Download CHAPTER 6 Configuration of BIOS

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Security Technology Department
CHAPTER 6
Configuration of BIOS
Chapter 6
Learning Objectives
After completing this lesson, you should be able to:
i.
ii.
iii.
iv.
Define hard boot and soft boot.
Describe the functions of BIOS.
Describe the process of computer power-on self-test (POST).
List the different ways of obtaining BIOS upgrade files.
Booting a Computer
When we turn on a computer, it is known as ‘boot’ or ‘booting’. There are two ways to
boot a computer,


Hard boot
Soft boot
Hard boot refers to switching on a computer by turning on the electrical supply using a
switch. A computer will run all the self-test after a hard boot.
Soft boot refers to booting on a computer using its power button or software commands
(such as Ctrl-Alt-Del key combination). Soft boot skips the self-test that take place after
a hard boot. Hence, it is faster to boot a computer with a soft boot.
SY2006FP: Computer Essentials
Page 6- 1
Security Technology Department
Chapter 6
BIOS
BIOS stands for Basic Input Output System. It is also known
as the System BIOS. It is a set of routine programs stored on
a chip on the motherboard. The BIOS enables the OS to talk
to the hardware of the computer.
A BIOS chip is shown on the right.
The three subsystems of a BIOS are:
- ROM BIOS
- CMOS or BIOS setup
- Plug-and-Play (PnP) BIOS
SY2006FP: Computer Essentials
Page 6- 2
Security Technology Department
Chapter 6
First subsystem - The ROM BIOS stores the first instruction to run the Power-on SelfTest (POST).
POST is a software. It is run before an OS can be booted. Once it runs successfully, the
bootstrap loader loads an operating system. If there are errors detected by POST, the
OS will not load.
POST carries out the following:
 checks the BIOS chip
 tests the CMOS RAM
CMOS stands for complementary metal-oxide semiconductor. There is a CMOS
chip in the BIOS. It is the semiconductor technology used in the transistors.
 starts the CPU
 checks all hardware (such as video card, primary storage, secondary storage,
etc)
If the computer is working properly, a single beep is issued. If any hardware device is
not working well, other beep codes alerts the user. Different manufacturers use different
beep codes to mean different faults.
Messages of the processes being run will be displayed on any VDU connected to the
computer. When no VDU is available, a POST card may be used. This is installed in a
port on the motherboard. Any error codes will be displayed on this card.
Once POST has determined that all is okay, the BIOS setup takes over.
SY2006FP: Computer Essentials
Page 6- 3
Security Technology Department
Chapter 6
Second subsystem - The BIOS setup or CMOS setup contains a setup program to
configure settings for the hardware devices. The configuration data is saved to a
memory chip called a Complementary Metal Oxide Semiconductor (CMOS). The BIOS
program usually has the following menu items:
 Main
 Advanced
 Boot
 Security
 Power
 Exit
Common options that you can make changes to include:
 System Time/Date - Set the system time and date
 Boot Sequence - The order that BIOS will try to load the operating system
 Plug and Play - A standard for auto-detecting connected devices; should be set
to "Yes"
 Mouse/Keyboard - "Enable Num Lock," "Enable the Keyboard," "Auto-Detect
Mouse", etc.
 Drive Configuration - Configure hard drives, CD-ROM and floppy drives
 Memory - Direct the BIOS to shadow to a specific memory address
 Security - Set a password for accessing the computer
 Power Management - Select whether to use power management, as well as set
the amount of time for standby and suspend
SY2006FP: Computer Essentials
Page 6- 4
Security Technology Department
Chapter 6
The following information are shown at the BIOS Configuration screen:




CPU manufacturer name, CPU speed
RAM manufacturer, RAM spee, number of memory slots
Harddrive manufacturer, size, type, and number of harddisk controllers
Optical drive manufacturer and type
Common security features found in the BIOS are:
 Supervisor password – this allows access to all settings and user-passwords
 User password – this defines the access level of a user to the BIOS setup
screen. Four access levels available are full-access, limited access, view-only
access, no access.
 Drive Encryption – sets encryption of data on the harddisk. Encryption changes
data into code that cannot be understood by other systems.
 Lojack – this allows a lost computer to contact an agent in the event that the
computer is lost/stolen. The agent can,
- lock the computer remotely
- display a message to ask that computer be returned to owner
- delete sensitive data
- locate computer using geotechnology
The BIOS has hardware monitoring features. It collects information on the hardware of
the motherboard. Some of the information collected include:
 Temperature of the CPU; if the CPU gets too hot, it might be shut down by the
system
 Temperature of the PSU; if it gets too hot, the system will shut down
automatically
 Speed of the cooling fan; this speed will be adjusted according to the
temperature of the other hardware
 Voltage of the CPU; if the voltage is too high, the CPU can be damaged;
 Bus speed
Built-in BIOS diagnostics allow you to run tests to identify problem areas. These tests
include:




Start Test – this test checks to see if the main components are working normally.
It should be run when the computer does not boot normally.
Hard drive Test – this test checks the hard drive for damaged areas.
Memory Module Test – this test checks the memory modules for normal
operation
Battery Test – this test checks if the battery is in normal operating condition. If it
is not, it should be replaced with a new, working battery.
SY2006FP: Computer Essentials
Page 6- 5
Security Technology Department
Chapter 6
Third subsystem - Plug and Play (PnP) is a capability developed by Microsoft for its
Windows 95 and later operating systems. It allows a computer to recognize any device
that is plugged into any of its ports, and automatically look for a compatible driver.
SY2006FP: Computer Essentials
Page 6- 6
Security Technology Department
Chapter 6
BIOS Chip Upgrading
BIOS chips can be upgraded to newer versions if manufacturer provide them. In
general, you need to check the manufacturer of the motherboard, then visit the website
and check for updates. Usually the update files are placed at the [Download] tab.
To check the version of the BIOS in a computer, go to command prompt (Windows key
+ R) and enter this command:
Wmic bios get smbiosbiosversion
Three ways of BIOS upgrading are:



Save the (.exe) upgrade BIOS file onto a Bootable Floppy disk, then boot the
computer. Instructions will be shown on screen.
Save the ISO file on your hard disk, then use it to create a bootable CD. Boot the
computer using the CD, and follow instructions onscreen.
Some manufacturers provide a software utility to make the process easier. One
such utility is the Q-flash provided by manufacturer Gigabyte. This is the safest
way to BIOS upgrading.
Upgrading a BIOS will offer the following benefits:
 Support for newer processors
 Support for higher capacity hard disks
 Correct some bugs that may exist
But there is a risk. If something goes wrong along the process of upgrading the BIOS,
the chip may be damaged and become unusable. Once the BIOS chip is damaged,
usually the motherboard will also be unusable. If all the drives and other hardware
devices are recognized by the BIOS, there is no need for upgrading.
SY2006FP: Computer Essentials
Page 6- 7