-3 Quatto Pro, Microsoft Excel, Super Calc, etc.

Database management systems (DBMS) allow you to work with large amounts of structured data - databases (as a rule, these are tabular structures). The functions of the DBMS include: description of data, access to data, search, selection of data according to certain criteria. Most modern DBMS allow you to create small data processing programs in built-in languages, have design features that allow you to create a report based on the collected and processed data. Even low-skilled users can easily work with such DBMS, since all actions in them are carried out using menus and other interactive tools. However, it is often necessary to solve problems in which many various kinds objects and, accordingly, many information arrays connected with each other by various relationships. In such cases, it is required to create specialized information systems in which the necessary data processing is performed in the most natural way for users - with a convenient presentation of input data, output forms, graphs and charts, search queries, etc. To solve such problems, more complex DBMS are used, which allow using special means(usually - programming languages) describe data and actions with them. An example program of this class is Microsoft Access.

Graphic editors allow you to create and edit pictures on your computer screen. These include raster and vector graphics editors, three-dimensional graphics processing programs (3D editors). Bitmap editors use bitmaps to represent images, i.e. a collection of dots that have their own color and brightness. It is convenient to process photos and objects with soft color transitions in them. The basis of the vector representation is the line (its equation). Vector editors are convenient for working with drawings and hand-drawn pictures. Three-dimensional graphics editors are used to create spatial graphic compositions, allow you to trace the interaction of three-dimensional objects with each other and three-dimensional objects with a light source. As a rule, the user is given the opportunity to draw lines, curves, color areas of the screen, create inscriptions in various fonts, etc. Most editors allow you to process images obtained using scanners, as well as display the resulting pictures in such a way that they can be included in a document prepared using a text editor or publishing system. Some editors provide the ability to capture images of three-dimensional objects, convert raster images to vector format, professional color processing tools, etc.

Software tools for solving applied mathematical (statistical) problems make it possible to mathematical calculations: solving equations and systems of equations, etc., some packages allow you to perform analytical (symbolic) calculations: differentiation, integration, etc. Some of them allow you to display graphs of functions (given in tabular or analytical form), surface level lines, scatterplots, etc. on the screen. This type of software includes such programs as MatCad, MatLab.

Separate programs, being a powerful tool for solving a range of applied problems, cannot fully satisfy the user. For example, it can be convenient to process a data sample provided by a DBMS using spreadsheets, and put the results in the form of visual tables into a report, which is a text document that was compiled in a word processor. For the joint work of several programs, the unification of the formats of the processed files is also required. Such software packages are called integrated software tools. The most common product of this class is the MS Office package. Integrated systems combine the capabilities of a database management system, a spreadsheet, a text editor, a business graphics system, and sometimes other capabilities.

Translators usually work resident, i.e. in any text in a foreign language, you can highlight the fragment to be translated, and after pressing a certain key combination, a window with the translation or possible translation options for the word is presented.

Games are very common, a huge number of them have been created. Among them, the following typical scenarios can be distinguished: proactive games (for mastery), gambling, strategies, logic games, educational games.

Entertainment - applications that allow you to view slides, listen to sound files, video files.

The solution of narrower tasks, as well as tasks of a professional nature in various subject areas, is handled by special-purpose application software, which includes: information systems, expert systems, computer-aided design systems, etc.

Information systems (IS) provide ample opportunities in:

enterprise management - a warehouse, office workflow;

accounting - these are systems that have the functions of text, spreadsheet editors and DBMS. Designed to automate the preparation of initial accounting documents, enterprises and their accounting, regular reports on the results of production, economic and financial activities in a form acceptable to tax authorities, non-budgetary funds and statistical accounting authorities;

analysis of economic and financial activities; they are used in banking and exchange structures. They allow you to control and predict the situation in the financial, trade and raw materials markets, analyze current events, and prepare reports.

Expert systems represent a further development of database management systems. They are designed to analyze data stored in knowledge bases. Unlike DBMS, which allow data manipulation operations, expert systems perform logical data analysis and have self-learning functions.

Computer-aided design systems - allow drawing and designing various mechanisms using a computer, are used in mechanical engineering, construction, architecture. They allow you to create drawing documentation adapted to a specific subject area, and also have reference books, calculation tools. Widely used programs such as AutoCAD, ArchCaAD, etc.

Complex or network) consists of technical and system maintenance of the system and its use for its intended purpose - for data processing. Maintenance (technical operation) - ensuring the operability of the system by creating the required operating conditions (power supply, temperature, etc.) and carrying out preventive and repair work. The main indicator of the quality of maintenance is the availability of the system (components), which characterizes the proportion of "time during which the system (components) is operational. The increase in the availability of the system is achieved by reducing equipment downtime due to preventive and repair work. On the effectiveness of maintenance The following factors most significantly influence: 1) system operating conditions (power supply stability, temperature, cleanliness of the environment, etc.): 2) reliability and maintainability of the system, the degree of perfection of monitoring and diagnostic tools; 3) maintenance mode and qualification of maintenance personnel; 4) completeness crash and failure data technical means. To improve the efficiency of maintenance, the systems provide for the accumulation of data on errors, failures and failures. Data is collected by recording the state of the system at the time of the error detected by built-in controls or programs. Data registration is performed by the operating system in a special system log - an area of ​​​​a magnetic disk drive. Data from the system log is periodically or if necessary printed out and used by maintenance personnel to identify sources of errors, failures and failures in order to carry out preventive and repair work.

