Fire Safety Encyclopedia

Computer maintenance in the workplace

Send your good work in the knowledge base is simple. Use the form below

Good work to the site ">

Students, graduate students, young scientists who use the knowledge base in their studies and work will be very grateful to you.

Posted on http://www.allbest.ru/

Introduction

Goals and objectives of industrial (professional) practice

The industrial practice of students of educational institutions of secondary vocational education is an integral part of the educational process and is aimed at consolidating and deepening the knowledge and skills acquired by students in the learning process, as well as mastering the system of professional skills and abilities

The internship is organized in accordance with the State Standard of Secondary Vocational Education in terms of State Requirements for the minimum content and level of training of graduates for mastering the initial experience of professional activity.

The tasks of the practice are to generalize and improve the knowledge and skills in the specialty obtained in the laboratories of the educational institution, as well as at the enterprises during the practice in the specialty profile; checking the possibilities of independent work of the future specialist; preparation for the final state certification (final interdisciplinary exam in the specialty).

Time budget allocation

The duration of the internship (qualification) practice is 10 weeks.

During practice, students perform duties in accordance with the job description.

The distribution of the practice time budget is shown in Table 1.

local network software diagnostics

Table 1 Distribution of the practice time budget

Chapter 1. Acquaintance with the goals and objectives of the practice

1.1 Individual assignment for practice

An individual plan for internship training - familiarizing students with technological processes and relevant equipment at enterprises operating computers and computer networks, as well as consolidating the knowledge gained in the study of special-cycle major subjects: "Design, layout of personal computers, computer maintenance", " Network equipment and system software of computer networks "," Computer peripherals "," Databases "," Modern information technologies ", the formation of skills of work culture and conscientious attitude to the assigned work.

As a result of the practice, students acquire and consolidate skills in maintenance, diagnostics, repair, modernization of electronic means of computing technology (installation work, selection of measuring equipment, measurement of electrical parameters in SVT circuits, finding and elimination of malfunctions, rearranging a PC, connecting additional devices in order to improve their operational parameters).

In terms of the formation and consolidation of skills in using computer software and networks, students should carry out their maintenance, freely using software products.

Application of the learned theoretical skills of creating unified information systems at the enterprise (Local area network). Use of advanced software and technological solutions. Industrial practice of students is carried out in accordance with the current State educational standard of secondary vocational education.

The basis for the practical training of students is based on the following areas:

· Combination of practical training with theoretical training of students;

· Use in teaching the achievements of science and technology, advanced labor organization, methods of work on modern computer technology with the use of new information technologies;

· Stage-by-stage construction of practical training according to the increasing complexity of educational tasks. In connection with the development of technical progress and the constant improvement of production, the practice program must be systematically supplemented with materials about new achievements in science and technology, advanced labor methods, new equipment and devices, etc.

During practice, students study the role of a technician in production; ways of mechanization and automation service and repair work, increasing the productivity of workers; economic indicators of the work of the site, workshop, department, etc.

The objectives of the practice in the profile of the specialty are the mastering by students of professional activity (mastering one or several blue-collar occupations) in the specialty, consolidation, expansion, deepening and systematization of knowledge obtained in the study of disciplines of general professional and special cycles.

Table 2 Tracking hours of practice

Name

Number of hours

Safety briefing and fire-fighting measures; familiarization with the enterprise

Study of the organizational structure of the enterprise, job descriptions at workplaces, document flow

Study of the main characteristics of computer technology

Familiarization with software in the workplace

Computer networks of the organization and their characteristics

Getting to know the server

Production work at workplaces

Internship as an understudy of the head of the maintenance department, studying the organization management structure

Making a diary - practice report

Chapter 2. Acquaintance with the structure of the enterprise, safety engineering

2.1 Familiarization with the company's charter

The charter contains:

· Information about the location of JSC “VMZ KO”;

· Information on the competence of the governing bodies of OJSC “VMZ KO”; including on issues that are the exclusive competence of the general meeting of participants of OJSC “VMZ KO”; on the procedure for making decisions by the company's bodies, including on issues on which decisions are taken unanimously or by a qualified majority;

Size Details the authorized capital of JSC “VMZ KO”;

· Rights and obligations of the participants of OJSC “VMZ KO”;

· Information about the procedure and consequences of the participant's withdrawal from the company;

· Information on the procedure for the transfer of a share (part of a share) in the authorized capital of JSC “VMZ KO” to another person;

· Information on the procedure for storing documents of OJSC “VMZ KO” and on the procedure for the provision of information by the company to the participants of OJSC “VMZ KO” and other persons;

· Full and abbreviated name of JSC “VMZ KO”.

2.2 Familiarization with the plant safety briefing

1. General labor protection requirements

1.1. Individuals at least 18 years of age who have undergone special training, including for the I group of electrical safety, compulsory medical examination and instruction on labor protection, which have no contraindications for health reasons, are allowed to work independently with a computer. From the time of pregnancy, women are transferred to work not related to the use of a computer, or the time of working with a computer is limited for them (no more than 3 hours per work shift), subject to the hygiene requirements established by the Sanitary Rules.

Students from the 1st grade who have been instructed in labor protection, a medical examination and have no contraindications for health reasons are allowed to work with a computer under the guidance of a teacher.

1.2. Computer users must comply with the internal labor regulations, established work and rest regimes.

1.3. When working with a computer, exposure to the following hazardous and harmful production factors is possible:

· Ionizing and non-ionizing radiation of video terminals;

Electric shock when working on equipment without protective grounding, as well as with removed back cover video terminal;

· Visual fatigue, as well as the adverse effect on vision of flickering symbols and the background with unstable operation of the video terminal, fuzzy image on the screen.

1.4. When working with a computer, you must use protective screens.

1.5. The computer room should be equipped with a first aid kit.

1.6. Computer users are required to comply with fire safety rules, know the location primary funds fire extinguishing. The computer room should be equipped with two carbon dioxide fire extinguishers and an automatic fire alarm system.

1.7. Windows in the room where computers are used should mainly be oriented to the north or northeast. Window openings should be equipped with adjustable devices such as: blinds, curtains, external canopies, etc.

1.8. Illumination of workplaces on the surface of the table in the area of ​​the working document should be 300-500 lux. The illumination of the surface of computer screens should not exceed 300 lux. The lighting should not create glare on the surface of the screens. The use of luminaires without diffusers and shielding grilles is not allowed.

1.9. The victim or eyewitness of the accident must immediately inform the school administration about every accident with an employee. In the event of a malfunction of the equipment, stop work and inform the school administration.

1.10. In the process of work, computer users must comply with the rules for the use of personal and collective protective equipment, observe the rules of personal hygiene, and keep the workplace clean.

1.11. Persons who have committed non-compliance or violation of instructions on labor protection are brought to disciplinary responsibility in accordance with the rules of the internal labor schedule and, if necessary, are subjected to an extraordinary test of knowledge of the rules and regulations of labor protection.

2. Labor protection requirements before starting work

2.1. Thoroughly ventilate the room with computers, make sure that the microclimate in the room complies with the current sanitary standards for the microclimate of industrial premises.

2.2. Make sure that the illumination of workplaces with computers is normal.

2.3. Ensure that the equipment is properly grounded and protective screens video monitors.

3. Labor protection requirements during work

3.1. When working with a computer, the values ​​of visual parameters should be within the optimal range.

3.2. The keyboard should be placed on the table surface at a distance of 100-300 mm from the edge facing the user or on a special, height-adjustable working surface, separated from the main tabletop.

3.3. When the video terminal is working, the distance from the eyes to the screen should be 0.6-0.7 m, the eye level should be at the center of the screen or at 2/3 of its height.

3.4. The image on the screens of video monitors should be stable, clear and extremely clear, not have symbols and background flickering, the screens should not have glare and reflections of lamps, windows and surrounding objects.

3.5. Do not work with a computer without protective screens.

3.6. Cumulative time direct work with a computer during a work shift should be no more than 6 hours.

3.7. The duration of continuous work with a computer without a regulated break should not exceed 1 hour. Every 45-60 minutes. work should be done with a regulated break of 10-15 minutes.

3.8. During regulated breaks, in order to reduce neuro-emotional stress, fatigue of the visual analyzer, eliminate the influence of hypodynamia and hypokinesia, prevent the development of poznotonic fatigue, complexes of eye exercises, exercise minutes and exercise pauses should be performed.

4. Labor protection requirements in emergency situations

4.1. In the event of a malfunction in the video terminal, turn it off, inform the school administration about it. Continue work only after the fault has been eliminated.

4.2. If the user experiences visual discomfort and other unfavorable subjective sensations, the time spent working with the computer should be limited, the duration of rest breaks should be corrected, or the activity should be changed to something not related to the use of the computer.

4.3. In the event of an electric shock to the user, immediately turn off the power supply, provide first aid to the victim, if necessary, send him to the nearest medical institution.

5. Labor protection requirements upon completion of work

5.1. Turn off computers, clean their screens from dust.

2.3 Acquaintance with the document on the formation of the enterprise

Since I am not an employee of the company, I did not have access to this document.

2.4 Familiarization with the structures and management systems in the enterprise

The management structure consists of three levels (Tables 3,4,5):

· In-house management;

· manufacturing control;

· personnel Management.

Table 3 Schematic diagram of production management

Principles

Economic methods

1.Centralization in management

1.Marketing

1.Commercial settlement

2. Decentralization in management

2.Planning

2.Intercompany settlement

3.Combination of centralization and decentralization

3.Organization

3.Pricing and pricing mechanism

4.Orientation to long-term development goals

4. Control and accounting

4.Financial policy and its most important instruments

5. Democratizing Management: Employee Participation in Top Management

Table 4. Schematic diagram of production management

R&D

Ensuring the development of production

Sales Assurance

Organizational structures of production management

1. Development of scientific and technical policy of the company

1. Development and maintenance of policies for the most important areas of the company's production activities

1. Development of sales policy

1 .Functional

2. Development and implementation of new products

2. Development of production technology

2. Choice of channels and methods of distribution

2.Linear-functional

3. Organization of scientific and technical activities

3.Providing production with material and technical resources

3. Organization of sales

3. Problem-targeted management

4.Improving the quality and competitiveness of products

4 matrix structure

5.Increasing labor productivity

5.Programmed target management

Table 5. Schematic diagram of production management

Development and implementation of personnel policy

Payment and labor incentives

Group management, team relationships

and with trade unions

Socio-psychological aspects of management

1.Principles of selection and placement of personnel

1. Forms of remuneration

1.Involving workers in management at the grassroots level

1.Motivation of workers and creative initiative

2. Terms of employment and dismissal

2. Ways to increase labor productivity

2. Work teams and their functions

2.Organizational culture of the company

3.Training and professional development

3 incentive pay systems

3. Relationships in the team

3. The influence of personnel management on the activities of the company and its organization

4.Evaluation of personnel and their activities

4. Relations with trade unions

"Management structure of the organization", or "organizational structure of management" (OMS) - one of the key concepts of management, closely related to the goals, functions, management process, the work of managers and the distribution of powers between them. Within this structure, the entire management process takes place (movement of information flows and management decisions), in which managers of all levels, categories and professional specializations participate. The structure can be compared to the frame of a building of a management system, built so that all processes occurring in it are carried out in a timely manner and efficiently. Hence the attention that the leaders of organizations pay to the principles and methods of building management structures, the choice of their types and types, the study of trends in change and assessments of compliance with the objectives of organizations.

The management structure is understood as an ordered set of stably interconnected elements that ensure the functioning and development of an organization as a whole. OSU is also defined as a form of division and cooperation of management activities, within which the management process is carried out according to the corresponding functions aimed at solving the assigned tasks and achieving the intended goals. From these positions, the management structure is presented in the form of a system of optimal distribution of functional duties, rights and responsibilities, the order and forms of interaction between the management bodies that are part of it and the people working in them.

2.5 Enterprise ACS

An automated enterprise management system (ACS) is a complex of software, technical, informational, linguistic, organizational and technological means and actions of qualified personnel, designed to solve the problems of planning and managing various types of enterprise activities.

Automated enterprise management systems are needed to optimize and improve the efficiency of managers and some other personnel services of the enterprise. Experts say that enterprise management with the help of automated systems contributes to the growth of the competitiveness of any company. Automated enterprise management systems are especially important for managers. According to statistics, an ordinary manager spends about 60% of his precious time on the execution of reports and preparation of documentary tasks for staff. An effective employee database, which is part of the enterprise management, allows the manager to get quick access to the necessary information and to take actions on the reception and movement of personnel. In addition to everything, enterprise management using modern systems allows automated payroll calculation based on many parameters. In particular, provision is made for a position, individual benefits, sick leave, travel allowances, and more. Accessibly laid out information contributes to the prompt calculation and accounting of data on wages in the financial statements.

Depending on the functional equipment, the following automated enterprise management systems are distinguished:

· Multifunctional systems that allow you to perform the whole range of tasks related to enterprise management;

· Systems of expert analysis, which are aimed at detecting the main trends and directions of enterprise development;

· Payroll systems.

Comprehensive personnel management programs. They allow you to solve a huge list of tasks in the field of personnel management: contact information of employees, work schedules, enrollments and dismissals, salaries, and much more.

The main task of expert programs is storage and comparison different characteristics an applicant with similar characteristics to the best employees of the company. This approach allows you to find promising employees for a particular department. Due to the high cost of such solutions, it is advisable to use them only within large enterprises. Automated enterprise management systems, which are designed to solve complex problems, are recommended to be integrated with systems accounting... This feature is due to the fact that the manager will be able to make an adequate decision only if there is actual data on the state of the enterprise. The introduction of enterprise management systems promotes the adoption effective solutions within the framework of a whole range of tasks.

Automated enterprise management systems (ACS) are usually integrated systems. By the nature of production, the automated control system is divided into the following types: continuous, discrete (single, small-scale, medium-scale production) and continuous-discrete type (in-line mass and large-scale production). ACS manufacturing enterprise, as a rule, includes control subsystems:

· Warehouses;

· Deliveries;

· Personnel;

· Finance;

· Design and technological preparation of production;

· Nomenclature of production;

· Equipment;

· Operational planning of production requirements.

Clients of the enterprise "Red October" are private or government organizations (enterprises), which have a database "1C Enterprise". The employees of the Krasny Oktyabr enterprise are working on updating, configuring and normalizing databases. The same goes for repairing and diagnosing computers. The Krasny Oktyabr enterprise serves both private and state organizations, but to a greater extent it concerns individuals.

2.6 Marketing service in the enterprise

There is no marketing service at the Krasny Oktyabr enterprise, as the majority of the enterprise works with long-term and regular customers.

2.7 Business ethics at the enterprise. Business ethics when dealing with clients

Business ethics is a set of informal (not legally established) rules that firms adhere to in their activities. Business ethics include honesty in dealing with employees, customers (customers), suppliers and competitors.

During the entire period of my internship, the staff and clientele of the enterprise were polite to me, which allowed me to respond with politeness in their direction. I came to the conclusion that the business ethics at the enterprise is fully respected.

2.8 Failure scheme in the enterprise

I have studied quite a simple emergency evacuation scheme. An approximate outline is shown in picture 1.

Rice. 1 Emergency diagram

Chapter 3. Enterprise Survey

3.1 Data centers in the enterprise

Computing center (abbr. VTs) - organization, division, or, in a narrower sense, a complex of premises designed to accommodate computer systems and auxiliary equipment.

There is no data center at the enterprise, but there is a server providing the following services for clients.

