Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Security Technology Department CHAPTER 6 Configuration of BIOS Chapter 6 Learning Objectives After completing this lesson, you should be able to: i. ii. iii. iv. Define hard boot and soft boot. Describe the functions of BIOS. Describe the process of computer power-on self-test (POST). List the different ways of obtaining BIOS upgrade files. Booting a Computer When we turn on a computer, it is known as ‘boot’ or ‘booting’. There are two ways to boot a computer, Hard boot Soft boot Hard boot refers to switching on a computer by turning on the electrical supply using a switch. A computer will run all the self-test after a hard boot. Soft boot refers to booting on a computer using its power button or software commands (such as Ctrl-Alt-Del key combination). Soft boot skips the self-test that take place after a hard boot. Hence, it is faster to boot a computer with a soft boot. SY2006FP: Computer Essentials Page 6- 1 Security Technology Department Chapter 6 BIOS BIOS stands for Basic Input Output System. It is also known as the System BIOS. It is a set of routine programs stored on a chip on the motherboard. The BIOS enables the OS to talk to the hardware of the computer. A BIOS chip is shown on the right. The three subsystems of a BIOS are: - ROM BIOS - CMOS or BIOS setup - Plug-and-Play (PnP) BIOS SY2006FP: Computer Essentials Page 6- 2 Security Technology Department Chapter 6 First subsystem - The ROM BIOS stores the first instruction to run the Power-on SelfTest (POST). POST is a software. It is run before an OS can be booted. Once it runs successfully, the bootstrap loader loads an operating system. If there are errors detected by POST, the OS will not load. POST carries out the following: checks the BIOS chip tests the CMOS RAM CMOS stands for complementary metal-oxide semiconductor. There is a CMOS chip in the BIOS. It is the semiconductor technology used in the transistors. starts the CPU checks all hardware (such as video card, primary storage, secondary storage, etc) If the computer is working properly, a single beep is issued. If any hardware device is not working well, other beep codes alerts the user. Different manufacturers use different beep codes to mean different faults. Messages of the processes being run will be displayed on any VDU connected to the computer. When no VDU is available, a POST card may be used. This is installed in a port on the motherboard. Any error codes will be displayed on this card. Once POST has determined that all is okay, the BIOS setup takes over. SY2006FP: Computer Essentials Page 6- 3 Security Technology Department Chapter 6 Second subsystem - The BIOS setup or CMOS setup contains a setup program to configure settings for the hardware devices. The configuration data is saved to a memory chip called a Complementary Metal Oxide Semiconductor (CMOS). The BIOS program usually has the following menu items: Main Advanced Boot Security Power Exit Common options that you can make changes to include: System Time/Date - Set the system time and date Boot Sequence - The order that BIOS will try to load the operating system Plug and Play - A standard for auto-detecting connected devices; should be set to "Yes" Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard," "Auto-Detect Mouse", etc. Drive Configuration - Configure hard drives, CD-ROM and floppy drives Memory - Direct the BIOS to shadow to a specific memory address Security - Set a password for accessing the computer Power Management - Select whether to use power management, as well as set the amount of time for standby and suspend SY2006FP: Computer Essentials Page 6- 4 Security Technology Department Chapter 6 The following information are shown at the BIOS Configuration screen: CPU manufacturer name, CPU speed RAM manufacturer, RAM spee, number of memory slots Harddrive manufacturer, size, type, and number of harddisk controllers Optical drive manufacturer and type Common security features found in the BIOS are: Supervisor password – this allows access to all settings and user-passwords User password – this defines the access level of a user to the BIOS setup screen. Four access levels available are full-access, limited access, view-only access, no access. Drive Encryption – sets encryption of data on the harddisk. Encryption changes data into code that cannot be understood by other systems. Lojack – this allows a lost computer to contact an agent in the event that the computer is lost/stolen. The agent can, - lock the computer remotely - display a message to ask that computer be returned to owner - delete sensitive data - locate computer using geotechnology The BIOS has hardware monitoring features. It collects information on the hardware of the motherboard. Some of the information collected include: Temperature of the CPU; if the CPU gets too hot, it might be shut down by the system Temperature of the PSU; if it gets too hot, the system will shut down automatically Speed of the cooling fan; this speed will be adjusted according to the temperature of the other hardware Voltage of the CPU; if the voltage is too high, the CPU can be damaged; Bus speed Built-in BIOS diagnostics allow you to run tests to identify problem areas. These tests include: Start Test – this test checks to see if the main components are working normally. It should be run when the computer does not boot normally. Hard drive Test – this test checks the hard drive for damaged areas. Memory Module Test – this test checks the memory modules for normal operation Battery Test – this test checks if the battery is in normal operating condition. If it is not, it should be replaced with a new, working battery. SY2006FP: Computer Essentials Page 6- 5 Security Technology Department Chapter 6 Third subsystem - Plug and Play (PnP) is a capability developed by Microsoft for its Windows 95 and later operating systems. It allows a computer to recognize any device that is plugged into any of its ports, and automatically look for a compatible driver. SY2006FP: Computer Essentials Page 6- 6 Security Technology Department Chapter 6 BIOS Chip Upgrading BIOS chips can be upgraded to newer versions if manufacturer provide them. In general, you need to check the manufacturer of the motherboard, then visit the website and check for updates. Usually the update files are placed at the [Download] tab. To check the version of the BIOS in a computer, go to command prompt (Windows key + R) and enter this command: Wmic bios get smbiosbiosversion Three ways of BIOS upgrading are: Save the (.exe) upgrade BIOS file onto a Bootable Floppy disk, then boot the computer. Instructions will be shown on screen. Save the ISO file on your hard disk, then use it to create a bootable CD. Boot the computer using the CD, and follow instructions onscreen. Some manufacturers provide a software utility to make the process easier. One such utility is the Q-flash provided by manufacturer Gigabyte. This is the safest way to BIOS upgrading. Upgrading a BIOS will offer the following benefits: Support for newer processors Support for higher capacity hard disks Correct some bugs that may exist But there is a risk. If something goes wrong along the process of upgrading the BIOS, the chip may be damaged and become unusable. Once the BIOS chip is damaged, usually the motherboard will also be unusable. If all the drives and other hardware devices are recognized by the BIOS, there is no need for upgrading. SY2006FP: Computer Essentials Page 6- 7