System maintenance

System maintenance (system maintenance) - ensuring the efficiency of using the system, aimed at reducing the cost of data processing, improving system performance, the quality of user service, etc. The main tasks of system maintenance: 1) selection and adaptation of operating systems, including system-wide software; 2) setting the operating system for the workload - the organization and selection of system operation parameters that provide the required quality of user service and maximum performance; 3) improving the configuration of the system - the composition of the device and the connections between them. All tasks of system maintenance are reduced to mutual coordination of the configuration, system operation mode and workload to ensure the required quality of user service - organizing the necessary data processing modes, increasing productivity, reducing response time and data processing cost. The choice of operating system is made based on the configuration of the computer system (processor performance, capacity random access memory, the composition of external memory and input-output facilities), the need for data processing modes (concentrated, telecommunication, network, batch, interactive, etc.) and the main properties of the workload (composition and characteristics of the tasks solved by the system). The operating system adapts to the configuration of the computing system and the needs of users by generating a variant that must contain the necessary device and memory management tools, data access methods, and provide the required data processing modes. In this case, the RAM and external memory are divided into areas provided to the system and application software. The system-wide software includes the necessary tools for automating programming, working out symbolic and graphic information, database management, teleprocessing, etc. The resulting version of the operating system determines the possible modes of functioning of the computer system and data processing with an accuracy of parameter values ​​that set the level of multiprogramming, the value of the quantum of processor time, the number of system I / O processes and other indicators that are set and changed during the operation of the computing system by adjusting the operating system to the current workload.

Operating system setup

When generating an operating system, the workload can only be roughly predicted. Moreover, it changes over time. Therefore, the adjustment of the operating system to a real workload is carried out on a working computer system and is repeated many times. The purpose of tuning is to improve system performance and provide the required processing speed - the required response time. Tuning comes down to assigning operating system parameters: multiprogramming level, processor time quantum, buffer sizes, job and task scheduling algorithms, memory and device management algorithms, etc. containing monitors and means of processing measurement data. The functioning of the computing system is evaluated by the combination of the following characteristics: 1) resource intensity of the work performed, workload and system load; 2) loading of system resources and structural loading; 3) system-wide - performance, response time and process profiles. By analyzing the registered Characteristics, overloaded and underused system resources and bottlenecks that negatively affect performance and response time are identified. Using the operating system settings, you can change the level and structure of resource loading, process profiles and, consequently, performance and response time. The effect achieved by changing the tuning parameters is predicted either heuristically, based on a priori ideas about the degree of influence of the parameters on the system characteristics, or using performance models. The way information is placed in system memory has a significant impact on performance and response time. Thus, the intensity of external memory access strongly depends on which operating system modules are declared resident and placed in RAM. The access time to magnetic disk drives significantly depends on the order in which data sets are placed on the drives and within each drive. With the help of monitors, the intensity of calls to each of the drives (data volume) and data set is determined, as well as the distribution of the intensity of calls by the cylinders of the drives. Due to the redistribution of data across volumes, an even loading of external storage devices is ensured, and, consequently, the access time to external memory is reduced. 3a, by moving data sets within each volume, the access time to the drives is reduced. Systematic work on measuring and analyzing the functioning of the computer system and setting the operating system allows you to optimize the values ​​of the tuning parameters. In this case, further tuning cannot provide significant improvements, and in order to improve performance, it is necessary to improve the system configuration: increase the number of devices or use devices with higher characteristics.

Computer system configuration

Improving the configuration of the computer system is carried out in the same way as setting up the operating system. With the help of measurements, the necessary data on the functioning of the computing system are obtained, in particular, data on the loading of devices. If the load of individual devices or groups of relative devices is close to the limit and the operating system setting is not able to change the load, you need to increase the number of appropriate devices, such as magnetic disk drives, communication channels, or use devices with better characteristics. Performance models are used to evaluate the impact of system configuration improvements that predict system performance and identify best option configuration development. Changing the configuration entails the need to work on adjusting the operating system to the new configuration and workload. The possibilities of evolutionary development of the configuration and improvement of the processing mode to meet changing requirements may be exhausted. Then there is a need for qualitative changes - a complete replacement of computers with a more productive or preferable one in terms of other characteristics. This problem in the practice of systematic exploitation is called the problem of choice. In a rigorous formulation, the choice problem is a complex multi-parameter and multi-criteria optimization problem, the methods for solving which are far from complete. In practice, the problem is solved in terms of choosing from a certain number of industrially mastered or planned for release systems. The choice is based on resource estimates and experience in using available funds. For selection, the following data should be obtained: 1) on the use of available resources by tasks of various classes; 2) on the use of resources to provide various processing modes (batch, online).

Forecasting

The forecast of changes in the volume and composition of the load, processing modes and maintenance requirements should be based on the relevant organizational and technical and economic prerequisites. The complexity of forecasting lies in the fact that in order to obtain a reliable forecast, it is necessary to have data on the resource intensity of various classes of tasks and their impact on computer utilization indicators. To obtain such data, it is necessary to analyze the entire process of using computers in a particular field of application. The forecast of needs for computing resources is associated with planning and economic data, for example, with a planned change in the volume of output or the volume of design and other work. The prediction results should determine the required service rate for the main types of resources (processor and I/O device) for each task class and processing mode. The second step in the selection is to compare the predicted resource requirements with the characteristics of potential configurations. Initially, the processor performance is selected, which should be sufficient to process the task flow. The performance score is obtained by summing the service rate across different task classes for batch and online mode and operating system. Based on the score obtained, the nominal processor performance is selected. The choice of the input-output system configuration consists in determining the composition of peripheral devices, including channel equipment, sufficient for the predicted load. It is necessary that throughput I/O, primarily disk storage, was in line with the predicted I/O rate, given online response time constraints.