Services provided by the server:

3.1.1 Job description of the system administrator

I. General Provisions

1. The system administrator belongs to the professional category.

2. A person with specialized professional education, experience in maintenance and repair of personal computers and office equipment, knowledge of the basics of local networks (TCP / IP protocol stack, network equipment, principles of building local computer networks) is appointed to the position of a system administrator.

3. The system administrator should know:

3.1. Technical characteristics, purpose, operating modes, design features, rules technical operation equipment of local area networks, office equipment, servers and personal computers.

3.2. Hardware and software of local area networks.

3.3. Principles of repairing personal computers and office equipment.

3.4. Languages ​​and methods of programming.

3.5. Basics of information security, ways to protect information from unauthorized access, damage or deliberate distortion.

3.6. The order of registration of technical documentation.

3.7. Internal labor regulations.

3.8. Fundamentals of Labor Law.

3.9. Rules and regulations of labor protection, safety and fire protection.

4. Appointment to the position of a system administrator and dismissal from office is made by order of the director on the proposal of the head of the IT department.

5. The system administrator reports directly to the head of the IT department.

II. Responsibilities of the system administrator

System Administrator:

1. Installs operating systems and software necessary for work on servers and workstations.

2. Performs software configuration on servers and workstations.

3.Supports the software of servers and workstations in working order.

4. Registers users of the local network and mail server, assigns identifiers and passwords.

5. Provides technical and software support to users, advises users on the operation of the local network and programs, draws up instructions for working with the software and brings them to the attention of users.

6. Sets access rights and controls the use of network resources.

7.Provides timely copying, archiving and data backup.

8. Takes measures to restore the performance of the local network in case of failures or failure of network equipment.

9. Identifies user and software errors and takes corrective action.

10. Monitors the network, develops proposals for the development of network infrastructure.

11. Provides network security (protection against unauthorized access to information, viewing or changing system files and data), security of internetworking.

12. Provides anti-virus protection of the local computer network, servers and workstations.

13. Prepares proposals for the modernization and purchase of network equipment.

14. Carries out control over the installation of local network equipment by specialists of third-party organizations.

15. Informs his immediate supervisor about cases of violation of the rules for using the local area network and the measures taken.

III. System administrator rights

The system administrator has the right to:

1. To establish and change the rules for using the local area network.

2. To get acquainted with the documents defining his rights and obligations in the position held, the criteria for assessing the quality of the performance of official duties.

3. Submit to the management of proposals for improving the work related to the responsibilities provided for in this job description.

4. Demand from the management to ensure the organizational and technical conditions necessary for the performance of official duties.

IV. System Administrator Responsibility

1. The system administrator is responsible for:

1.1. Disruption of the functioning of the local area network, servers and personal computers due to improper performance of their official duties.

1.2. Untimely registration of users of the local area network and mail server.

1.3. Untimely notification of the management about cases of violation of the rules for using the local computer network.

2. The system administrator is held accountable:

2.1. For improper performance or non-performance of their duties provided for by this job description - within the limits established by the current labor legislation Russian Federation.

2.2. For offenses committed in the course of their activities - within the limits established by the current administrative, criminal and civil legislation of the Russian Federation.

2.3. For causing material damage to the company - within the limits established by the current legislation of the Russian Federation.

3.2 Methods of information processing in the enterprise

In the era of centralized use of computers with batch processing of information, computer users preferred to purchase computers on which they could solve almost all classes of their problems. However, the complexity of the tasks being solved is inversely proportional to their number, and this led to ineffective use of the computing power of the computer at significant material costs. One cannot but take into account the fact that access to computer resources was hampered by the existing policy of centralizing computing resources in one place.

The principle of centralized data processing (Fig. 2) did not meet the high requirements for the reliability of the processing process, impeded the development of systems and could not provide the necessary time parameters for interactive data processing in multi-user mode. A short-term failure of the central computer led to fatal consequences for the system as a whole, since it was necessary to duplicate the functions of the central computer, significantly increasing the costs of creating and operating data processing systems.

Figure 2 Principle of centralized data processing

Centralized data processing system

The appearance of small computers, microcomputers and, finally, personal computers required a new approach to the organization of data processing systems, to the creation of new information technologies. There was a logically justified requirement for the transition from the use of separate computers in centralized data processing systems to distributed data processing.

Distributed data processing (Fig. 3) - data processing performed on independent but interconnected computers representing a distributed system.

Figure 3. Distributed data processing

Distributed data processing system

To implement distributed data processing, multi-machine associations were created, the structure of which is being developed in one of the following directions:

· Multi-machine computing systems (MVK);

· Computer (computing) networks.

A multicomputer complex is a group of computers installed side by side, united with the help of special interface means and performing jointly a single information and computational process.

3.3 Using paperless data processing technologies in the enterprise

The enterprise fully uses the office suite of Microsoft Office 2013 applications.

Microsoft Office - Office suite of applications created by Microsoft for operating systems Microsoft Windows, Apple Mac OS X. This package includes software for working with various types of documents: texts, spreadsheets, databases, etc. Microsoft Office is a server OLE objects and its functionality can be used by other applications as well as by the Microsoft Office applications themselves. Supports scripts and macros written in VBA.

But to a greater extent they use for work:

· Microsoft Word;

· Microsoft Excel;

· Microsoft PowerPoint.

3.4 Local network at the enterprise

The enterprise where I had my internship already has a local network. The topology of this network is star.

A star is the basic topology of a computer network, in which all computers on the network are connected to a central node (usually a switch), forming a physical segment of the network. Such a network segment can function both separately and as part of a complex network topology.

This topology has both pros and cons.

· Simplicity of laying;

· Simplicity of service;

· Easy addition of new workstations;

Endurance (if one of the sections of the network transmission medium

· The data is cut off or shorted, then only the device connected to this point loses communication).

· High cost;

· Availability of a separate piece of cable for each device.

The local network at the enterprise is built using a twisted pair, category 5e, as well as using the NetGear ProSafe JF5524E switch. Internet access is provided using the D-Link DL804HV access point.

Figure 4. Local area network of the enterprise

Chapter 4. Technical equipment of the enterprise

4.1 Acquaintance with the complex technical means the computing center of the enterprise, the availability of office equipment and telecommunications

There is no computer center at the enterprise.

With regard to office equipment and telecommunications, it looks like this:

· 2 network printers: HP LaserJet P2015n / dn (for printing the necessary information);

· 1 MFP HP LaserJet 3055 (for printing, copying, scanning, as well as for receiving and sending faxes);

2 scanners Canon CanoScan LiDE 210;

· Several Siemens cordless phones.

4.2 Configuration of personal computers in the enterprise

The enterprise has 8 computers that are similar in their characteristics:

Hard drive: Seagate 320Gb

Drive: Asus DRW-24F1ST

Also available 1 server:

AMD Athlon 64 x2 has 4GB of RAM, 1Tb of hard disk storage.

4.3 Organization of work at the enterprise for the protection of information

Antivirus: The enterprise uses a commercial version of AVG Antivirus.

AVG Antivirus is an anti-virus system made in the Czech Republic, which has a file scanner, an e-mail scanner and supports automatic surveillance. The AVG security system is certified by all major independent certification companies such as ICSA AV-TEST, Virus Bulletin, Checkmark (West Coast Labs).

Firewall: iptables is a command line utility that is the standard netfilter firewall management interface for Linux kernels 2.4 and 2.6. Used for packet filtering and NAT provisioning.

Server backup - performed using the rsync command utility.

Backups on client PCs are performed using the Cobian Backup utility. It is a multi-threaded utility that allows you to schedule backups of individual files or directories to a specific directory on the same computer or to a remote server on the network. There is also full support for the FTP protocol.

4.4 Inventory of the existing technical equipment of the enterprise

Name

Name / Technical data:

Computer (7 pcs.)

Case: CoolerMaster CM Elite 334U

Motherboard: ASUS H61M-D

Processor: Intel Core i3-3220 3.3GHz BOX

Video card: Asus GeForce 210 1024MB

RAM: Corsair DDR3 4096Mb

Hard drive: Seagate 320Gb

Drive: Asus DRW-24F1ST

Monitor (8 pcs.)

Acer V236HLbd 23 ”

Printer (2pcs.)

HP LaserJet P2015n / dn

HP LaserJet 3055

Phone (6 pcs.)

Siemens Gigaset A220

Switch / hub (4pcs.)

NetGear ProSafe JF5524E, NetGear F5608, D-Link DL804HV, D-Link DWL 2100AD

Scanner (2 pcs.)

Canon CanoScan LiDE 210

Server (1pc.)

AMD Athlon 64 x2 has 4gb of RAM, 1Tb of hard disk space

Chapter 5. Software for enterprise computer equipment

5.1 Familiarity with the operating system used in the enterprise

The enterprise fully uses Windows 8 Enterprise.

Windows 8 is an operating system belonging to the Microsoft Windows family of operating systems, in the line following Windows 7 and developed by the multinational Microsoft corporation.

Thanks to new developments involved in the creation of the operating system, the process of loading it after turning on the PC takes a maximum of 8 seconds. The need for reboots is also minimized, which saves IT staff time.

Thanks to UEFI, you can remotely repair your computer by diagnosing and eliminating all interruptions that have occurred in its work using the network.

The new OS is supported by netbooks, "tablets" and other devices with built-in x86-bit processors. This will allow IT staff to create a Windows infrastructure, greatly simplifying the network management process.

In addition to all of the above, the OS in question allows you to transfer the used workspace to any other device. To perform such actions, a regular "flash drive" or another drive is enough, the minimum volume of which will be 32 GB.

Windows 8 simplifies the work of system administrators by upgrading network functions. So, using the network protocol of the so-called application layer, you can manage printers, various files and other resources associated with unified system... To fully achieve the intended goal, a built-in network card is used

And the most important thing is that Windows 8 is a fairly simple OS of those on the market.

5.2. Distribution of software to local machines in the enterprise

Distribution of software in the enterprise is available thanks to a mapped network drive on all client machines, with installation files for all necessary applications, such as:

Skype v 6.16.67.10;

HaoZip v 4.0.1.9380;

TeamViewer v 9.0;

AVG Antivirus

1C Enterprise 8.2

5.3 Hierarchical model of software and network in the enterprise

The hierarchical network model assumes the division of the network into separate layers. Each of the layers provides specific functions that define its role in the entire network. By dividing the various network functions into layers, the network architecture becomes modular for scalability and network performance. A typical hierarchical network structure is divided into three levels: the access level, the distribution level, and the kernel level (Figure 5).

Figure 5. Three-level hierarchical network model

The access layer provides an interface for end devices such as personal computers, printers, IP phones, giving them access to the rest of the network layers. The access layer can contain routers, switches, bridges, hubs, and wireless access points. The main purpose of the access layer is to provide a means of connecting devices to the network and control which devices are allowed to use these means.

The distribution layer aggregates (groups) data received from the access layer switches before it is sent to the core layer for routing to its destination. The distribution layer controls the flow of network traffic based on policies and sets the boundaries of broadcast domains, performing routing functions between virtual networks (VLANs), which are defined in the access layer (Figure 6).

Figure 6. Distribution level

A broadcast domain is the collection of all devices that receive broadcast messages from any device in that collection. These domains are usually limited to routers because routers do not forward broadcasts.

Virtual networks (VLANs) allow you to segment traffic on the switch into separate subnets. For example, at a university it is possible to divide traffic by faculty, students and visitors (guests). Distribution Layer Switches are typically high-performance devices with high availability and redundancy to provide the required reliability.

The core layer (Figure 7) in the hierarchical network model is the high-speed backbone of the interconnected network. The core layer is critical to the problem of interconnecting devices in the distribution layer, so it is very important that the core remains highly available and is built around redundant communication principles. The kernel aggregates traffic from all devices in the distribution layer, so it must be able to pass large amounts of data with minimal latency.

Figure 7. Network core

In small networks, the use of a collapsed core model is practiced - when the presentation layer and the core layer are combined into one.

Chapter 6. Justification of the choice of the problem for the modernization of computer technology and software

6.1 Analysis of technical equipment and software of the enterprise

The company's computer network is built on the basis of the 100BASE-T standard to ensure high-speed connection between computer equipment inside the office (100 Mb / s). Used 2 network switches (switches) supporting the 100BASE-T standard. The network is laid with a shielded UTP 5e cable. At the same time, server equipment and workstations are equipped with network cards that also support the above standard. The structure of SCS also includes: RJ-45 sockets, patch cords, cable ducts, cable channel.

Server equipment

The company has a server that provides access to network resources (network drives), and also performs operations for archiving user information. The server is built on a dual-core AMD Athlon 64 x2 processor with 4GB of RAM, 1Tb of hard disk memory. The server also has communication properties: providing general access to the global Internet using NAT, FTP server, Firewall (using iptables), traffic accounting and client administration.

Computer equipment

Office computer equipment is represented by 7 workstations for office employees with dual-core processors, complete with 23-inch LCD monitors. They have keyboards, mouse-type manipulators. Additionally, network cards were installed.

Office equipment of the office is represented mainly by models from the HP company. HP LaserJet P2015n / dn printers, HP LaserJet 3055 MFP, Canon CanoScan LiDE 210 copiers / scanners.

Licensed software

To ensure the legal use of software products, it is necessary to use licensed software. The following licensed software was purchased at the enterprise: 1) Microsoft Windows 8 Enterprise; 2) 1C-Enterprise v.8.2. The rest of the software products used in the enterprise are freely distributed under the GPL license (Freeware).

The GNU General Public License (translated as the GNU General Public License, the GNU General Public License, or the GNU General Public License) is a free software license created by the GNU Project in 1988. It is also abbreviated as the GNU GPL or even simply GPL. if it is clear from the context that we are talking about this particular license (there are quite a few other licenses containing the words "general public license" in the title). The second version of this license was released in 1991, the third version, after many years of work and long discussion, in 2007. The GNU Lesser General Public License (LGPL) is a weakened version of the GPL for some software libraries. The GNU Affero General Public License is a hardened version of the GPL for software designed to be accessed over the network.

6.2 Optimal option for modernization of enterprise computing equipment

Description of the main stages of modernization

The purpose of upgrading computer components is to increase speed, performance, increase the amount of disk space, gain opportunities to use additional functions, in a word, improve computer performance. The main benefits that can be obtained from upgrading your computer:

· The upgraded personal computer has the components you need;

· Thanks to modernization, a personal computer works faster and more efficiently performs current tasks;

· Modernization eliminates the difficulties associated with replacing a personal computer.

However, one should not forget that when updated components appear in the configuration of a computer, a failure may occur due to incompatibility of devices with each other, while a failure of the power supply is possible and only oneself will have to blame for this.

There are two ways to plan your upgrade:

· Based on the tasks that the computer must perform;

· Based on the funds that can be invested.

Having made the decision to upgrade a computer, a person wants to get the maximum benefit, so it is necessary to calculate the costs and estimate what kind of components are needed.

When expanding the capabilities of the system for solving problems, it is necessary to adhere to the following actions:

· Determine what tasks the system should perform;

· Assess the capabilities of the current hardware and OS;

· Upgrade those components that do not meet the requirements obtained as a result of the assessment.

With a successful modernization of computer facilities, the main results may be:

· "Bottlenecks" in the system are eliminated;

· It becomes possible to use new software and hardware;

· Improves the quality of current tasks.

Typically, bottlenecks can be removed in one of the following ways:

· Update the video card;

Increase volume random access memory;

· Increase the speed of the processor;

· Increase the speed of your Internet connection.