Links

  • Aven OI, Gurin NN, Kogan Ya. A. Quality assessment and optimization of computing systems. Moscow: Nauka, 1982.
  • Larionov AM Computer systems, systems and networks. Leningrad: Energoatomizdat. Leningrad branch. 1987.
  • Ferrari D. Performance evaluation of computing systems: Per. from English. M.: Mir, 1981.

Wikimedia Foundation. 2010 .

Send your good work in the knowledge base is simple. Use the form below

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://www.allbest.ru/

maintenance computer chipset interruption

Introduction

1. Theoretical part

1.1 Initial data

2. Practical part

Conclusion

List of sources used

Introduction

In order for your computer to work without failures, it is necessary to carry out periodic maintenance. Maintenance can include:

Mechanical operations for cleaning computer components from dirt and dust

Operations related to protecting the operating system

Operations of periodic cleaning of unused programs

Fixing errors in the registry

Organizing information on hard drives

All this will help the computer to work at full capacity and delight you with the results of your work.

Mechanical cleaning during maintenance should be carried out for home computers at least twice a year, for computers used in the office, at least four times. To do this, the computer is disassembled and its components are blown with compressed air. If necessary, a soft brush is used along with air. This evaluates the condition of the fans of the power supply, processor, video card and system fans. If during operation they make extraneous sounds, then they are replaced with new ones.

Maintenance of the operating system (cleaning) is necessary to speed up the boot of the computer, maintain its performance and eliminate the occurrence of errors and failures during operation.

Very often a situation arises that after some time after buying a new computer or reinstalling the operating system, the computer starts to boot longer, and programs run slower. This is caused by the activity of the user, who forgets to uninstall programs that he does not use. However, there are programs that, even when uninstalled, "forget" to delete some files, folders and registry keys created by them. In this case, you need to remove these traces using special utilities. Organizing information on hard drives, called defragmentation, is used to speed up the reading of files from a hard drive, which directly affects the speed and comfort of working with a computer.

All these operations (maintenance) must be carried out depending on the intensity of work on the computer at intervals from once a month to once every six months.

The main objective of this work is to consolidate theoretical knowledge in the discipline under study, to gain practical skills in maintaining and diagnosing BT equipment, which will help to better navigate in the future in professional matters.

1. Theoretical part

Maintenance is a set of activities aimed at creating optimal conditions for the operation of the equipment in order to extend the uptime of the computer.

Types of technical condition of the object (SVT)

These most important properties of reliability characterize certain technical conditions of the object.

According to GOST 27.002-89, there are five main types of technical condition of objects:

Good condition - the state of the object, in which it meets all the requirements of regulatory and technical and (or) design (project) documentation.

Faulty state - the state of an object in which it does not comply with at least one of the requirements of regulatory and technical and (or) design (project) documentation.

Operational state - the state of the object, in which the values ​​of all parameters characterizing the ability to perform the specified functions comply with the requirements of regulatory and technical and (or) design (project) documentation.

Inoperable state - the state of the object, in which the value of at least one parameter characterizing the ability to perform the specified functions does not meet the requirements of regulatory and technical and (or) design (project) documentation.

The limiting state is the state of an object in which its further operation is unacceptable or inexpedient, or the restoration of its working state is impossible or inexpedient.

The transition of an object (product) from one higher technical state to a lower one usually occurs as a result of events: damage or failures.

Failure is an event consisting in violation of the operable state of an object.

Damage is an event consisting in violation of the healthy state of an object while maintaining a healthy state.

GOST 15467-79 introduces another concept that reflects the state of an object - a defect.

A defect is each individual non-compliance of an object with established standards or requirements. A defect reflects a state other than a failure.

There are two types of preventive actions:

Active

Passive

Active preventive maintenance performs operations whose main purpose is to increase the uptime of the PC. They come down mainly to periodic cleaning of both the entire system and its individual components.

Passive prevention usually refers to measures aimed at protecting the PC from external adverse effects. We are talking about installing protective devices in the power supply network, maintaining cleanliness and an acceptable temperature in the room where the PC is installed, reducing vibration levels, etc.

Active preventive maintenance methods:

System backup. This operation allows you to restore system performance in the event of a fatal hardware failure. For backup, you need to purchase a high-capacity storage device.

Cleaning. One of the most important elements of preventive maintenance is regular and thorough cleaning. Dust that settles inside a PC can cause many troubles. Firstly, it is a heat insulator, which impairs the cooling of the system. Secondly, dust necessarily contains conductive particles, which can lead to leakage and even short circuits between electrical circuits. And finally, some substances contained in the dust can accelerate the process of oxidation of contacts, which will eventually lead to broken electrical connections.

Installing microchips in their places. When servicing, it is very important to eliminate the effects of thermal displacement of microcircuits. Since the PC heats up and cools down when turned on and off, the microcircuits installed in the sockets gradually “creep out” of them. Therefore, you have to find all the components installed in the sockets and put them in place.

Cleaning connector contacts. It is necessary to wipe the contacts of the connectors so that the connections between the nodes and components of the system are reliable. You should pay attention to the expansion connectors, power supply, keyboard and speaker connections located on the motherboard. As for the adapter boards, they need to wipe the printed connectors inserted into the slots on the motherboard, and all other connectors.

Preventive maintenance of hard drives. To ensure the safety of data and increase the efficiency of the hard disk, it is necessary to perform some maintenance procedures from time to time. There are also several simple programs with which you can to some extent insure yourself against data loss.

Data defragmentation. As you write files to the hard disk and delete them, many of them become fragmented, ie. are broken up into many pieces scattered all over the disk. By periodically performing file defragmentation, you solve two problems at once. First, if files occupy contiguous areas on the disk, then the movement of the heads during their reading and writing becomes minimal, which reduces wear on the drive and the disk itself. In addition, the speed of reading files from disk is significantly increased. Secondly, the data is easier to recover if the files are written as a whole.

Tools for preventive support:

1 set of disassembly and assembly tools.

2 Diagnostic devices and PC testing software.

3 Instruments for measuring voltage, resistance and probes.

4 Chemicals for wiping contacts, spray gun with

coolant and compressed air bottle.

5 Specialized hand tools, a device for

chip replacements.

6 Test connectors for testing serial and parallel ports.

7 Memory testers.

8 Equipment for testing.

1.1 Initial data

Number of PCs - 4

Table 1 Hard drive capacity.

HDD capacity GB

Chipset type AMD-750

Number and type of printers:

1. Samsung SCX 4200,

Paper consumption 45 thousand l/year

Component failure rate:

1. Keyboard 8.8E-06;

2. Mouse 6.1E-06;

Current PC Status: 70xx

Additional task: Check the interrupt settings.

2. Practical part

2.1 Analysis of the state of the PC and measures to restore the working state of the PC

By order of the AMD-750 chipset. AMD-750 - chipset for AMD Athlon and Duron processors. This is a rather old and already discontinued set of logic. In terms of its characteristics, AMD-750 is clearly inferior to its competitors: VIA Apollo KX - for the Slot A platform and VIA Apollo KT133 and others - for the Socket A platform. Therefore, it is not recommended to buy a motherboard based on this chipset. AMD-750 is the first chipset targeted at mainstream processors that are electrically and logically incompatible with Intel processors, but compatible with them in software. The latter circumstance is significant, since it allows to ensure the trouble-free operation of the same system and application software developed for the traditional architecture and command system that have become classic, and for which, of course, taking into account all the latest achievements, processors and specialized sets are designed and produced.

The processor bus controller (FSB) built into the AMD-750 chipset provides data transfer at a frequency of 200 MHz with a processor bus clock frequency of 100 MHz. This bus consists of three high-speed independent channels: 13 bits - processor request channel, 13 bits - system probe channel, 72 bits - data transfer channel (8 bits ECC - error correcting code). The peak data transfer rate reaches 1.6 GB/s (200 MHz x 8 bytes - 1.6 GB/s).

Advantages of the chipset: cheap board based on it, rather high-quality implementation of UDMA-66 and memory controller, stability.

Cons of the chipset: lack of support for PC133 SDRAM, AGP 4x, UDMA-100, built-in audio, and much more.

Conclusion: a chipset for super-budget machines that don't need extra (or not superfluous...) bells and whistles.

Figure 1 - Diagram of the AMD-750 chipset (simplified).

Table 2 Summary technical specifications AMD-750 chipsets.

Chipset modifications

Supported processors / platform

AMD Athlon / Duron Slot A, Socket A

north bridge

south bridge

FSB frequency

Memory frequency

Supported memory (maximum)

ATA mode

Graphic slot

Other features

Support ISA, USB

Unique Phoenix Bios chipset error codes.

BIOS manufacturers provide the user with a fairly wide range of options for changing the operating modes of almost all computer components. This, first of all, assumes that the owner of the PC has a certain qualification and quite consciously makes changes to the BIOS settings.

Users often do not see the difference between software and hardware parts of a computer. This can be explained by the high degree of integration of the system components. An accurate representation of the difference between computer components provides a key to understanding the role of the BIOS. The term BIOS is used to describe the basic input/output system. Essentially, the BIOS is an "intermediate layer" between the software and hardware parts of the system.

The BIOS is not like standard software because it resides in chips installed on the system board or adapter cards. The BIOS in a PC can usually be found in the following system components:

ROM system board;

ROM adapter board (for example, video adapter);

· Data on disk loaded into RAM (device drivers).

The system BIOS contains drivers for the main components (keyboard, floppy drive, hard drive, serial and parallel ports, etc.) required for the initial start of the computer.

Phoenix provides technical support and documentation at: http://www.phoenix.com;

Troubleshooting

It should be borne in mind that often a malfunction is associated with the banal incompatibility of various hardware components of the computer and is corrected by replacing it with components of a different type (manufacturer).

Computer failure can occur for two reasons:

1. Due to the installation of incorrect operating modes of computer components.

2. Due to the failure of one or more computer components.

To troubleshoot, you need to check all components with special software tools. There is also a POST program built into the bios.

When the computer is started, a separate test is performed for each individual hardware (processor, memory, video card, keyboard, input / output ports, etc.). Each test has its own unique number, which is called the POST code. The POST code is written to the Manufacturing Test Port (address 0080H) prior to each individual POST test.

After the POST code of the test is written to the Manufacturing Test Port, the procedure for testing the corresponding equipment begins. If the test procedure fails, the POST code of the last procedure (which caused the error) remains in the Manufacturing Test Port. If you know the POST code of the last procedure, you can determine the device that caused the error.

The output of the POST code to the diagnostic port is accompanied by the output of a sound signal to the system speaker. The scheme for generating an audio signal is as follows:

Eight-bit code is converted into four two-bit groups

* The value of each group increases by one

* According to the received value, a short beep is generated

For example: code 16h = 00 01 01 10 = 1-2-2-3

Table 3 lists the main Phoenix BIOS POST codes.

Table 3 POST codes.

Description

Description

Checking the current operating mode of the processor.

Hardware interrupt vectors are being set.

Disable NMI interrupts.

Starting the system for monitoring voltages and temperatures and the operation of fans.

Determine the type of processor installed.

The coprocessor is being initialized.

The initial initialization of the interrupt and DMA controllers is in progress.

I/O controller and interrupt resources are disabled.

Early initialization of chipset registers.

Serial ports are detected and set.