The importance of modernizing computer equipment is to maintain the performance of the computer as a whole, and separately its components. The components of a personal computer need constant inspection and monitoring of its technical condition, since the performance of any of the constituent components is limited by different periods of operation, but with timely maintenance, the devices of a personal computer will serve due date performance.

In organizations, these tasks are solved in different ways. In some cases, their own service divisions are created, but this path is very complicated from an organizational and technical point of view, requires serious material costs and can be economically justified only for very large local area networks.

Therefore, in most cases, contracts are concluded for the maintenance, repair and modernization of computer equipment with external organizations that have the necessary package of licenses, technical equipment, qualified personnel and established supply channels for spare parts and components. This path is preferred budgetary organizations operating small and medium-sized computing facilities.

Such agreements imply regular routine maintenance of the entire fleet of computer equipment in accordance with the approved list.

At the request of the customer, the list may additionally include other works, for example, testing personal electronic computers for viruses, and, if necessary, treating them.

The company decided to purchase eight Kingston SV300S37A 240G SSDs. To improve overall system performance.

Table 7. Modernization of equipment at the enterprise

6.3 Plan of modernization of computers and local network of the enterprise

The enterprise does not consider large-scale modernization. For a noticeable increase in system responsiveness, it was suggested to buy 8 Kingston SV300S37A / 240G SSDs.

6.4 Approximate Amount of Retrofit Costs Needed

The approximate amount of required costs was 40,048 rubles. (see table 7).

Chapter 7. Practical part

7.1 Creation of a project of a unified information environment of the enterprise

To create a unified information environment for the enterprise, we needed the shareware program "Expert-SCS v1.5.1".

In order to make a project, you need to do the following:

· Open the program;

· Load the background;

· Set the scale;

· Display jobs;

· Put the cabinet;

· Stretch the track;

· Auto-trace cable;

· Through the master “ cable channels”Make a cable duct.

Figure 8. Ready unified information environment

To create a unified enterprise information environment (see Fig. 8), we needed:

Table 8.

Name

Quantity

Price

UTP Cat.5e

Box 30x30

NETGEAR JGS524 Switch

Patch cord UTP Real cat. 6, 1.2 m

RJ45 socket strip

Socket 220V

RJ12 socket

RUB 16,239.00

Patch panel UTP Real Cat. 6 24-port.

So, to transmit a frame of the minimum size, which together with the preamble has a length of 72 bytes, or 576 bits, it will take time equal to 576 bt, and if we take into account the interframe interval of 96 bt, we get that the frame repetition period will be 672 bt.

At a transmission rate of 100 Mbps, this corresponds to a time of 6.72 μs. Then the frame rate, that is, the number of frames passing through the network in 1 second, will be 1 / 6.72 μs = 148,809 fps.

When transmitting a maximum frame size, which together with the preamble has a length of 1526 bytes or 12208 bits, the repetition period is 12208 bt + 96 bt = 12 304 bt, and the frame rate at a transmission rate of 100 Mbps will be 1 / 123.04 μs = 8127 fps.

Knowing the frame rate and the size of the payload carried by each frame, it is easy to calculate the useful network bandwidth.

For the minimum frame length, the usable bandwidth is 46 bytes / frame 148,809 fps = 54.76 Mbps, which is only slightly more than half of the total maximum bandwidth networks.

For a maximum frame size, the usable network bandwidth is 1500 bytes / frame 8127 fps = 97.52 Mbps.

Thus, in a Fast Ethernet network, the useful bandwidth can vary depending on the size of the transmitted frames from 54.76 to 97.52 Mbps, and the frame rate varies in the range from 8127 to 148809 fps.

If you need to measure the network bandwidth, you can use the iperf console utility. Iperf is a cross-platform console client-server program designed to test the bandwidth of an Internet channel between two computers. The measurement is carried out as follows, on one PC we run iperf in the “server” mode, on the second in the “client” mode, indicating the ip-address of the first PC (“server”). After a specified time, the measured information is displayed. Output:

According to the test results, the throughput in the direction from host 192.168.5.38 to host 192.168.5.39 approximately corresponds to the declared speed of 100 megabits.

Conclusion

The internship showed that this is an important element of the training process for a specialist in the field of servicing computers and computer networks, and I also got the skills to repair office equipment. During the practice, I got the opportunity to see how various activities are carried out in the field of technical maintenance of VT and CS, as well as to apply the theoretical knowledge gained earlier. During my internship, I tried to complete the tasks assigned to me: Diagnosing computer problems at the enterprise, creating local networks and setting up active equipment.

Literature

1. Murakhovsky V. I. M91 PC hardware. New opportunities. - SPb .: Peter, 2005 .-- 592 p.

2. Kleimenov SA Administration in information systems. - M .: Publishing Center "Academy", 2010. - 272 p.

3. Buchek G. ASP.NET: Training course. - SPb .: Peter, 2011

4. Mueller Scott. PC Upgrade and Repair, 18th Edition. : Per. from English - M.: OOO “I.D. Williams ”, 2009. - 1280 s.

5. Popov I.I., Maksimov N.V. Computer networks. Textbook for students of institutions of secondary vocational education. - M .; Forum: Infra-M, 2012

Similar documents

    Characteristics of the enterprise for the maintenance of computers and computer networks. Consideration of the structure, goals and objectives of the service department, the organization of the workplace, the form of remuneration. Studying the rules for working with e-mail.

    practice report, added 06/05/2014

    Features, differences, topology and functioning of local computer networks. Information and computer networks software. Basic data transfer protocols, their installation and configuration. Authentication and authorization; Kerberos system.

    term paper added on 07/20/2015

    Creation of computer networks using network equipment and special software. Appointment of all types of computer networks. Evolution of networks. Differences between local networks and global networks. The trend towards convergence of local and global networks.

    presentation added on 05/04/2012

    Basic information about printers. The design of the laboratory stand. Installing software. Performance analysis. Goals and management functions of JSC "Tirotex". Security measures during the maintenance of computer equipment.

    thesis, added 12/29/2014

    The architecture of building computer networks. Structure of IEEE 802 standards. Network test programs. Crimping tool for connectors. General local settings of computers. Determination of the composition and structure of personnel. Working time budget calculation.

    thesis, added 01/14/2015

    Functions of computer networks (storage and processing of data, user access to data and their transfer). The main indicators of the quality of local networks. Classification of computer networks, their main components. Network topology, equipment characteristics.

    presentation added on 04/01/2015

    The device of computer networks. Systems for information transmission, consisting of terminals, servers and communication media. Technical, software and information means of networks. Classification of computer networks. Network operating systems.

    term paper added on 07/10/2014

    The concept of a local area network, the architecture of building computer networks. Local computer settings. Setting up an administrator account. Configuring anti-virus security. The structure of the computer network maintenance unit.

    thesis, added 01/15/2015

    Classification of computer networks in the technological aspect. The device and principle of operation of local and global networks. Circuit-switched networks, networks of telecom operators. Computer network topologies: bus, star. Their main advantages and disadvantages.

    abstract added on 10/21/2013

    General information about the organization and its information system... The main and peripheral equipment of the employees of the enterprise. Diagnostics and maintenance of computer equipment, its software. Service complex PC-tester.

The type of maintenance is determined by the frequency and the complex of technological operations to maintain the operational properties of CBT

TO SVT, in accordance with GOST 28470-90, can also be subdivided into the following types:

· Regulated;

· Periodic;

· With periodic control;

· With continuous monitoring.

Regulated maintenance should be carried out in the amount and taking into account the operating time provided for in the operational documentation for the SVT, regardless of the technical condition.

Periodic maintenance should be performed at intervals and in the amount specified in the operational documentation for the SVT.

Maintenance with periodic control should be performed with the frequency of monitoring the technical condition of the SVT set in the technological documentation and the necessary complex of technological operations that depend on the technical condition of the SVT.

Maintenance with continuous monitoring should be carried out in accordance with the operational documentation for the SVT or technological documentation based on the results of continuous monitoring of the technical condition of the SVT.

Inspection of the technical condition of SVT can be performed in static or dynamic modes.

In the static mode, the control values ​​of the voltage and frequency of the sync pulses remain constant throughout the entire cycle of preventive control, and in the dynamic mode, their periodic change is envisaged. Thus, due to the creation of weighted operating modes of the SVT, it is possible to identify elements that are critical in terms of reliability.

Preventive control is carried out by hardware software. Hardware control is provided with the help of special equipment, instrumentation and stands and hardware and software systems.

Troubleshooting work during preventive control can be broken down into the following steps:

· Analysis of the nature of malfunctions according to the current state of SVT;

· Control of environmental parameters and measures to eliminate their deviations;

· Localization of errors and determination of the place of malfunction with the help of hardware and software means of SVT and with the help of additional equipment;

· trouble-shooting;

· Renewal of problem solutions.

To carry out maintenance, a maintenance system (STO) is created

Currently, the following types of service stations are most widespread:

· Scheduled preventive maintenance;

· Maintenance on technical condition;

· Combined service.

Preventive maintenance is based on a calendar principle and implements scheduled and periodic maintenance. These works are carried out with the aim of maintaining SVT devices in good condition, detecting failures in equipment, preventing failures and failures in the operation of SVT. The frequency of scheduled preventive maintenance depends on the type of CBT and operating conditions (number of shifts and load).

The advantage of the system is to ensure the highest availability of SVT. And the disadvantage is that it requires large material and technical costs.

In general, the system includes the following types of maintenance (preventive maintenance):

1.control examinations (KO);

2. daily maintenance (ETO);

3. weekly maintenance;

4. two-week maintenance;

6. monthly maintenance (TO1);

7. two-month maintenance;

8. semi-annual or seasonal (STO);

9. annual maintenance;

KO, ETO SVT includes inspection of devices, running a quick test of readiness (operability of devices), as well as the work provided for by daily preventive maintenance (in accordance with the operating instructions) of all external devices (cleaning, lubrication, adjustment, etc.).

During the two-week maintenance, diagnostic tests are provided, as well as all types of two-week maintenance work provided for external devices.

With monthly maintenance, a more complete check of the functioning of the SVT is provided with the help of the entire system of tests that are part of its software. The check is carried out at the nominal values ​​of the power supplies with a preventive voltage change by plus, minus 5%. Preventive voltage change allows you to identify the weakest circuits in the system. Typically, circuits must maintain their functionality when the voltage changes within the specified limits. However, aging and other factors cause a gradual change in the performance of the circuits that can be detected with prophylactic regimens.

The CBT test with preventive voltage changes identifies predictable malfunctions, thereby reducing the number of hard-to-localize malfunctions that lead to failures.

During the monthly maintenance, all the necessary work is performed as provided for in the operating instructions for external devices.

With a semi-annual (annual) maintenance (service station), the same work is carried out as with monthly maintenance. And also all types of semi-annual (annual) preventive work: disassembly, cleaning and lubrication of all mechanical assemblies of external devices with their simultaneous adjustment or replacement of parts. In addition, the cables and busbars are inspected.

A detailed description of preventive maintenance is given in the operating instructions for individual devices attached to the CBT by the manufacturer.

When servicing according to the technical condition, maintenance work is carried out on an unscheduled basis and is carried out as necessary, the outcomes from the state of the object (test result), which corresponds to maintenance with continuous monitoring or maintenance with periodic monitoring.

With a combined maintenance system, "junior types of maintenance" are carried out as needed, as with maintenance based on the operating time and operating conditions of a particular type of SVT or the results of its testing. Execution of "senior types of maintenance" and repairs is planned.

Monitoring the technical condition of the SVT serves to monitor the operation of the SVT, localize the fault locations, exclude the influence of random failures on the calculation results. In modern CBT, such control is carried out mainly with the help of the CBT itself. Preventive maintenance is a series of measures aimed at maintaining a given technical condition of SVT for a certain period of time and extending its technical resource. Preventive measures carried out at CBT can be divided into two groups.

There are two types of preventive measures:

* active

* passive.

With active preventive maintenance, operations are performed whose main purpose is to extend the uptime of a computer. They boil down mainly to periodic cleaning of both the entire system and its individual components.

Passive prevention usually means measures aimed at protecting your computer from external adverse influences. We are talking about installing protective devices in the power supply network, maintaining cleanliness and an acceptable temperature in the room where the computer is installed, reducing vibration levels, etc.

Active preventive maintenance techniques. System backup.

One of the main steps in preventive maintenance is backing up your system. This operation allows you to restore system performance in the event of a fatal hardware failure. For backups, you need to purchase a high-capacity storage device.

Cleaning One of the most important elements preventive maintenance - regular and thorough cleaning. Dust on the inside of your computer can cause a lot of trouble.

First, it is a heat insulator that degrades system cooling. Secondly, dust must contain conductive particles, which can lead to leaks and even short circuits between electrical circuits. Finally, some substances in the dust can accelerate the oxidation of the contacts, which will ultimately lead to poor electrical connections.

Replacing the Chips When performing preventive maintenance, it is very important to eliminate the effects of thermal displacement of the chips. As the computer heats up and cools down when turned on and off (hence, its components expand and contract), the microcircuits installed in the sockets gradually "crawl out" of them. Therefore, you will have to find all the components installed in the slots and replace them.

Cleaning the pins of the connectors Wipe the pins of the connectors so that the connections between the nodes and system components are reliable. Pay attention to the connectors for expansion, power supply, keyboard and speaker connections located on the system board. As for the adapter cards, you need to wipe the printed connectors on them, which are inserted into the slots on the system board, and all other connectors (for example, installed on the external panel of the adapter).

Preventive maintenance of hard drives To ensure data safety and improve work efficiency hard disk, it is necessary to perform some maintenance procedures from time to time. There are also several simple programs with which you can insure yourself to some extent against data loss. These programs create backup copies (and, if necessary, restore them) of those critical areas of the hard disk, if damaged, access to files becomes impossible.

Defragmenting Files As you write and delete files on your hard drive, many of them become fragmented, ie. are broken into many parts scattered throughout the disk. By periodically defragmenting files, you accomplish two things at once. First, if files occupy contiguous areas on the disk, then the movement of the heads during reading and writing becomes minimal, which reduces wear on the head drive and the disk itself. In addition, the speed of reading files from the disk is significantly increased.

Second, if the File Allocation Table (FAT) and the root directory are severely damaged, the data on the disk is easier to recover if the files are written as a whole.

preventive maintenance computing computer

Introduction ………………………………………………………… .......................…. ..2

1. Operating systems and applications used ………………………………………………………. ….........................4

2. The structure of the enterprise and the equipping of the workplace with technical means ……………………… ..................................................................... .........6

3. Input and output devices

Information output devices ………………………..................... ....................................... ..................7

Information input devices …………… ……………………… …………........................................10

4. Industrial safety ...…… . ……………………..........14

5. Main technical characteristics of PC hardware

- System block …………………………….………….............................15

Motherboard and devices located on it …......................16

CPU ……………………………………...........................16

RAM …………………………………………….....................18

Permanent storage device ………………………...................…20

Chipset …………………...………………………...........................20

HDD …………………………………………………........................20

Floppy disk drive ……………………………………...........................22

- CD drive …………………………...……….................…...24

Video adapter …………………………………………….…............................26

Sound card ………………………….……………………..........................27

Monitor …………………………………………..……….…..........................28

- Keyboard ………………………………………………….......................…..29

Mouse …...……………………………………………….….......................…..31

6. Site contentwww.ixbt.com . .....................................................................32

7. List of used literature ………………………… ......................... 35

Vconducting


We live in a world full of information, and its volume is constantly and rapidly increasing every day. Every day there are events in the political and cultural life of society, scientific discoveries are made. As a result of the acceleration of scientific and technological progress, mankind is no longer able to track the avalanche-like growing flow of information, and a significant part of it is irretrievably lost. In this way, it is sometimes easier for a scientist to re-conduct research in order to find a solution to a scientific problem than to re-read a mass of literature, and tens of thousands of publications accumulate in libraries that have never been requested by readers. Schoolchildren and students, in order to become qualified specialists, have to study longer and longer. And professional workers in any sphere of production are forced to constantly improve their training with a howl in order to meet the requirements of the market. The luggage of people's knowledge has become so large that it is increasingly difficult to comprehend, bring it into the system, and, therefore, use it effectively. Humanity runs the risk of drowning in the flood of information.

The organization of rational storage of information is becoming a no less problem. The cost price of the printed word is high, but paper - the most common medium today - is not very durable. An impressive amount of money is spent on maintaining book depositories, restoring and reprinting old editions. Meanwhile, the search for the right book in huge libraries takes a lot of time, and sometimes it turns out to be ineffectual.

One of the ways to solve the information flood problem is to use effective tools for automating the creation and processing of data. Their search is the most important task of modern science.

Data is information presented in a form suitable for its processing. They can be letters of text, numbers, etc. Data processing includes many different operations, including their accumulation, filtering out unnecessary ones, ordering, organizing storage in a convenient and easily accessible form, transportation, conversion from one form to another, warning loss and distortion and other operations.

The main human assistant in the automation of these and other data operations is the computer. Computers are electronic quantities of devices that create and process data automatically in accordance with a specific sequence of commands. Modern computers are capable of performing hundreds of millions and even billions of operations per second, such as addition and multiplication, accumulate, view and sort huge amounts of data, exchange them with friends computers through various media (floppy disks, plastic disks with reflective coating, or CD-ROMs, etc. ) and cables and, at the user's request, search for scientific, reference, educational, cultural and entertainment information in the global computer network Internet. In addition, for example, a CD-ROM contains text data recorded by a laser beam, the volume of which is comparable to that of a large library. The safety of these information carriers significantly exceeds the durability of paper and is about 200 years, and the cost is extremely low.

A computer is a fairly broad concept that includes a whole class of various electronic computing devices. So, depending on the intended purpose, several types of computers are distinguished: large electronic computers (large computers) that automatically serve entire sectors of the national economy, mini-computers that automate production processes at large enterprises and scientific institutions, micro-computers used in small computing centers.

However, in recent years, PCs designed to serve one workplace, automate the educational process in any subject in educational institutions, organize distance learning and leisure activities have become especially widespread in recent years. The rise in popularity of PCs is due to their relative cheapness, rapidly increasing performance and increasing variety of functionality.

Since 1999, there has been a classification of PCs into mass, business, portable, workstations and entertainment (PC99 specification). This specification regulates the technical requirements for all types of PCs, since machines of each class, as a rule, perform a given set of operations with data of a certain type. According to this specification, for business PCs, the requirements for the means of displaying graphics data are reduced, and the device for playing sound (sound cards) may not be available at all. This is because business PCs are typically used to process text data. For portable PCs used on the road, a prerequisite is the availability of means of remote data transmission, i.e. computer communications (for example, a modem or wireless devices). Workstations operating with large arrays of graphics, video and sound should increase the capacity of data storage devices (hard drives), and in entertainment PCs, the performance of devices that reproduce audio and video data, which are the basis of computer games, should be improved. Therefore, you should choose a PC taking into account the tasks that will be solved on it. So, if a user needs a computer solely for creating and editing text data, it makes no sense to spend money on a PC with powerful audio and video systems and a 40GB hard drive. On the other hand, drawing processing requires a PC with a good graphics card, plenty of RAM, and a powerful processor.

But it should be borne in mind that the boundaries between PC varieties are conditional and are gradually being erased. And it is a mistake to think that, say, a business PC is a low-power, cheap computer in a gray nondescript case. Many business PCs today are equipped with multimedia playback devices, i.e. a set of several types of data (text, graphics, sound, video). On the other hand, modern mainstream PCs are powerful enough to compete successfully with workstations, for example, in editing digital video, which, with the cheapening of consumer digital video cameras, is becoming popular entertainment among home users, especially while driving.

1. Used operating systems and applications.


Software is a collection of programs and data that a computer needs to work. It powers the PC's hardware. Without software, a computer is a meaningless set of mechanisms that are incapable of performing any operations with information.

A program is an ordered sequence of commands for a computer that the hardware can understand.

An operating system is a set of software tools that control hardware and PC applications.

The main part of the operating system, which resides in RAM and controls all processes, is called core... This is the "heart" of the operating system, ensuring its viability.

The majority of operating systems, in addition to the actual system software, include utilities necessary for diagnosing and maintaining a computer, as well as the simplest applications - text and graphic editors, an arithmetic calculator, a music player, games, etc.

I used Windows 2000 Professional.

Windows 2000 Professional is intended to become the primary operating system for desktop and laptop PCs in organizations of all sizes, replacing Windows 95/98 as the standard platform for business applications. During the design process of Windows 2000 Professional, the following goals were pursued:

- simplify work with the system;

Transfer the best qualities of Windows 98 to the system;

Create an easily configurable desktop system.

The ease of use of Windows 2000 is due to the following factors:

The primary Widows interface is used, but simpler and "Intelligent". Removed unnecessary elements of the user interface, standard elements became intuitive. The information search mechanism has been simplified, which has become more efficient. Support for many national languages ​​is provided.

Simplified system setup through the use of new wizards

The system is focused on working with mobile computers. Connecting and disconnecting devices and working with the dock page are simplified, an economical mode of using batteries is provided, there is a mode of autonomous work with documents, and the security of information is increased.

There are effective tools for working with the Internet, built into the system, which speed up the work and search for information on the Web.

MS Word 2000 ... It is used to create and edit complex documents - including both the text itself and figures, tables, formulas, diagrams - and intended both for output to a printer and for publication on the World Wide Web.

MS Excel 2000 ... Tables present information in an easy-to-read form. The computer allows not only organizing data in tabular form, but also automating their processing. Application programs designed for this purpose are called spreadsheet editors. The data contained in the cells of such a table are interconnected by relationships that are described by formulas. Changes to the contents of one cell lead to automatic recalculation of the data in the cells associated with it. Therefore, spreadsheets eliminate the need for manual calculations, save a lot of time and are widely used in a wide variety of areas of human activity.

MS Access 2000. It is database software. It has been used on PCs for a long time and is becoming more and more widespread in enterprises, as well as on the Internet. However, many users still avoid accessing these programs due to their complexity. This product provides the necessary tools for creating all database objects, as well as for performing operations with them, and at the same time is quite simple and convenient to work with.

Adobe Photoshop 6.0 ... This program has long been considered one of the best professional graphics editing tools. The sixth version of this product also introduces new features for editing vector graphics and text.

2. The structure of the enterprise and the equipment of the workplace with technical means.


I had an internship at the Amur-Pivo JSC plant.

My workplace contained everything that was required to complete an internship.

Technical support:

Pentium III-1Gb computer

Fax modem

Network Card

Dot matrix printer

Internet connection.

3. Devices for input and output of information.

-Information output devices

PC peripherals are designed to input, output, store and transport data. They connect to its connectors. The computer requires drivers to communicate with them.

Information output devices.

a printer is a peripheral device capable of printing copies of electronic documents on paper.

Today manufacturers produce color and black-and-white printers using various paper sizes (as well as transparencies, cardboard). At home, as a rule, A4 devices are used, however, there are also wide-format models that allow you to get an image on carriers of A4, A2, A1, etc. In addition, almost any modern printer can make prints on mail envelopes and stickers. In consumer-grade machines, paper is fed for printing manually, and in professional machines it is automatically fed. Some models have duplex printing.

Most printers connect to your computer using the LPT1 and LPT2 ports.

According to the technology of obtaining an image, the following fundamentals of the variety of printers are distinguished: dot matrix, inkjet, laser, LED.

Operating principle dot matrix printers is simple. The print head, on which thin cylindrical rods (needles) are arranged vertically in a row, move across the gradually fed sheet of paper. As in a typewriter, an ink ribbon is stretched between the head and the paper, only it is connected in a ring and for ease of use is collected inside the cassette (cartridge). In color printers, the ribbon is colored in several color stripes, with the head controlling a section of each color separately.

Moving horizontally, the head gradually forms symbols on the paper. The line is printed in several passes, after which the page is advanced one step, and the next line begins to print. The letters are made up of dots in a rectangular matrix (hence the name for this type of printer). The quality of the printed original is directly related to the number of needles in the print head. The smallest number of heads is 9, currently 12-, 14-, 16-, 24-, 32-needle and other devices are also produced.

One of the main parameters of printers is performance. For dot matrix printers in text mode, it determines the number of characters printed per minute. There are three modes of their operation, differing in the quality and time of document output: black printing mode - the fastest, but the least quality; conventional printing and printing that provides quality close to that of a typewriter.

When using these devices, make sure that the moving parts are not contaminated with paper dust, and replace the ink ribbon or cartridge in time.

Dot matrix printers are very unpretentious, reliable, cheap and easy to use. Therefore, despite the appearance of more advanced technologies, they continue to be produced and find their application in those areas where it is not required to provide high quality originals. However, dot matrix printers print slowly, are noisy, often wrinkle paper, and are poorly suited for outputting drawings.

V inkjet printers the image is formed from droplets of ink that are ejected under pressure from the nozzle of the print head. This moves the head horizontally and the paper vertically. Ejection of ink is carried out either as a result of their heating to the boiling point, or due to the piezoelectric effect.

Available in black and white and color inkjet devices. The head of color devices, as a rule, contains three rows of nozzles - for ink in three primary colors (red, green, blue). When mixed in different proportions a color image of any shade is obtained.

The number of nozzles in the models can vary, which - similar to the number of needles for dot matrix printers - determines the highest possible print quality. In addition, the quality depends on the shape of the drop, its size, as well as the chemical properties of ink and paper, which determine the characteristics of absorption. This is why only certain types of paper are suitable for some printers.

Performance These machines - along with laser and LED printers - are characterized by the number of pages printed per minute, and for black and white and color originals, this indicator is different for the same device.

Another key characteristic is resolution. It is measured in dots per inch. Inkjet printers produce prints with a resolution of about 600 dpi (or more), which is sufficient for printing color photographs.

The print cartridges of the devices need periodic cleaning of paper dust - otherwise, the quality of the printouts will deteriorate over time. This procedure is usually carried out automatically using the device driver. It is also allowed to refill a spent cartridge.

Inkjet printers are very quiet, offer the best price / quality ratio, and therefore are extremely popular. In addition, they represent the fastest growing class of printing devices today.

Main disadvantages inkjet printers- the length of time the originals dry, especially when printed at high resolution, and their sensitivity to moisture.

Principle of operation laser printers is as follows. The laser head emits a beam. It is reflected by a rapidly rotating mirror onto a photosensitive drum, which receives a static electrical charge from a high-voltage thin wire. The drum, turning around its axis, passes through a cartridge filled with a dye - toner that adheres to the charged areas. The drum then comes into contact with the paper, causing the toner to transfer onto the paper. Finally, the sheet is pulled between the heated metal and rubber nip rollers and the toner particles are “baked” to the paper. The paper grade requirements for laser printers are also quite stringent. Unlike inkjet and dot matrix printers, laser printers do not print continuously, but page by page. That is, the image of the printed page is transferred from the computer to the printer's memory as a whole. Therefore, to process and store it, laser printers have a microprocessor, large memory, and sometimes hard drives.

Both black and white and color laser printers are available. Color laser printers do not differ from black and white printers in principle, only they use primary color toner cartridges.

The advantages of laser devices are impressive performance, reaching several tens of pages per minute, and very high resolution - 1200 dpi and more. In addition, laser prints are resistant to moisture and corrosive environments (for example, acids, alkalis - in low concentrations).

Laser print cartridges, like inkjet print cartridges, need to be cleaned and replaced from time to time.

A significant disadvantage of laser printers, especially color ones, in comparison with inkjet printers is their high price. For example, some professional color widescreen models cost around $ 15,000 to $ 20,000, making them unaffordable for many businesses. Therefore, the use of printers of this class is limited to large publishers and printing houses, where they have become indispensable tools. At the same time, A4 black and white laser devices are much cheaper and find their use both in institutions and at home.

V LED printers In place of the laser head, a line of miniature laser LEDs is used, located along the entire width of the printed page. This avoids the complex optical system for positioning the light spot on the drum. And although the resolution of devices of this class is slightly lower than that of lasers, they are more reliable and cheaper - due to the use of fewer moving parts.

Among the manufacturers of printers of all varieties that are well established in the market are Canon, Newlett-Packard, Tektronix, Epson, Olivetti, Star, IBM, Panasonic, Oki, etc.

-Information input devices

To enter into a computer static graphic images are used scanners, graphic tablets and digital cameras.

Scanners are devices that convert graphics and text, possibly printed on transparencies, into digital form. Many devices also have a special adapter for working with slides. Scanners are connected to a PC through various interfaces, for example, LPT, SCSI, USB. The latter are gaining more and more popularity due to the speed of information exchange with a computer and ease of management.

The most widespread variety, both among professional artists and home users, is flatbed scanners... In general, they are arranged as follows. The paper rests on a stationary glass along which a scanning carriage with a light source moves. Luminous flux of varying intensity is reflected from the original paper or passes through the film. A focusing lens projects a reflected beam onto a light-sensitive matrix - a CCD device. As a rule, a CCD consists of three rulers located along the width of the original and receiving information about the three primary colors, into which, as we have already said, any shade can be decomposed. The CCD converts radiation into electrical signals. Then they go to the analog-to-digital converter. Finally, the binary information is sent to the driver after being processed in the scanner controller.

Main technical characteristics of scanners - resolution, color depth, maximum scan size and performance.

The resolution depends on the number of CCD elements, the number of readings of information by them when the carriage passes a given path, and the positioning accuracy of the ruler during scanning. Based on these indicators, they often distinguish optical and mechanical resolution.

Optical resolution calculated by dividing the number of items in the ruler by the width of the stage. Typical for consumer scanners is 600 dpi. For text recognition, 300 dpi is enough.

Mechanical expansion is the quotient of the number of readings of information by the matrix by the length of the path traveled during this time by the scanning carriage.

Since the CCD cannot reproduce an image with a resolution exceeding the optical one, the scanner software "completes" the missing points if necessary. In this case, they talk about interpolation resolution.

Color depth characterizes the number of bits of information describing the color of each point in the image. In modern devices, it is usually 36 or 42 bits.

Maximum scan size may have different meanings. The cheapest and most common are devices that work with A4 paper sheets.

Productivity is determined by the time it takes to scan standard size color and black and white originals at a given resolution setting. For color drawings, as a rule, this figure is approximately 100 seconds, and for black-and-white text - several tens of seconds.

When choosing a scanner, in addition to its technical characteristics, it makes sense to pay attention to the capabilities of its driver. So it is very useful to manually adjust the parameters of the scanned image, which is not always provided by the "native" driver.

Therefore, after scanning, the pictures usually have to be additionally processed in graphic editors. And to recognize text documents, it is often preferable to use third-party products.

The main rule to follow when using flatbed scanners is to handle glass with care.