Set the POST execution software flag to indicate that a POST is currently in progress.

External IDE controllers are being configured.

CPU software resources are being initialized.

Parallel ports are detected and installed.

Initialization of ISA Plug snd Play devices.

Cache initialization. The cache memory registers of the first and second levels are set.

I/O controller and interrupt resources are enabled. These resources are configured according to the Setup settings.

Initialization of I/O resources (Super I/O).

Motherboard devices are being configured.

Initializing the IDE controller.

The values ​​of the BIOS variable block in the Data Area are set.

A non-maskable interrupt (NMI) is enabled.

Setting alternative register values.

Extended BIOS Data Area initialization in progress/

Setting the MSW (Machine Status Word) register value.

Testing and initializing a PS/2 mouse.

Initialization of PCI devices that support Bus Mastering mode.

The floppy drive controller is initializing.

Keyboard controller initialization.

Determining the number of connected ATA devices.

The ROM BIOS checksum is checked. If an error occurs, a beep will be output from the system speaker.

The hard disk controllers are initializing.

Determining the amount of cache memory.

Configuring hard disk controllers.

The system timer initialization process (8254) is in progress.

DMA controller initialization.

The programmable interrupt controller is reset.

Configuring the CDROM drive.

The formation of requests for regeneration of dynamic RAM is checked. If an error occurs, a beep will be output from the system speaker.

Building a configuration table for multiprocessor systems.

The keyboard controller is running a self-test process. If an error occurs, a beep will be output from the system speaker.

Finding and initializing the BIOS of additional devices. If an error occurs, a beep will be output from the system speaker.

Line resolution A20.

The hard drives are being checked by the SMART procedure.

The procedure for determining the amount of installed RAM is performed.

The contents of ROM are written to RAM.

Initializing POST Memory Manager

The Power Management system is being configured.

Zeroing 512 KB of main memory.

The system of protection against unauthorized access is being launched.

In the process of testing the memory address lines, a failure was detected on the xxxx address line.

Hardware interrupts are enabled.

While testing the data lines, a failure was detected on the xxxx address line.

Determining the number of connected ATA and SCSI devices.

Cache memory is enabled.

Set the system time according to the real time clock (RTC).

The RAM test is in progress. If an error occurs, a beep will be output from the system speaker.

Checking the status of the Key Lock. If this key is active, reception of SCAN codes from the keyboard is prohibited and a corresponding message is displayed on the monitor screen.

Determining the clock frequency of the CPU, the frequency of the system bus.

Programming the keyboard controller for the auto-repeat frequency and waiting time before entering the auto-repeat mode according to the BIOS Setup settings.

Phoenix Dispatch Manager initialization.

The message "Press F2 to enter SetUp" is removed from the screen

Re-initialization of registers.

The F2 key is pressed.

The chipset is reinitialized.

If the F2 key was detected in the previous step, the BIOS Setup program starts.

The system BIOS code is unpacked and overwritten in Shadow RAM (shaded memory).

Clears the system reboot flag, which is performed by pressing the CTRL+ALT+DEL key combination.

The cache controller is reinitialized.

Display the message "Press F1 to resume, F2to Setup" if errors are found.

The cache size is re-determined.

Completion of the POST procedure. The system is preparing to boot the OS.

Advanced configuration of chipset registers.

Issuing a sound signal before loading the OS.

The chipset registers are configured according to the CMOS Setup settings.

Completion of the Quiet Boot procedure - accelerated system boot mode, (if the Quick Boot option is set to Enabled).

Determination of the CPU clock frequency.

Password request (if provided in the BIOS Setup settings).

Initialization of interrupt vectors in the vector table.

Searches for boot devices.

The checksums of individual BIOS blocks are calculated. If an error occurs, a beep will be output from the system speaker.

Initialization of DMI parameters.

The RAM parity check circuit is reset to zero.

Initializing the PCI bus and setting the parameters of the PCI controller.

Formation of the boot device selection menu.

Initialize detected video adapters.

Screen cleaning.

Starting the Quiet Boot procedure - accelerated system boot mode (if the Quick Boot option is set to Enabled).

Activation of protection against boot viruses.

The content of the VGA BIOS ROM (Video Adapter BIOS) is overwritten into temporary memory.

Execute BIOS interrupt INT 19h. The boot process is controlled by the initial sector bootloader.

Display on the screen information about the BIOS version.

The output is not an error message screen.

The type and clock frequency of the processor is displayed on the monitor screen.

Initialization of the system error handling routine.

Initialization of the controller and EISA bus devices.

Extended CMOS block initialization.

The keyboard is being tested.

The docking station (laptop) is initializing.

The keystroke sound mode is turned on.

Handling interrupts from unknown devices.

USB bus initialization.

Initialization and configuration of chipset registers.

Unattended interrupt requests are searched for. If an error occurs, a beep will be output from the system speaker.

Initialization and configuration of chipset bridges (north and south).

Initializing the POST display service procedure.

CPU initialization.

Displaying the message "Press F2 to enter SETUP"

Initializing the system timer.

Prohibit the use of cache memory.

Super I/O chip initialization (I/O resources).

Checking memory in the range of 512 and 640 KB.

The state of the Recovery jumper is checked, which allows you to perform a forced recovery of the BIOS.

Testing Extended Memory (extended memory).

BIOS checksum check.

Checking Extended Memory address lines.

If it is found that the BIOS checksum is not calculated correctly, control is transferred to the BIOS.

Transfer control to a module generated by the board manufacturer.

Launch of multiprocessor system support.

Setting cache registers.

Initialization of special (non-standard) equipment.

APIC controller initialization.

Programming interrupt controllers, DMA controllers.

Allow cache usage.