Graphic tablets are intended for input into a computer of outline images and handwritten text. These devices consist of a touch panel and a special pen attached to it with a wire or interacting by means of electromagnetic waves. Graphic tablets use various technologies... In general, the principle of their action is to fix the movement and pressing force of the manipulator by the surface of the panel. As a result, the drawn line is reflected on the screen and can be saved electronically using the software of the device.

Digital cameras take images using a CCD and store them in memory. Advantageous differences between digital cameras and film cameras are the speed of taking pictures, the ability to view them on the built-in LCD display and instantly delete unsuccessful ones, connect the device to a TV, printer, and most importantly - to a PC to edit the footage. Digital cameras can be connected to a computer through serial, USB and other ports. A separate output is provided for connection to the TV.

Defining characteristics of digital cameras - number of CCD elements - matrix and memory capacity... Such important parameters as focal length, magnification, shutter speed, light sensitivity, etc. fundamentally do not differ from the parameters of conventional cameras.

The number of elements of the CCD - matrix determines the quality of the resulting electronic photographs. The larger the matrix, the higher its resolution, and, accordingly, an accurate image transfer. Matrices of modern models have about 2 million elements, which provides a resolution of about 120051600 pixels.

The maximum number of frames that the camera can take at one time depends on the memory capacity. The most common memory on removable media - cards with a volume of 16.32.64 MB, etc.

When shooting, it should be borne in mind that the number of shots depends both on the set resolution and image file format, and therefore may vary for one model. Photos taken at high resolution take up more volume. As for the features of graphic file formats.

In addition to cameras on removable cards of various types, there are devices that save photographs on CD-R discs.

The disadvantages of digital cameras include the complexity of outputting an image on paper, since high-quality prints are not obtained on any color printer.

However, to view electronic photo albums, you do not need to print them or turn on your computer. Among the latest curious innovations are digital photo frames. They are LCD panels with imprints for memory modules used in digital cameras. The device reads graphic information from the carrier and reproduces it. There are even frames that can automatically connect to the Internet and display photographs posted on the website of the supplier of the product.

Digital video cameras use CCDs to record video images and record them on film. The advantages of quiet devices over analog cameras are excellent image, stereo sound that is not inferior in characteristics to stereo sound from CDs, the ability to repeatedly re-record footage without loss of quality. Editing a captured film is much more convenient, digital editing software offers tremendous opportunities for cutting and pasting video clips, adding titles, special effects, transitions between frames, voice-over music and commentary. In addition, any frame can be saved as a digital photo. Finally, a digital film rewritten to CD can remain unchanged for about 200 years.

For connection to a computer, most digital video cameras are equipped with IEEE 1394 connectors for fast data transfer. Since the file size of digital movies is very large, a large hard disk is required to process them on a PC. High performance of the computer is no less important - you need to have at least a Pentium processor with a clock frequency of 200 MHz and 64 MB of RAM.

Key parameters of digital video cameras - this is the format, the resolution of the CCD - matrix, photosensitivity, magnification, image stabilization.

Similarly to cameras, digital video cameras have CCDs - matrices of various sizes, which determines their resolution and, in many respects, the quality of shooting. In professional video cameras, three CCDs are installed - for more perfect image digitization. Light sensitivity measures how well a camcorder can shoot in the dark. The higher it is, the better. Some camcorders are capable of shooting in infrared rays, i.e. in complete darkness, giving out a specific monochrome image. Light sensitivity is measured in lux.

The frame stabilization function keeps it stable by preventing jitter. In modern devices, there are both digital and optical stabilizers. Optical stabilization provides better results than digital stabilization.

4 .Safety at the enterprise.


1) Organizational measures to ensure the safety of work.

Organizational measures to ensure the safety of work in electrical installations are:

Registration of work with a work permit, order or list of work performed in operation.

Access to work

Supervision during work

Registration of a break in work, transfers to another workplace.

2) Technical measures to ensure the safety of work carried out with the release of stress.

To prepare the workplace when relieving stress, the following technical measures must be taken.

- The necessary shutdowns were made and measures were taken to prevent the supply of voltage to the place of work due to the erroneous or self-productive switching on of the switching equipment.

Hang out prohibition posters on the keys for remote control of switching equipment.

Check the absence of voltage on live parts, which must be grounded to protect people from electric shock.

Grounding overlays.

Display warning and prescriptive posters, and, if necessary, secure the work area and live drive parts. Depending on the local current conditions, the drive parts are shielded before or after earthing.

With prompt service El. installations by two or more persons per shift, the activities listed in this paragraph must be performed by two. In case of sole maintenance, they can be performed by one person, except for the imposition of portable grounding in electrical installations with voltages above 1000V. and the production of switchings carried out on two or more connections in electrical installations with voltages above 1000V, which do not have operating devices.

5.Main technical specifications of PC hardware


The traditional PC consists of system unit, monitor, keyboard, mouse... This hardware constitutes basic configuration... The mechanisms installed inside the system unit are called internal, and connected externally external... In addition, additional external or peripheral devices designed for input, output, long-term storage and transportation of data (printers, scanners, drives, modems, etc.) can be connected to the computer.

-System unit.

The system unit is the brain of the computer. It contains the most important details.

System units are made in desktop and vertical cases.

In width, among desktop cases, they are flat and especially flat, while the length is approximately 35 cm. A monitor is usually placed on top of desktop cases, and a keyboard is placed in front of the case. This design takes up a lot of space on the desktop, besides, the monitor turns out to be quite high, which is inconvenient. For this reason, vertical enclosures are now the most popular.

Korkusa towers can be of various sizes. So, small ones have a width of about 17-18 cm and a height of 35 cm. The height of medium-sized towers is 40, and of full-size ones - 60 cm. Depending on the dimensions, vertical cases are placed either on the table or next to the table on a stand. For floor-standing installations, the cable length may not be sufficient to connect the monitor, keyboard, and mouse.

In addition, the housings differ form factor- a parameter that determines a number of internal design features of the system unit, as well as the requirements for power supply and the way to control it. Currently, ATX form factor cases are being produced, which, in particular, provides automatic shutdown of the computer. However, in everyday life, system blocks of the older AT standard are also used. The form factor of the case must necessarily match the form factor of the motherboard.

On the front panel of the system unit there are buttons for turning on the computer's power, restarting, as well as receiving holes for CD-ROM drives, floppy disks and other storage media. On the back panel of the case there are connectors for the keyboard, mouse, monitor, and some others, through which external connectors installed on expansion cards- boards on which there are end printed connectors for connection to other boards,

for example, maternal.

Structurally, system units may differ, for example, in the number and types of CD-ROM drives.

-Motherboard and devices located on it.

Motherboard is the main board of a PC that determines its architecture and performance. Therefore, it is better to choose products from well-known, well-established manufacturers, for example, Internet, ASUSTeK, etc.

The following main parts are located on the motherboard:

CPU(Central Processor Util, CPU) - the main microcircuit performing computational and logical operations;

RAM(RAM) - a set of microcircuits for storing data while the computer is running;

ROM(read-only memory) - a chip for long-term data storage;

Tires- sets of conductors for exchanging signals between internal components of computers;

A set of microcircuits that control the operation of the internal components of the computer and determine the functionality of the motherboard;

Connectors(slots) - extensions for connecting additional devices.

-CPU

Processors (Central Processor Util, CPU) are characterized by a working voltage, bit width, clock frequency, clock frequency multiplier and cache memory.

Working voltage provided by the motherboard. Therefore, brand-specific processors are compatible with specific motherboards and should be selected consistently.

The lower the processor operating voltage, the better. First, lowering the voltage makes it possible to reduce the distance between the structural elements of the processor without the threat of electrical breakdown. Secondly, the heat dissipation in the processor is also reduced, which allows you to increase performance without fear of overheating. Intel's lower-generation x86 processors used an operating voltage of 5V. V currently it has been reduced by about half.

Bit depth the processor determines how many bits of data it can receive and process at one time. The first x86 processors were 16-bit. All modern processors are 32-bit.

Clock speed is the processing speed measured in megahertz. The higher it is, the more instructions the processor executes per unit of time. So the first models of Intel processors (i808x) worked with clock frequencies less than 5 MHz, while the models of the i808x line - with frequencies not exceeding 100 MHz. Today, the clock speed of the latest processors has been increased to 3.06GHz, and the race for speeds continues.

Clock pulses are generated and transmitted to the processor by the motherboard. However, its clock speed is much lower. Therefore, the processor occurs clock multiplication by a certain coefficient.

Data exchange inside the processor is noticeably faster than with RAM. Therefore, to store a copy of the most frequently accessed areas of RAM, a high-speed buffer memory is used, which is called cache memory... When the processor needs data, it turns to the cache memory, and only if the necessary data is not there - to the RAM. The larger the cache memory, the better the processor performance.

Consequently, the performance of the processor is determined by a number of parameters, and not only by the increase in performance.

The processor is connected with other devices, and above all with RAM. There are three main tires: address bus, data bus and command bus.

An address bus is a set of wires to which signals in binary form are sent to enable addressing. Previously, address buses were used, consisting of 16 parallel lines. Modern address buses are 32-bit. A logical unit is determined depending on the presence of voltage on each of the lines. A sequence of 32 ones and zeros forms the address of the RAM cell, which the processor accesses.

Data bus- designed for data exchange between the processor and RAM. Thus, unlike the address bus, the data bus is bi-directional. In modern PCs, it has 64 lines.

The command bus is used to transfer the commands from the RAM to the processor, which are necessary for it to process the data. There are 32-, 64-, 128-bit buses.

Thus, the processor operates with address data, data itself and commands. The set of instructions executed by the processor constitutes the processor instruction set. Processors that have the same instruction set are called software compatible. That is, a program written for one processor will be "understandable" to another. Processors that have similar instruction sets are called limited compatibility.

At the same time, the younger models of the family are able to execute commands written for the older ones. This means that code written for the 486 will usually run correctly on the Pentium II and other compatible processors.

In addition to the processor, the motherboard is equipped with coprocessor- an additional microprocessor designed to perform certain operations and unload the main processor.


-RAM.

Random access memory (RAM) is one of the most important internal components of a computer. It is designed for the operational exchange of data and commands between the processor, external memory and others under PC systems.

After the power supply is interrupted, all information contained in the RAM is destroyed. Therefore, the work done must be saved as files on the hard disk of the PC or other storage devices.

RAM requirements include large volume, speed and performance, data storage reliability.

A large amount of RAM makes the PC work efficiently in multitasking mode. If the computer does not have enough RAM for a particular operation, then it begins to use a slower hard disk for temporary storage of information. The requirements for the amount of PC RAM are constantly growing.

You need to choose the size of RAM when purchasing a PC, taking into account the tasks that will be solved with its help. So, when processing two-dimensional and three-dimensional graphics, sound, video, as well as in multi-tasking mode, very strict requirements are imposed on the amount of RAM.

Performance RAM is determined by the time of execution of write and read operations, data The most important parameters are minimum access time and cycle time.

Minimum access time(Memory Access Time) is the shortest time it takes to set an address on the address bus and read data from the data bus. It is measured in nanoseconds.

Cycle duration- this is the minimum period of consecutive memory accesses, while the read and write cycles can take different times.

RAM performance depends on the type and speed of the storage elements used in it, the width of the memory bus. In turn, the performance of the RAM, along with the performance of the processor, determines the performance of the computer. Data storage reliability ensured by the quality of microcircuits used in RAM. Modern technologies make it possible to produce highly reliable RAM microcircuits, which, if used correctly, have a residual low probability of failure.

Structurally, the PC RAM is located on standard panels, or modules, which are inserted into the corresponding connectors on the motherboard.

- Permanent storage device.

So, RAM operates with data and instructions required by the processor. However, when the PC is turned on, the RAM is empty: without electric power, it cannot save anything for more than a hundredth of a second. Meanwhile, the processor needs commands, including immediately after switching on. Therefore, a start address is set on its address bus, indicating a different type of memory - permanent storage device, ROM. The ROM chip retains information even when the computer is turned off.

The software package in ROM is called basic input / output system... The main functions of the BIOS are checking the composition and operability of the computer, as well as ensuring interaction with the keyboard, monitor, hard disk and disk drive.

At the initial stage of loading, a message appears on the monitor screen indicating which key should be pressed to invoke the SETUP program. When operating with the BIOS settings, it must be remembered that an illiterate change can damage the computer.

But the ROM is programmed before the computer is assembled, which means that there can be no such need for information included in the BIOS programs, such as the characteristics of the processor, hard and floppy disks and other internal devices. Moreover, the composition of the computer hardware changes, and information about these changes must be recorded somewhere.

Since neither RAM nor ROM is suitable for this purpose, a CMOS memory chip is used in which data is stored regardless of whether the PC is turned on or not.

- Chipset.

Role connecting link between all the components of the motherboard, plays a set microcircuits, or chipset... It determines its functionality to the greatest extent. Now chipsets are produced on the basis of two microcircuits called "north bridge" and "south bridge".

-HDD.

A hard disk or hard drive is a metal, aluminum, disk with a double-sided magnetic coating of cobalt or chromium oxide with a thickness of about 10 microns. More precisely, it is a collection of round plates,

mounted on an axis called spindle... Thus, a hard disk has not two surfaces, but many, which increases the amount of information that can fit on it. The hard drive is in hard drive inside the system unit.

The first IBM PCs did not have hard drives. They were equipped with floppy disk drives, which served as the disk system. But today, hard drives are the main device in a computer for long-term storage of large amounts of data and programs. Without it, modern powerful applications and operating systems cannot function.

While the PC is running, the hard disk rotates at a very high speed (from 12000 rpm). In this case, information is recorded on the working magnetic layer and read from it using magnetic heads located on a mechanism that resembles a pickup lever on a turntable. The heads are driven by a special driven.

The recording process is carried out as follows. When the disc is turned off, the heads are retracted and lie flush with the surface of the disc. But as soon as the plates begin to turn, the heads, under the influence of the air flow, rise and hover at a distance of several microns, and a magnetic field appears in the resulting gap. When the current flowing through the heads changes, the surrounding magnetic field is modified, which in turn affects the properties of the material that forms the coating of the discs. This is how the hard disk is recorded, and the information is recorded in the form of concentric tracks... The set of such tracks located one above the other on the surface of all disks is called cylinders which, in turn, break into sectors fixed numbers. A sector is the smallest block of data that can be written to or read from a hard disk.

Reading is carried out in reverse order. The particles of the magnetic layer of the hard disk act on the magnetic heads, which transmit the corresponding signals to the processor for processing.

In order to get tracks, cylinders and sectors on a hard disk, a procedure called physical, or low-level, formatting must be performed on it. At the same time, information is written on it, which determines the marking of the cylinders into sectors and numbers them. Low-level formatting is initially done at the factory, but it's easy to do at home using the FDISK program.

The height of the "flight" of the heads must be controlled quite strictly, otherwise they will not fall on the working layer.

For the safety of the heads and hard drive, it is extremely important not to let the head fall onto the working magnetic surface. To prevent this from happening, when the computer power supply voltage drops, the heads are automatically packed - they are diverted to a special non-working area, where their landing is permissible. Sometimes, at the moment of turning off the computer, you can hear characteristic sounds accompanying this process.

The device that controls the operation of the hard disk is called hard disk controller. In modern PCs, its functions are performed by microcircuits included in the processor kit. In some cases, the hard disk controller is built into the drive itself.

Any modern hard disk has its own cache memory, which significantly increases its performance. The fact is that the speed of reading data from the cache memory is several times higher than the speed of reading information from platters. The disk cache stores the data that is most frequently accessed by the programs running at the moment. Sometimes a buffer is installed on disks not only for reading, but also for writing information.

The defining parameters of hard drives are form factor, capacity, performance, and MTBF.

The form factor of a hard drive characterizes its size. Currently, there is a tendency to reduce the size of hard drives, which allows you to make the system unit more compact.

Capacity hard drives depend on their manufacturing technology. If a few years ago a capacity of several hundred megabytes was sufficient for installing software and storing data, now it is already in the tens of gigabytes. A large volume of hard drives is an urgent need today, when multimedia technologies are rapidly developing.

Performance, in turn, is determined average access time to data and their transfer rate.

Average access time is the time interval during which the hard drive finds the required data. It is the sum of the time required to position the heads on the desired head and the waiting time for the required sector.

Baud rate measured in megabytes per second and primarily depends on the characteristics of the interface through which the hard drive is connected to the motherboard.

MTBF- is calculated by manufacturers by testing a certain number of devices for a given period of time.

- Floppy disk drive.

Modern hard drives are capacious and durable, but they are not convenient to use for transporting information from one computer to another. The fact is that, despite their name, hard drives are quite fragile devices, very sensitive to mechanical and other influences. In addition, removing and installing a hard drive is a rather laborious procedure that requires time and knowledge.

Therefore, to exchange small amounts of data and store archives, they use floppy magnetic disks which are inserted into a special drive... The inlet of the drive is located on the front panel of the system unit. The floppy disk should be inserted into the drive with the metal part first, while the central sleeve should be at the bottom. To eject the floppy disk, you need to press the button located next to the drive.

The main characteristics of floppy disks are - these are the size, recording density and capacity.

Floppy disks are in inches. The first drives used 5.25-inch floppy disks, referred to as 5-inch for short. They were placed in special paper envelopes. Nowadays, 5-inch floppy disks are not available, although disk drives for them can still be found on very old PCs.

Modern floppy drives are designed to accept double-sided 3.5-inch floppy disks. These media are enclosed in a hard plastic sleeve that protects the floppy disk from mechanical stress and dust.

Recording density information is measured in multiples. Recording media are now considered standard and are designated HD (High Density). The increased density of data recording is accompanied by its faster transfer.

The first IBM single-sided floppy disks, introduced in 1981, had a capacity of 160 KB. They were soon replaced by 320KB double-sided 5-inch media. Since 1984, the production of 5-inch high-density floppy disks, containing 1.2 MB of data, began. The capacity of today's standard 3-inch floppy disks is 1.44 MB.

In order for a floppy disk to be used as a storage medium, it must be properly prepared: write down marks that determine the position of tracks and sectors, and also identify areas that are not suitable for recording. This procedure is called formatting.

The floppy disk drive has two motors: one ensures a stable rotation speed of the hub placed in the floppy disk drive, and the second moves the magnetic heads. When a floppy disk is inserted into a drive, its central hub is gripped by the spindle, rotated, and the drive heads read or write information. In this case, sometimes you have to meet with the incompatibility of drives due to inaccurate positioning of the heads. A drive with incorrect positioning will correctly read and write data to floppy disks formatted on it.

Another problem with floppy drives is dust contamination of the magnetic heads. Although the inlet of the drive is covered with a protective shutter, contamination occurs quite often. This leads to a deterioration in the quality of reading and writing data and even damage to the floppy disk. To avoid such troubles, it is recommended to regularly clean the drive using special cleaning complexes, which include a floppy disk and a cleaning liquid. The paper part is moistened with liquid, a floppy disk is inserted into the disk drive and an attempt is made to read. As a result, the heads touch the rotating wipe and are cleaned.

Floppy disks have write protection key. It is designed as a movable shutter covering a small square hole in one of the corners of the floppy disk. If this hole is open, it will not be possible to write data to the floppy disk.

Floppy disks require careful handling: despite the name, they must not be bent, and also must not be exposed to direct sunlight, electromagnetic fields, moisture, low and high temperatures. Failure to comply with these rules leads to partial or complete loss of data, and sometimes the uselessness of the floppy disk.

Thus, floppy disks are unreliable and short-lived storage media. They can be used only as a means of temporary or backup storage of information.

-CD drive.

The volume of modern programs, as well as graphic and sound files is extremely large, so the capacity of floppy disks for them is sorely lacking. In this regard, since the mid-90s of the XX century, a CD-ROM drive has been included in the basic configuration of PCs.

The principle of operation of the CD-ROM drive is to read data by laser beams reflected from the surface of the CD. Physically, the information on the CD-ROM is represented by alternating flat areas and depressions. Falling on a flat area, the beam is reflected on the light-sensitive element, registering it as a binary unit. The deepening scatters light, so the photosensitive element fixes zero. A compact disc has one continuous spiral track running from the edge of the disc to its center.

To open or close the drive, you must click on the button next to it. There is also a lamp-indicator of access to the drive, a socket for connection, a volume control and a small hole designed for emergency ejection of a CD in cases where this cannot be done in the traditional way, for example, when the output tray fails. If you insert a pin into the hole and press gently, the drive will open.

The CD must be placed in the drive, with the work surface facing down.

CD-ROM discs compare favorably with floppy disks in high capacity - usually 650 MB, but there are also more capacious ones. In addition, these media are more durable and can store information for 200 liters. Installation kits of software products, multimedia information are recorded on them.

The most important characteristic of a CD-ROM drive is data transfer speed. The unit of measurement is taken as a speed of about 150 Kbytes / s. It is designated by the letter "X". Currently, the most common drives with a performance of 42-52X. It should be borne in mind that the supplier, as a rule, indicate only the maximum rotational speed of CD-ROM disks.

Fast drives are, of course, more attractive. Meanwhile, at high speeds, they become more susceptible to CD defects: uneven thickness of the aluminum layer, incorrect track spacing, etc.

The main disadvantage of CD-ROMs is the inability to record information. However, other devices serve this purpose.

CD-R drives have the ability to write once. In addition, CD-R drives are capable of reading and copying CD-ROMs and music CDs. Data stored on CD-R discs cannot be changed or deleted.

In addition, there are CDs with the ability to erase and rewrite data. To operate with them, special rewritable drives are also required. Their work is based on the Phase Change technology, the essence of which is the transitions of the working layer of the disk under the action of a laser beam into a crystalline or amorphous state with different reflectivity. However, CD-RW drives can also write CD-R discs. The disadvantage of CD-RWs is that CD-RWs can only be read by modern CD-ROM drives, since this requires a strictly defined wavelength of the laser beam and a number of other technological features.

The speed of CD-R drives is indicated by two numbers and CD-RW drives by three numbers. For example, an 8x / 4x / 24x drive can write CD-R discs at a maximum speed of 8x, CD-RW discs at a maximum speed of 4x, and its CD-ROM read speed is 24x.

DVDs are becoming more and more popular. These media contain an enormous amount of information. There are single-sided and double-sided DVDs, single-layer and double-layer. Single-sided single-layer have a capacity of 4.7 GB, double-layer - 8.5 GB, double-sided single-layer - 9.4 GB, dual-layer - 17 GB. The huge capacity of the discs is due to the increased density of information recording on them - by means of a laser beam with a shorter wavelength. For example, in a CD-ROM drive, the laser wavelength is 780 nm, and in DVD drives, it is from 635 to 650 nm.

DVDs are used for storing movies, music of modern games, etc. The sound range of DVDs, as a rule, is recorded in the Dolby Digital format, which provides six-channel surround sound.


-Video adapter.

Video adapter- this is an expansion card, which is necessary for displaying information on the screen. The video adapter and monitor form video system computer.

The main elements of the video adapter are - video processor and video memory... These devices are required by the video adapter to process and temporarily store data about the image that is displayed on the monitor screen. The larger the amount of video memory, the more efficient the computer's video system. However, for the video adapter, it is only the amount of memory that matters, but also its speed.

In old electronic computers, there was no video card. Information was displayed by them using indicators and a printing device. The monochrome video adapter appeared in the first IBM PCs. Its only mode of operation was text. A little later, there were also graphic monochrome video adapters. Then they were replaced by a color graphics adapter that supports 4 colors. It worked in both text and graphics mode. Enhanced video adapters are now in use, providing 16.7 million colors and giving the ability to choose screen resolution.

Resolution, color depth and screen refresh rate are no less important parameters of a computer's video system than video memory.

The screen resolution is determined by how many dots in a horizontal line and vertical lines are displayed on it. The higher the resolution, the larger the visible area, the more information is displayed by the monitor. But at the same time, the dimensions of the image elements are noticeably reduced, so it becomes more difficult to see small details. On the other hand, too low a resolution leads to the fact that the elements of the image are made too large, and they begin to run out of space. In addition, if you set a resolution that goes beyond the optimal range for a particular monitor model, then the working area may stop decreasing on the screen altogether, and in order to see its individual parts, you will have to move the viewpoint to different sides with the mouse cursor.

Taking into account these features, the optimal screen resolutions for the minors of each size, supported by the video adapter, are adopted.

Color depth characterizes the number of colors transmitted by the monitor. Modern programs - primarily graphics and video editors, games, multimedia - present very high requirements for this indicator. However, video memory imposes its limitations on the color palette. Therefore, with a small amount of it on new low-performance PCs, it is better to set the resolution to 256 colors. Otherwise, the computer will run very slowly. However, on modern computers for solving most everyday tasks, as a rule, the High Color color mode is quite sufficient. True Color color depth provides the most comfortable experience for the eyes, but it requires powerful, such as 32 MB, video memory.

In addition, the number of colors transmitted by the monitor is determined by the set screen resolution.

Screen refresh rate, or frequency sweep, is measured in hertz and shows how many times the screen is redrawn per second. If it is low, the image flickers, which affects vision. Now the standard is considered to be a regeneration frequency of at least 85 Hz. In addition to the adapter, the monitor must also support this frequency.

Thus, the performance of a particular adapter depends on the selected resolution, the number of colors and the frequency of the scan.

Modern video adapters include 2D and 3D accelerators - special cards that accelerate the processing of 3D and 2D graphics. They are needed because the rendering of graphic images requires very large system resources, and the processor cannot cope with this task on its own.


-Sound board.

A sound card is an expansion card with which a PC processes sound. Speakers are connected to its output through which audio information is output. The special size allows you to transmit the audio signal to an external amplifier. In addition, there is a microphone input and other connectors.

Although sound cards in a PC appeared relatively recently, and, in principle, it can function without them, now it is already difficult to get by with a computer that does not know how to "talk". Modern operating systems and most applications through sound signals notify the user about their status. In training programs, a significant proportion of information is transmitted through the lecturer's oral speech. Games are no less demanding on the sound capabilities of the PC. The most important characteristics of a sound card are bit depth, maximum frequency


sampling, ADC and DAC, the number of supported audio channels.

The bit width determines the number of bits used in binary coding of an analog signal and inverse conversion. The larger it is, the more realistic the sound output from the computer becomes. 32- and 64-bit boards are widely used today.

Sound quality also depends directly on the maximum sampling rate used by the ADC and DAC of the board.

Since the computer today is increasingly used as a music center and home theater. In addition, the latest models of these devices provide multi-channel sound in the Dolby Digital standard.

However, it should be borne in mind that the sound parameters depend on the characteristics of not only the board, but also the speakers. As standard, PCs are supplied with low-power speakers that do not provide high sound quality, so they have to be selected specifically taking into account the user's needs.

-Monitor.

Monitor- this is the main output device. It serves as a visual channel of communication between the user and the software and determines the ease of use of the computer as a whole.

In general, the monitor is arranged as follows. Inside it is kinescope... The kinescope consists of cathode guns, a mask - a panel with evenly spaced holes - and a glass screen covered from the inside with a phosphor of three primary colors. When a signal arrives at the CRT, the guns emit a stream of electrons. They are focused by the mask and directed to the phosphor, which begins to glow with the corresponding color.

The most important parameters of the monitor are its dimensions, size, mask pitch, screen refresh rate, safety class.

The size of the monitor is determined by the diagonal distance from one corner of the CRT to the other. It is measured in inches. The visible part of the screen is slightly smaller than the CRT, since it is enclosed in a plastic case. Therefore, manufacturers often indicate both characteristics. Standard sizes monitors - 14,15,17,19,21 inches.

Mask step is the distance between its adjacent holes. The smaller it is, the clearer and brighter the resulting image. There are several types of masks, but they all serve the same function.

The refresh rate of the screen, along with the resolution, depends on the properties of both the monitor and the video adapter.

It should be borne in mind that large monitors with good technical parameters require a powerful video adapter with a high-performance video processor and a large amount of video memory to fully function.

Since people spend a significant portion of their time in front of computers, monitors must meet strict requirements for safe use.

Recently, more and more manufacturers have begun to equip their monitors with a serial universal bus (USB) port. This is very convenient for connecting serial peripherals for fast data transfer.

To work in the field of computer graphics, it is important to know about the possibilities of calibrating the monitor - checking it to match the colors of screen images and printouts of the printer. Some devices come with special programs for this purpose.

In addition to CRT monitors, there are liquid crystal displays. An important parameter to the LCD is the viewing angle value - at which the image on the screen does not undergo distortion. The bigger it is, the better.

LCD displays have some advantages over CRT monitors.

First of all, they are safer and more user-friendly. In a CRT, an electron beam moves across the screen to update the image. And although you can set the refresh rate high enough to keep the picture stable, such monitors still have a negative effect on vision. LCDs are arranged differently. In general, we can say that on their screen every pixel is either "on" or "off". Therefore, there is no flicker. Moreover, the level of radiation in LCDs is significantly reduced.

In addition, they are characterized by lower power consumption, compactness and lighter weight. Meanwhile significant disadvantage LCD displays remain at their high price, due to the complexity of the production technology.

-Keyboard.

A keyboard is a device that contains a set of keys used to interact with a computer. It serves as the primary means of entering textual information and commands. Although there are alternatives - for example, controlling a PC using spoken language - and in the future, perhaps, the need for a keyboard will disappear, nowadays it is almost impossible to do anything on a computer without it.

The keyboard is usually made in the form of a separate device connected to the computer with a thin cable - to the PS / 2, USB ports. There are also wireless keyboards, data exchange between them and the computer is carried out by means of an infrared beam through an infrared port. The radiation source is the keyboard. Portable PCs (laptops) use a built-in keyboard. To save space, it often lacks some keys.

The software required for the keyboard to function is part of the BIOS, so the computer responds to keystrokes as soon as it is turned on. There is a microcircuit inside the keyboard that monitors keystrokes and sends the corresponding signals to a special microcircuit in the motherboard - port keyboard. The keyboard port sends an appropriate message to the CPU, called an interrupt. Upon receiving an interrupt, the processor suspends the current operations and proceeds to the execution of the program for processing keyboard interrupts. Under the control of this program, he accesses the keyboard port and determines which binary code of the character corresponds to the registered scan code. This binary number is then directed to a special memory area - keyboard buffer... This completes the execution of the keyboard interrupt handler programs, and the process returns to pending operations. The information is stored in the keyboard buffer until it is used by the program needed in it to display the corresponding letter or number on the monitor screen.

A failure in the keyboard interrupt handling system causes the computer to stop responding to keystrokes. If the keyboard buffer overflows, then characters on the screen are displayed with some delay - this usually happens on old low-power computers with fast typing or a large number of running programs.