The contents of the Boot Block are being copied to Shadow RAM.

Preparation of the SMMRAM memory area - System Management Mode RAM, in which the SMI (System Management Interrupt) processing procedure is stored.

The RAM is being tested.

A message about the size of the L2 cache is displayed on the screen.

Interrupt vectors are being initialized.

The real time clock is being initialized.

A message about the use of Shadow RAM is displayed on the screen.

Finding and checking the video adapter, as well as its initialization.

A message about Upper Memory Blocks (UMB) is displayed on the screen.

Initializing System Management Mode.

Error messages are displayed on the screen.

Issuance of a single sound signal before loading the OS.

The system configuration is being checked. As well as matching the current system configuration and information in CMOS. Possible message "Press F1 to resume, F2 to Setup".

Checking information about keyboard errors and then displaying the corresponding messages on the screen.

If all the same the problem is in Bios, then the solutions are as follows:

1. BIOS reset

Resetting the BIOS is bringing the values ​​​​of the parameters to the state selected by the motherboard manufacturer as the safest.

The need for this arises in several cases:

1. The computer does not respond to pressing the power button with an ATX power supply or does not show any signs of life with AT (recommended if this happened after trying to overclock the CPU or system bus using BIOS settings).

2. The computer turns on, but makes some strange sounds and does not want to load the operating system (recommended if this happened when changing parameters such as the time and depth of RAM regeneration, etc.).

3. The computer works, but is not stable. It freezes after a while, or its performance is too low (recommended after experimenting with various parameters if you cannot find the cause of the malfunction).

5. You are trying to set up someone else's computer and the CMOS Setup Utility program has an unknown password.

6. You have forgotten the password to boot the computer, and there is a need to work on it.

There are two ways to reset the BIOS:

1. Turn off your computer. Find the jumper on the motherboard responsible for Clear CMOS, as a rule it is located near the battery. Put it from its original position (1-2) to position (2-3). Wait 10-15 seconds, move the jumper back to position (1-2). In addition, it is better to disconnect the power cable from the power supply.

2. Turn off the computer. Find a round flat battery on the motherboard. Gently pull it out of the nest, bending the latch, and put it separately. Wait 1 minute. Insert the battery back.

2. BIOS update

Updating the ROM BIOS may improve system performance. However, sometimes the update procedure can be complicated, in any case, it is much more difficult than connecting ROM chips. The ROM BIOS program enhances the "intelligence" of computer components.

Updating the BIOS can often improve the performance of your computer and enhance its capabilities. It is thanks to the BIOS that different operating systems can function on any PC compatible computer, despite the difference in hardware. Since the BIOS manages the hardware, it must take into account their features.

A ROM BIOS update may be needed in the following cases:

R When installing an LS-120 (SuperDisk) or Iomega Zip drive;

R When adding bootable USB devices;

R When adding HDDs larger than 8.4GB or 137GB (48-bit LBA mode);

R When adding UltraDMA/33, UltraDMA/66, or UDMA/100 IDE hard drives;

R When adding CD-ROM boot drives (El Torito specification);

R When adding or improving Plug and Play support;

R When correcting errors related to changing the system date in 2000 and with leap years;

R When fixing known bugs or compatibility issues with some hardware and software;

R When replacing the processor;

R When adding support for Advanced System Configuration and Power Interface -- ACPI;

R When adding / modifying the function of monitoring the temperature regime of the processor or the operation of the fan;

R When installing USB devices;

R When implementing technology to protect against unauthorized opening of the system unit.

Determining the BIOS Version

The following information is required to replace or update the BIOS:

H Mainboard model;

H Current BIOS version;

R Processor type (for example, Pentium MMX, AMD K6, Cyrix/IBM 6x86MX, MII, Pentium II, Pentium III/4, AMD Athlon, Athlon XP, etc.).

R You can identify the BIOS by the messages that appear on the screen when you turn on the system. True, the BIOS version is displayed on the screen for only a few seconds. Often it can also be found among the CMOS parameters.

BIOS update procedure (If necessary)

Updating the BIOS Using the Bios Update Procedure

1. Download the latest BIOS from http://www.phoenix.com and save it to a floppy disk (flash drive).

2. Use this drive to download.

3. In DOS mode, unzip the downloaded file.

4. In "MAIN MENU", you need to select "Update BIOS from file".

5. After completing the procedure, remove the drive and turn off the power.

6. Reboot the PC while holding down the key and enter the BIOS menu. You need to select "LOAD SETUP DEFAULTS" to activate the new BIOS, then configure other BIOS menu items.

If, nevertheless, it is necessary to replace the ROM BIOS chip, follow a series of steps:

1. Save all CMOS memory settings.

3. Remove the housing cover.

4. Remove any components that prevent free access to the ROM BIOS chip. Don't forget to wear an anti-static wrist strap! If you did not have time to purchase it, then before performing the described actions, touch the chassis of the system with your hand.

5. Using a chip extraction tool or a screwdriver, pry the ROM BIOS chip from its socket on the system board.

6. Install the new ROM BIOS chip into the system board socket.

8.Replace the chassis cover, plug in the power cable, and turn on the computer.

10. Restart your computer.

3. Chip replacement

The procedure for replacing the BIOS chip can be useful if you have previously created a backup copy of the system BIOS, and there is a need to replace the damaged original with it. This procedure can also be used if the system has a removable Flash-ROM chip installed (this is typical for systems that do not have a BIOS recovery jumper).

Follow these steps to replace the BIOS chip.

1. Save all settings to CMOS memory.

2. Turn off the power and unplug the power cord.

3. Remove the case cover and remove any components that prevent free access to the ROM BIOS chip. Don't forget to wear an anti-static wrist strap! If you don't have one, touch the system chassis with your hand before performing the steps.