Sometimes you have to face another problem: the unwanted appearance of several characters at once when you press the corresponding keys once. This is due to the fact that the PC will provide for automatic repetition of characters when holding the keys for a long time. Therefore, it is necessary to adjust the sensitivity of the keyboard. In this case, both the time after pressing, after which the automatic repetition of the character will begin, and the repetition frequency are regulated.

Most modern computers use a standard keyboard with just over 100 keys. Its layout is designed based on the convenience of work.

There are four main groups of keys in the keyboard: alphanumeric keys, cursor keys, numeric keypad keys, and function keys.

-Mouse.

A mouse is a manipulator-type device for entering information into a PC. It was invented by Douglas Engelbart in the early 60s. Today, no computer can do without a mouse, since it is the most important control tool for most modern programs.

Structurally, the mouse is a small flat box with rounded corners and connected to the computer by a long thin cable. For the distant outward resemblance with the famous rodent, it got its name.

Mice are connected to the serial port (COM1, COM2), as well as the PS / 2 port. In addition, USB keypads have been gaining popularity in recent years.

There are also wireless devices that communicate with a computer using an infrared beam.

There are buttons on the upper side of the mouse - there are usually two or three of them. The function of the buttons is different and is determined by the PC software.

On the "belly" of the mouse there is a covered rubber ball. When the mouse moves over the surface of the table, the ball rotates and sets in motion two rubber rollers inside the manipulator. The rollers, in turn, communicate it to two discs with holes. Near each of the discs there are a pair of photosensors that track the direction and speed of their rotation. The photosensors generate pulses that are transmitted to the computer via a cable. This information is used by the software to coordinate the movement of the manipulator on the table surface with the movements on the screen of a special graphic object - mouse pointer... In the Windows operating system, the mouse cursor usually looks like an arrow, but it can change its appearance when certain events occur in the program with which the user is currently working.

The program that allows the mouse to interact with the computer is called mouse driver... It is required because the BIOS does not support a mouse. This is why it does not work until the mouse driver is loaded. The driver interprets signals from the port to which the mouse is connected and transmits information about the state of the mouse to the operating system and application programs. In addition, it provides mouse-specific functionality.

Laptop computers are not equipped with an ordinary mouse, but a touch pad. In order for the mouse cursor to move around the screen, move your finger across it.

There are optical mice that use a beam of light rather than a ball to position the cursor on the screen. They do not need a rug, are less dirty, more durable, but very demanding on color.

In order for the PC to correctly distinguish two consecutive single clicks from one double clicks, it is often necessary to adjust the sensitivity of the mouse. Windows provides a choice of the time interval during which two consecutive clicks are counted as double clicks.

The mouse, like the computer in general, must be handled with care. Sometimes it needs to be disassembled and cleaned.

Site iXBT.com was created and is developing with one strategic goal - to provide you with the opportunity to obtain as complete, objective and useful information as possible about high technologies, personal computers, their components and peripheral devices.

We do not aim to cover the entire range of information on this topic, it is simply impossible. In the selection of information, of course, our subjective opinion is present, but the main factor influencing our opinion, as the editors of the site, is the interests of our readers.

We see our mission in the formation of a civilized market for high technologies and computers in Russia. We want our readers to have a choice and to buy only quality products. We also want entrepreneurs to be able to order, implement and sell only high-quality equipment and technology.

A bit of history

The site has existed since January 7, 1997. Official site opening date iXBT.com is October 1, 1997. Over the past time, the site has been constantly developing, new sections, new authors and new topics have appeared. The appearance of the site has changed several times:

Feedback

The editors of the site enter into correspondence. The letter can be sent in Russian or English... In extreme cases, the use of transliteration is allowed. If the letter contains the correct return address, then, as a rule, you will receive a response within ten days. If you have not received an answer, you should repeat the letter.

We kindly ask you to ask all questions of a general technical nature first of all in our conference: forum.ixbt.com

The editors of the site are physically unable to retell the site materials in letters and answer general questions.

Legal basis of the site

Since June 10, 2002 website iXBT.com registered as an electronic mass media (mass media), therefore, now all materials published on the site are subject to the norms of the legislation on the mass media of the Russian Federation.

Site content rights

Rights to all materials posted on the site iXBT.com belong to the site iXBT.com.

Author's articles (containing the author's first and last name) published on the site iXBT.com are the property of iXBT.com... All published articles are written either by the site's in-house authors iXBT.com, either by order of the site, or offered for publication in finished form... Copyright for articles published on the site iXBT.com always belongs to the authors of the articles.

Any site materials iXBT.com it is forbidden to copy, except for personal use (site visitor iXBT.com can save copies of articles to local disk. Placing copies of materials in local and other networks is not allowed). The conditions for citing materials from the site are presented below.

For citing news, articles and other site materials iXBT.com it is necessary to obtain the prior consent of the site administration iXBT.com and be sure to put a link to the site iXBT.com when using materials.

The iXBT.com website does not post materials, the copyright and related rights to which (including the distribution rights) belong to other individuals or legal entities. In the event that such material will be posted on the pages of the site, the copyright holder should contact the administration to resolve this issue. All claims will be processed within a reasonable time frame.

Related property rights

We believe that, when referring to the manufacturers of the products we mention, it is reasonable to place graphic material next to it that is appropriate to the context. If the owners of these materials think otherwise and would like to remove graphic material or a link to their company from our pages, they can send a letter to the site editor: [email protected] and we will fulfill this wish within a reasonable time.

Site name and link type

Name iXBT.com is a registered trademark. When referring to the site, the following spelling should be used: in the first word of the name, the first letter is lowercase, all the rest are uppercase; after the dot, all letters are lowercase. We recommend using normal or bold font.



7. List of used literature.

1. Vasilyeva V.S. Personal Computer. Fast start. - SPb .: BHV - Petersburg, 2001 .-- 480 p .: ill.

2. Andreev A.G. Microsoft Windows 2000: Server and Professional. Russian version / SPb .: BHV - Saint Petersburg, 2000.-1056 p .: ill.

3. www.ixbt.com

4. A. Zharov. Computer hardware 2000 Moscow: "MicroArt", 352 p.

5. www.aport.ru

6. Ivan Frolov. Computer "hardware": a reference manual - M.

7. Scott Mueller. Modernization and repair of personal computers. "Publishing house BINOM", 1997-896, ill.

8. Naumann.Sh, Ver.Kh. Computer network. Design, creation, service. M: DNA. 2000-336p. Ill.

9. Handbook of integrated microcircuitry. S74 / B.V. Tarabnin, S.V. Yakubovsky, N.A. Barkanov et al. 1980-816 pp. Ill.

10. Integrated microcircuits: Handbook / B.V. Tarabnin, L.F. Luntn, Yu.N. Smirnov et al. 1984-528 pp. Ill.

11. Ogletree Terry. Modernization and repair of networks, 2nd edition: Publishing House "Williams", 2001-928 pp. Ill.

12. Reference book of radio amateur / AA. Bokunyaev, N.M. Borisov, R.G. Varlamov et al. 1990-624 pp. Ill.

13. Assembler. Training course - St. Petersburg: Piter Publishing House, 1999-672 pp. Ill.

14. Microprocessor and microprocessor sets of integrated circuits: Handbook / B.B. Abraitis, N.N. Averyanov, A.I. Belousov. 1988-368 pp.

15. Linux for beginners. St. Petersburg Peter, 2000-368, ill.

16.Pilgrim. A. Personal computer, upgrades and repairs. St. Petersburg: BHV St. Petersburg, 2000-528 pp. Ill.


Tutoring

Need help exploring a topic?

Our experts will advise or provide tutoring services on topics of interest to you.
Send a request with the indication of the topic right now to find out about the possibility of obtaining a consultation.

MINISTRY OF BRANCH OF RUSSIA

FGBou VPO "Penza State Technological University"

Zarechensky Technological Institute-Branch

federal state budgetary educational institution

higher professional education

"Penza State Technological University"

230113 Computer systems and complexes

COURSE WORK

in the discipline "Maintenance of computer equipment"

on the topic: Service equipment

Completed by: student of group 11KS1 __________ R.A. Puppeteers

Project manager: ____________________ V. A. Borisov

The work is protected with a rating: ___________________________

INTRODUCTION 4

2 CLASSIFICATION OF SERVICE EQUIPMENT 5

3 MEASURING INSTRUMENTS AND TEST CONNECTORS FOR CHECKING PC PORTS 6

4 SOFTWARE - HARDWARE COMPLEXES (PAK) 8

4.1 System monitoring boards (POST boards) .8

4.2 PAK check motherboard PC POWER PCI-2.29

4.2.1 Principles of Operation 13

4.3 Specialized PAK - PAK "RAM Stress Test Professional 2" (RST Pro2) …………………………………………………………………………………… 15

4.3.1 Product Description 16

4.3.2 Functionality 17

4.4 PAK for checking individual elements of the system - PAK for repairing HDD ATA, SATA PC-3000 for Windows (UDMA) 24

4.4.1 PC-3000 UDMA25 Hardware

4.4.2 Power adapter 27

4.4.3 Resource Management of PC-3000 UDMA27 Board

CONCLUSION 28

REFERENCES 30

ZTI.KR.3.230113.7 PZ

Kukolnikov R.

Borisvo V.A.

Service equipment

Explanatory note

INTRODUCTION

Even some 20-30 years ago, people were not so dependent on electronic assistants. It is currently impossible to imagine modern office without computer equipment and peripherals that require consumables, maintenance, and, if necessary, repairs to maintain functionality. Do I have to wait for the equipment to fail? Failure of a printer, mfp or computer can significantly complicate, or even completely stop the work of the office of your company. That is why one should carefully approach the issue of servicing computer and office equipment. Many years of practical experience show that regular preventive maintenance not only prevents breakdowns, but also prolongs the life of the equipment.

2 CLASSIFICATION OF SERVICE EQUIPMENT

To troubleshoot and repair your PC, you need special tools that can identify problems and fix them quickly and easily.

These include:

a set of tools for disassembly and assembly;chemicals (contact wiping solution),a spray bottle with coolant and a can of compressed gas (air) for cleaning computer parts;a set of tampons for wiping contacts;specialized tools at hand (for example, tools needed to replace microcircuits (chips));service equipment.

Service equipment is a set of devices designed specifically for diagnosing, testing and repairing SVT. Service equipment includes the following elements:

Measuring instrumentstest connectors for testing serial and parallel ports;memory tester to evaluate the functioning of SIMM modules, DIP chips and other memory modules;equipment for testing the computer power supply;

diagnostic devices and programs for testing computer components (software and hardware systems).

3 MEASURING INSTRUMENTS AND TEST CONNECTORS FOR CHECKING PC PORTS

The following measuring devices are used to check and repair the PC:

digital multimeter;logic probes;single pulse generators for checking digital circuits.

The main types of measuring instruments are shown in Figure 7.

Test connectors provide software and hardware verification of PC I / O ports (parallel and serial).

Computer power supply testing equipment provides testing of PC power supplies and determination of their main characteristics. It is a set of equivalent loads, switching elements and measuring instruments. The appearance of the equipment is shown in Figure 3.

4 SOFTWARE - HARDWARE COMPLEXES (PAK) PAK are subdivided into:

system monitoring boardsPAC motherboard checkerspecialized PAKPAK checking individual elements of the systemPAC check HDD

4.1 System monitoring boards (POST boards).

The POST board consists of four main blocks:

RG - 8-bit parallel register; intended for recording and storing the next received POST-code value;DC1 - register write permission decoder; the signal at the decoder output becomes active if the address of the diagnostic register appears on the address bus, and the write signal to the input-output devices appears on the control bus;DC2 - decoder-converter binary code to the code of the seven-segment indicator;HG - two-digit seven-segment indicator; displays the error code value as hexadecimal characters - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, b, C, d, E, F.

Description: The Super POST Code indicator is used for quick diagnostics and troubleshooting of PCI bus CHIPSETs and devices working with this bus.

Characteristics: Indicates bus status: Transaction address, Transaction data, Current command on the bus (in the right bit of the command indicator), Bytes participating in the transaction (bite enable) - in the left bit of the command indicator

4.2 PAK check motherboard PC POWER PCI-2.2

The new PC POWER PCI-2.22 is a full-featured hardware and software complex designed for comprehensive testing and repair of motherboards based on Intel processors: 386, 486, Pentium III / IV, etc .; AMD: Athlon, Duron and their counterparts.

The tester is a computer expansion board installed in a 33MHz, 32-bit PCI slot. The complex allows you to perform a number of diagnostic tests launched from the ROM installed on the board, focused on identifying system errors and hardware conflicts, while it includes a wide range of tools for hardware diagnostics of the motherboard.

PC POWER PCI-2.22 has a built-in USB interface, allowing for a fully remote system diagnostics process. In the absence of a second computer, the test results can be observed on a digital display and LEDs (PASS, FAIL, SKIP). In the new complex, the motherboard supply voltages are monitored by a specialized monitoring microcircuit that controls both the location of the supply voltages within the normal range and the ripple value. It is also possible to visually inspect the main system signals of the PCI bus (CLK, RST, # FRAME).

The built-in USB interface is also used to check the functionality of the USB ports of the tested computer (in this case, the tested port of the computer is connected with the supplied cable to the USB port on the tester board).

Interception of control and launch of the control program of the tester, and full testing of the motherboard is possible in 3 modes:

interception of BIOS code control (forced start mode)at the PCIROM SCAN stage, during the POSTby intercepting INT 19h upon completion of POST

This allows troubleshooting at different stages of system initialization: at the earliest stage of the computer boot, during the initialization of the BIOS program (before the POST codes appear) and after it, but before loading the operating system by running the built-in code of the control program of the tester "pc =" "power =" "pci-2.22 =" ">

The features of the complex include:

Hardware - implemented step-by-step POST diagnostics mode with real-time decoding of all POST codes. (The retention time of each POST code is set by the user). Within the mode - stopping POST diagnostics and switching to step-by-step mode at a specific POST code number, or when a predetermined code value appears.The 128 Kb RAM located on the tester's board allows testing in forced start mode without the computer's RAM. Those. Minimum configuration for complete system testing: motherboard, processor, power supply (no BIOS required!).Auto-monitoring, allowing in the background to monitor supply voltages and ripple within predetermined limits, and generate a signal when they are exceeded or decreased.Possibility of visual monitoring of the states of the PCI bus: address-data (32 bits), to detect short-circuit or open-circuit lines.A fully functional script mode that allows the user to form and save his own test sequence in the nonvolatile memory of the complex based on existing algorithms with individual parameters for each test.PCI bus frequency hardware calculation mode.Possibility to select the width of the decoded address bus for POST codes (8 or 16 bits), which allows monitoring both port 80h (the standard diagnostic port of most motherboards) and 1080h port (for ATIRS300 / RS350 boards on motherboards ASUSTeK Computer, Gigabyte Technology ) and 2080h (for the same boards from PC Partner, Sapphire, etc.), where this implementation is dictated by the peculiarities of the system logic.The ability to quickly update (about 7 minutes) the internal software of the PC POWER PCI-2.22 board via the USB interface.

4.2.1 Principles of operation

The complex is designed for the fastest possible diagnostics of the state of the motherboard, determining the cause of the malfunction, assessing the rationality of repairs and performing admissible repair actions.

The full use of the USB interface makes the testing process completely remote and automated, which is convenient in a situation of damage to the video system or the absence of a video card or monitor, and in case of damage to the BIOS when the video system is not initialized. At the same time, the complex is controlled and the results are visualized from a specialized Windows application containing all the necessary data and tools for conducting a full-fledged diagnostics.