4. Using a chip extraction tool or a screwdriver, pry the ROM BIOS chip from its socket on the system board.

5. Remove the new EPROM chip from the antistatic package.

6. Install the new ROM BIOS chip into the system board socket. A standard rectangular BIOS chip has a bulge at one end to match the cutout on the connector, so you can't insert the chip incorrectly without damaging it.

7. Replace all previously removed components.

8. Replace the chassis cover, plug in the power cable, and turn on the computer.

9. Enter any previously saved BIOS settings.

10. Save your BIOS settings and restart your computer.

2.2 Drawing up a schedule for the maintenance of computer equipment

Based on the assessment of the actually performed maintenance actions for the PC, a maintenance schedule was drawn up, located in table 4.

Table 4 Maintenance Schedule

Job Title

Duration of work (hour)

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Data archiving

Backup

Based on the maintenance schedule, a PC maintenance schedule has been drawn up.

Table 5 Maintenance Schedule

Job Title

Start date

Expiration date

Executor

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Data archiving

Backup

Disassembly and cleaning

Virus check

Equipment testing

defragmentation

Table 5 continued

Data archiving

Backup

The list of funds required for maintenance:

To clean the PC you will need: a soft brush, a vacuum cleaner.

To test equipment, we use programs: Everest, MemTest.

For data archiving we use WinRar v 4.2.

We use Exiland Backup for backup.

To check the PC for viruses, we use the Dr.Web СureIt program.

For defragmentation, you can use the standard program built into Windows or Defraggler.

2.3 Carrying out additional work

An additional maintenance task is "Checking interrupt settings".

Interrupts or IRQ (Interrupt Request) are signals that tell the processor that it is necessary to process the request received from the device, and the controller of this device sends these signals to the processor, that is, using IRQ, the processor responds to various events.

Assigning IRQ Numbers Using the BIOS

In the system, IRQ numbers are allocated twice between physical lines. The first time the system BIOS does this is when the system boots. Each Plug&Play device (all PCI, modern ISA, integrated devices), or rather, its interrupt line, is assigned one number out of ten possible. If there are not enough numbers, several lines get one common. If these are PIRQ lines, then it's okay - if you have normal drivers and support from the operating system (see below), everything will work. And if several ISA devices or PCI and ISA devices receive the same number, then a conflict is simply inevitable, and then you need to intervene in the distribution process.

First of all, you need to disable all unused ISA devices (in systems without ISA slots, they are also present) - ports COM1, COM2 and the drive. You can also disable the EPP and ECP modes of the LPT port, then the IRQ7 interrupt will become available.

In BIOS Setup, we need the "PCI / PNP Configuration" section. There are two basic ways to influence IRQ number allocations: block a specific number, and assign a PIRQ line number directly.

The first method is available for all BIOSes: find the list of items "IRQ x used by:" (in newer BIOSes it is hidden in the "IRQ Resources" submenu). Those interrupts that should be assigned exclusively to ISA devices should be set to "Legacy ISA". Thus, when distributing numbers to PCI devices, these interrupts will be skipped. You should do this if any ISA device stubbornly gets on the same interrupt with the PCI device, because of which both do not work. Then we find the number of this IRQ and disable it in the BIOS Setup. PCI device transitions to new number IRQ, but the ISA device remains. The conflict is resolved.

The second, more convenient way to manage IRQ numbers is direct assignment. In the same BIOS Setup submenu, there may be items like "Slot X use IRQ" (other names: "PIRQx use IRQ", "PCI Slot x priority", "INT Pin x IRQ"). With their help, each of the four PIRQ lines can be assigned a specific number. By the way, in the new AwardBIOS 6.00 you can see which devices (including built-in ones) use a particular line.

Figure 2 - IRQ allocation in BIOS.

Interrupt Priorities in Windows Vista and 7

Utilities System Information (msinfo32.exe) - shows which devices under which number.

Figure 3 - System Information utility.

To edit the interrupt number you need to open the registry editor and go to

HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\PriorityControl

Figure 4 - PriorityControl

Create a new DWORD value and name it IRQ13Priority, where 13 is the IRQ number of the device you want to set priority to (for example, for IRQ13Priority - IRQ 13, our digital processor).

Figure 5 - IRQ13Priority.

By clicking twice on the new value, and enter the number of its priority 1. Enter 1 for the priority, 2 for the second, and so on. Make sure not to enter the same priority number for two entries, and keep it.

2.4 Calculation of the composition of spare parts and accessories to ensure the stable operation of computer equipment

To calculate disks for backup, you need to

determine the number of required DVDs:

N DVD =V HDD (GB)/4.7,(1)

V HDD = 40+80+60+40= 220 GB,

N DVD \u003d 220 / 4.7 \u003d 47.

47 DVDs are required for backup.

Calculate the required amount of hardware needed to maintain the performance of computing facilities throughout the year.

To calculate the number of spare device devices, you must:

1) Determine the probability of failure-free operation of devices using the formula:

where t is the guaranteed operating time of the device;

l - failure rate is:

Keyboard 8.8E-06;

Mouse 6.1E-06;

The probability of failure-free operation of devices is 0.9.

2) Determine the guaranteed operating time of devices by the formula:

t cl \u003d 0.10536051565 / 8.8 E-06 \u003d 11972.78 hours,

t mouse \u003d 0.10536051565 / 6.1 E-05 \u003d 1727.22 hours,

t HDD =0.10536051565/2.8 E-07= 376287.55 hours.

3) Determine the number of spare devices according to the formula:

N=t exp /t,(4)

where t exp is the total time of using the device during the year;

The operating time of the devices per year is approximately 2400 hours. The company has 4 computers. Therefore, the operating time of all devices is 9600 hours.