The complex contains a wide range of possibilities for diagnostics of the motherboard, the state of which does not allow the central processing unit (CPU) to start fetching codes from ROM and executing them. In this case, the following actions are available, the result of which may indicate the cause of the malfunction:

visual control of the presence of all necessary supply voltages;measurement of values ​​and magnitudes of ripple of all supply voltages;visual observation of the state of system signals;monitoring the states of the address lines and PCI bus data;checking the availability and stability of the PCI bus frequency;Possibilities of step-by-step POST diagnostics.

The launch of the internal control program of the complex is carried out from the RAM located on the board, and can be performed, depending on the settings, in 3 modes. Forced start mode. It is useful if the BIOS code is damaged or when it hangs at the POST stage of diagnostics, and the impossibility of its completion. In this case, the internal program of the complex, using the RAM located on the board, is initialized and allows you to perform your own testing of all elements and assemblies of the motherboard, or use the built-in interactive utilities. In this case, all control and monitoring of results is carried out from a specialized application from the delivery set. If there is no USB connection (offline), the diagnostic process is displayed on the built-in indicators in the format of their own POST codes and their results.Start mode at the PCIROM scan stage. Useful if the system is unable to complete the execution of initialization sequences due to unresolved hardware conflicts, deliberately incorrect values ​​of system parameters, or a malfunction of any system component. In this case, the internal control program of the complex is launched in accordance with the PCI bus specification at one of the POST diagnostic stages. Using the motherboard's own video system or USB interface, it allows you to perform full system testing, individual diagnostics of an individual component, change the values ​​of critical system parameters, use interactive utilities, and obtain additional information about the system. In this mode, all tests are performed without using BIOS functions, using specialized algorithms, which allows you to test the system for stability and functionality without using BIOS interrupts.Interrupt start mode INT 19h. It is useful if you need to test the system with a fully completed POST diagnostic sequence, but without loading (or if such loading is impossible) of any OS. Using special software and hardware algorithms, the internal control program overrides the 19h system interrupt, called upon completion of POST diagnostics, to implement its own startup. In this mode, full use of all diagnostic and informational capabilities of the complex is possible, since the BIOS service functions already initialized at this point are used. In this case, testing is carried out without the participation of specific drivers of any OS.

4.3 Specialized PAK - PAK "RAM Stress Test Professional 2" (RST Pro2).

In practice, the task of testing the system as a whole or of its individual components for fault tolerance during its continuous operation under load is often encountered. Among the most typical examples are "professional" testing of the system to identify defective system components in the production of personal computers and servers, on the one hand, and "amateur" testing of the stability of functioning of serviceable components, but working in "freelance", in other words, "overclocked "Mode. One of the most important components, the stability of which largely determines the stability of the system as a whole, are RAM modules. In this regard, testing of this component can be considered one of the critical tasks testing as such. Currently, there are many software tests of the memory subsystem designed to work both with "virtual" memory in the Windows OS environment, and with "real" memory in the DOS environment or the like (the division is somewhat arbitrary, because in both cases the physical memory). Nevertheless, there are hardware solutions on the market, or more precisely, "software and hardware" solutions designed for the same purpose. This article is devoted to the consideration of one of such solutions and its comparison with software solutions.

4.3.1 Product Description

Fee for your attentionRAM Stress Test Professional 2(RST Pro2) is a hardware / software solution designed to thoroughly test your computer's RAM. The term "hardware-software" is best suited to describe such devices: this solution, on the one hand, is hardware, since it is implemented as a separate physical device connected to the PCI slot of a computer, but, on the other hand, software is testing is carried out not by the device itself, but by some program "stitched" into it, which is executed by the central processor.

Memory testing with RST Pro2 eliminates the influence of the operating system, drivers and user programs, as the device loads its own software at system startup. The latter is compatible with various processors such as Intel Pentium 4, Intel Xeon, AMD Operton, AMD Athlon 64 / FX, AMD Athlon XP / MP and the like. To check and validate memory modules in the device, over 30 different algorithms are implemented that support memory such as SIMM, DIMM (SDRAM, DDR, DDR2), RIMM (RDRAM / RAMBus), including both parity and error correction (ECC) ), and without them; there is also the ability to test the processor cache memory (SRAM). Testing is performed in Protected Mode with Physical Addressing Extended (PAE), which can handle memory sizes up to 64 GB.

The RST Pro2 board also has additional capabilities for temperature monitoring (using two plug-in external sensors that are not included in the package), monitoring the status of the power supply (by monitoring fluctuations in the + 5V supply voltage), as well as displaying test results remotely using HyperTerminal software or similar to it, thanks to the built-in serial port on the board.

4.3.2 Functionality

On this, perhaps, it is worthwhile to end with a listing of the device's capabilities described in its documentation, and move on to our own review. So, starting the system - the device intercepts the INT 19h interrupt and transfers control to the firmware (for short, hereinafter we will simply call it “program”), after which the main menu is displayed on the screen.

The main menu of the program includes the following functions:

Mem MapSPD Chip Information (SPD)Performance tests (Benchmark)Editing PCI Device (PCI) Configuration RegistersMemory Tests (RAM Test)Memory Tests in Run Mode (Burn-In)Help information about the program (Help)

The memory map produced by the program looks quite standard: the areas of "main" (conventional) and "extended" (extended) memory are shown, as well as memory areas reserved for the system BIOS, PCI devices, and ACPI information.

The decoding of the information of the SPD chip of the selected module (the program supports up to 8 memory modules) is impressive in its detail. The very possibility of reading this information by means of the SMBus controller located in the south bridge of the chipset is also impressive, which should definitely be considered an advantage of the considered software and hardware complex. On the other hand, we note that purely software solutions can provide such information, in particular, our universal test suite RightMark Memory Analyzer ... In addition, due to the specifics of the SMBus controller implementation in a particular chipset, the RST Pro2 software has the same limitations found in other programs that provide information about the system - the set of supported chipsets is limited. In particular, on a system with a SiS 648 chipset, we were unable to read SPD information from the memory modules installed in it.

The performance measurement menu provides the ability to measure the performance of three system components - the processor's cache, RAM, and the CPU itself.

By measuring the performance of the cache in a program, we mean measuring the bandwidth of the memory subsystem in the area of ​​small block sizes (1 KB - 4 MB). Measurements are carried out using 32-, 64- and 128-bit registers in read, write and modify modes (obviously, this means reading and then writing to the same address). The curves look similar to those obtained in the Memory Bandwidth test of the RMMA test suite, except for a number of minor differences. Among the shortcomings of the implemented measurement technique, it should be noted the mediocre optimization of the algorithms, which is especially noticeable in the area of ​​minimum block sizes that are less than or equal to the size of the L1-cache of the processor - a smooth growth of curves in the area of ​​1-16 KB indicates a significant influence on the measurement results of the prediction logic of processor branches due to small degree of "unfolding" of read-write cycles. Since this feature was taken into account in the development of the RMMA test suite, the L1 cache bandwidth curves displayed by it do not have this drawback.

To measure the performance of RAM, the program uses significantly larger blocks - from 1 to 512 MB (the total amount of memory installed in the system). As expected, all the "curves" of this test look "straight", except for the initial region, where there is a sharp decline. It is not surprising, because on an Intel Pentium 4 (Prescott) processor installed in the test bench, the block size area of ​​1 MB falls on the L2 cache of the processor. A more logical decision on the part of the program developers would be to use the minimum block size of about 4 MB (selected as the upper limit of the previous test).

The purpose of the "processor performance" test is not clear, because it is morally outdated - both in terms of the Dhrystones and Whetstones used, and the choice of reference values ​​for comparison.

The built-in PCI device configuration register editor allows you to display and change the contents of all 256 8-bit registers (presented for convenience as 128 16-bit values) of any PCI device specified by the bus number (0-255), device (0- 31) and function (0-7). The functionality of this editor is identical to that of utilities like WPCREDIT as well as the timings helper utility included in the RMMA test suite.

The memory tests menu (which is what this software and hardware solution is intended for) allows you to select the memory area to be tested. Possible options are to test all memory (All Memory), extended memory (Extended Memory, area from 1 MB and above), base memory (Base Memory, area 0-640 KB), processor cache (Cache Memory, area 0-1 MB, which is essentially the same as testing base memory in cached mode). Additional options include video memory testing, but not currently available. Finally, the last in the list of options for this menu is the memory refresh cycle test - it is similar to testing the entire memory, but only one type of test with the same name as the name of this menu item is selected by default.

The settings of the memory test itself include the range of tested memory addresses, the choice of the memory access mode, called the "bus width" (8, 16, 32, 64 or 128 bits), data caching mode (full caching, partial caching, no caching), refresh period memory (apparently not having any real effect) and the number of test cycles. Despite the implementation of more than 30 memory testing algorithms declared in the device documentation, in the right part of the settings you can select only up to 25 algorithms used in the test, and one of them (PCI Gen) requires an auxiliary board (PCI Pattern Generator).

The memory test menu in the "burn-in" mode allows you to create (Create), clear (Clear) and run (Run) a previously created set of tests designed for continuous automated testing of the memory subsystem. The selection of tests, as well as their settings, look exactly the same as those discussed above. The difference between this mode and normal testing is, first of all, in the ability to automatically launch the test at the start of the system.

The last menu provides reference information about the program (control buttons), the manufacturer of the product (Ultra-X) and the products it manufactures.

4.4 PAK for checking individual elements of the system - PAK for repairing HDD ATA, SATA PC-3000 for Windows (UDMA)

HDD diagnostics is carried out in the following modes:

normal (user) modein a special technological (factory) mode.

For this, the PC-3000 for Windows (UDMA) complex includes a set of technological adapters and adapters that are used for HDD repair and data recovery.

For the initial diagnostics of the HDD, the universal utility PC-3000 is launched, which diagnoses the HDD and indicates all its faults.

Specialized utilities allow you to perform the following actions: test HDD in technological mode;

test and restore HDD service information;read and write the contents of the HDD Flash ROM;load the service information access program;view tables of hidden defects P-sheet, G-sheet, T-sheet;hide the found defects on the surfaces of magnetic disks;change configuration parameters.

The PC-3000 UDMA complex is designed for diagnostics and repair (recovery) of HDDs with SATA (Serial ATA) and PATA (IDE) interfaces, capacities: from 500 MB to 6 TB, manufactured by: Seagate, Western Digital, Fujitsu, Samsung, Maxtor, Quantum, IBM (HGST), HITACHI, TOSHIBA with a form factor of 3.5 "- desktop PCs; 2.5" and 1.8 "- drives for notebooks; 1.0" - drives for portable equipment, with a Compact Flash interface.

4.4.1 PC-3000 UDMA Hardware

The new PC-3000 UDMA controller is a 3-port test board installed in the PCI-Express expansion slot of the control computer. The three diagnostic ports of the controller are distributed as follows: 2 SATA ports with a maximum data transfer rate of 133 Mb / s and 1 PATA port with a speed of 100 Mb / s. One SATA port (SATA0) is primary, the other SATA port (SATA1) are switchable with PATA port. Thus, you can simultaneously connect two drives to the PC-3000 UDMA board, one of which is SATA, the other, depending on the selected SATA or PATA configuration. When developing the PC-3000 UDMA controller on the PCI-Express bus, the experience of operating the previous generation PC-3000 UDMA controller on the PCI bus was used, which has proven itself in data recovery centers as an inexpensive, reliable controller with optimal performance.

Supported modes:

SATA x2 - UDMA133, UDMA100, UDMA66, UDMA33, PIO4, PIO3, PIO2, PIO1, PIO0PATA x1 - UDMA100, UDMA66, UDMA33, PIO4, PIO3, PIO2, PIO1, PIO0

The ports are separate, but when two ports are loaded at the same time, they are dependent. There is a slight decrease in performance (no more than 20%) on one of the channels when the second UDMA channel is fully loaded. This feature of the PC-3000 UDMA controller is due to the use of a single-channel PCI-Express bus, which is the bottleneck in data transfer. On the other hand, such a schematic technical solution allows to reduce the total cost of the board and make it more attractive for small service centers.

As you can see from the reading graph, even with simultaneous loading of two ports, the read speed on both channels significantly exceeds the maximum values ​​for the previous generation motherboard - PC-3000 UDMA on the PCI bus.

4.4.2 Power adapter

A 2-channel power management adapter located on the main board of the controller is used to power the drives being diagnosed. It protects the diagnosed drives against overvoltage and overcurrent. In case of emergencies, the power supply from the HDD will be removed automatically. Additionally, for each channel, a feedback is organized with the control program of the complex.

4.4.3 Resource Management of PC-3000 UDMA Board

Fundamentally new feature of the PC-3000 UDMA complex is the ability to run the PC-3000 utilities and Data Extractor Tasks as separate processes of the operating system. For the convenience of work, the complex includes a program "Resource Manager of the PC-3000 UDMA Board", which allows you to: distribute the ports of the board between processes, monitor their state and, if necessary, remove the hung process. Moreover, when the process is started, any available number of ports of the PC-3000 UDMA board can be allocated to it. For example, you can start two processes for each port, or one process with two available ports.

CONCLUSION

In the course of the work, the service equipment was considered.

Nowadays it is difficult to do without equipment, because PCs fail frequently. Timely diagnosis with such equipment will help save the computer from serious damage. In the process of technical operation, the service equipment helps to choose the correct consumables and operating materials, and also ensures the timely replacement of small parts.

WITH SCRIPT OF REFERENCES

1. Romanov V.P. Maintenance of computer equipment, 2008

2. Garyaev P.V. Maintenance of computer equipment, 2012

3. Muller S. Modernization and repair of PCs, 14th edition. Per. sangl. - K .: Dialectics, 2007.

4. Platonov Yu.M., Utkin Yu. G. Diagnostics, repair and prevention of personal computers. - Hotline - Telecom, 2003.

Maintenance of the cable network and its means is a complex of operations to maintain the operability and good condition of the equipment. The purpose of equipment maintenance is to prevent its premature failure, to ensure its safety and reliable operation.

There are two types of preventive measures: active and passive.

With active preventive maintenance, operations are performed whose main purpose is to extend the uptime of a computer. They boil down to periodic cleaning of both the entire system and its individual components.

With an intensive file exchange, when a large number of files are copied to a computer from different media, it is necessary to check at least new files daily with antivirus programs. It is recommended to check the entire hard drive once a week.

Passive prevention means measures aimed at protecting your computer from external adverse influences. This is the installation of protective devices in the power supply network, maintaining the frequency and acceptable temperature in the room where the computer is installed, etc.

9.2 Maintenance intervals

The minimum frequency of SVT maintenance is once a month. The term for the next work is determined taking into account the service for urgent calls of the user, if this service included the work that is part of the planned monthly maintenance. A copy of the approved schedule for routine maintenance must be provided to the person in charge of the user no later than three days before their start.

9.3 Maintenance and routine maintenance

Maintenance work schedule:

Server operating systems must be serviced at least once a month;

Maintenance of the operating systems of workstations must be carried out at least once a month;

Servers and workstations should be checked for viruses at least once a week;

Checking for software and operating system updates should be done every day;

Printer maintenance should be done once a month;

Cleaning of telecommunication cabinet equipment from dust should be carried out once a month;

An external inspection of workstation equipment for damage should be carried out once a week.

9.4 Performing testing of network systems

Certification tests ensure that each cable through which data enters the server complex and telecommunications facilities meets the requirements of the required standards.

In addition, the testing uses the latest generation devices that measure the performance for Category 5e.

Similar publications