N cl \u003d 9600 / 11972.78 \u003d 0.8,

N mouse = 9600/1727.22 = 5.55,

N HDD = 9600/376287.55 = 0.02.

Considering the results of rounding up, we get that in order to ensure the operation of the PC during the year, it is necessary to have in addition:

1 keyboard;

6 mouse manipulators;

1 winchester.

2.5 Calculating the amount of consumables

By assignment, we use two samsung printer SCX 4200 and HP LJ 1000.

Printer specifications are shown in tables 4 and 5 .

Table 4 Specifications of Samsung SCX 4200

Description

Compact 3 in 1 multifunctional laser device (copier, flatbed scanner, printer)

Print technology

laser printing

Paper size

Maximum print speed (A4)

18 ppm (mono)

Color rendering

monochrome

Print resolution up to

10000 pages

Warm-up time

Print management languages

SPL (Samsung GDI)

Copy speed monochrome

18 ppm (maximum)

First page out time

Number of copies per cycle

Scaling

Scanner type

tablet

Everything man-made that is of value to man must be maintained in order to fulfill its functions. This is especially true for computer technology. So, it is necessary to ensure that all components work, that a lot of dust does not settle inside closed boxes, and much more. You have to watch so that even the wires and connectors do not move away from their places. In order to avoid problems, it is initially necessary to design and install everything necessary. Manufacturers are doing a good job with these tasks (if we talk about computers and smartphones). But what can be said about why additional intervention is needed? Here, for example, maintenance of computer networks and systems. After all, this is not an easy task! By the way, depending on the complexity, sometimes they say "maintenance of computer and intelligent systems and networks." What is it, how does it happen, what skills are needed? Let's talk about this.

What is meant by service and systems?

This is a necessary, though not feasible task for everyone, which consists in designing, installing and laying cables, as well as setting up the operation of equipment. If you have experience, maintaining computer systems and networks is not difficult. When deciding to do everything with your own hands, you need to decide on the point from which the connection will go, along which route, how it will all be attached, and much more. When setting up computer systems, it is also necessary to solve a whole range of issues: what software to use, how to optimize the operation of equipment, what restrictions to set, how to connect to a local / global network. See? There is a lot to work on. And it's not as easy as it might seem at first glance. Therefore, in order to avoid problems with sagging and interfering wires, you have to decide how everything will be done, fixed, so as not to affect the aesthetic appearance of the room. It should be noted that it makes sense to lay a computer network if more than 3 are used. The fact is that if there are two of them, then the most rational solution is to connect directly. When there is only one computer at all, then there is no need to talk about anything.

Maintenance of computer systems and networks - what is it and how is it implemented?

Let's focus more on the technical part. Three main components of computer network maintenance:

  1. Complex design.
  2. Installation of cable routes.
  3. Wiring.

Speaking of computer network maintenance, it is impossible to make such an exact list, because it is potentially huge. Let's focus on the most important elements:

  1. Setting up the necessary software.
  2. Optimization of the operating system, RAM, registers.
  3. Checking the functioning of the hardware using the BIOS and troubleshooting possible problems.
  4. Cleaning disks from trash that has not been used for a long time.
  5. Carrying out diagnostic and restoration work.

Integrated design

What is meant by this? This includes building a plan for what will be done and how. The following technologies can be used:

  1. Using
  2. Using wireless technology.
  3. The use of optical developments.

It is necessary to consider what and how should be laid, what will be used for fasteners and what are the best ways. It also provides for the presence of routers, routers, servers and many other units computer technology, which is necessary for the full operation of large networks.

Installation of cable routes and laying of wires

This is necessary for a more detailed implementation decision:

  1. Use of trays or cable racks.
  2. The use of plastic boxes.
  3. The use of corrugated pipes.
  4. Application of sewer technology.

Diagnostics, cleaning and recovery of computer systems

First, about diagnostics. It is necessary to check all disks for errors, the same action applies to RAM. Then, with the help of special software, registers are cleaned and applications that are not used for long periods of time are removed. Also, information is defragmented that is in the physical ones. And at the very end, they check and restore the health of damaged disk sectors (if these problems exist).

Work optimization

An important component when talking about the maintenance of computer networks and systems. The fact is that for this it is necessary to revise the work of the register and clean it of garbage, check the applications that run with the operating system and negatively affect the download speed. At the same time, you can configure the processor to show its maximum (but the negative side of this approach is increased energy consumption and a 10-20% reduced service life).

Also, to get more speed, it will be useful to turn off visual effects and, accordingly, speed up the execution of your own. This procedure will be especially useful for office computers, which usually cannot boast of significant speed. There are still optimization possibilities, but they are more related to individual programs, such as developing special settings or working with system files in order to ensure that the application runs prospectively at the hardware level.

Choice between self-employment and hired company

This kind of work is still desirable to be done by professionals. When creating everything with your own hands, you need to take into account that you may have to drill the walls (which implies the presence of the appropriate tool) and you need a supply of wires and connecting parts. Maintenance of computer systems and networks at home is much easier than at work. You can forget about all this if the work is done by professionals, but there is the problem that they need to pay an amount that is approximately 1000-2000 rubles. In addition, the maintenance of computer networks and systems by professionals will allow you to do all the necessary actions more quickly than with your own hands. Although the latter option will provide valuable experience, which is not known where else it will come in handy.

Conclusion

As you can see, it's not very difficult. Of course, working with a computer is easier due to the presence of many recommendations on what to do and how, besides, it does not require manual dexterity, you just need to start the necessary processes, and the machine will do everything by itself. This is such a thing - maintenance of computer networks and systems.