Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
1.1_1.5_1.6 lab.doc
Скачиваний:
0
Добавлен:
01.07.2025
Размер:
557.57 Кб
Скачать

Laboratory work №1.1.

Elements and components of computer technologies.

The purpose of work is:

• Studying of a labour safety questions;

• Studying of PC devices work;

• Reinforcement in practice of theoretical data on technical maintenance of a computer;

• Studying of different programs which give the information on technical maintenance;

• Studying of the given computer characteristics;

• The analysis of the given system as a whole.

Methodical instructions

See materials of lectures 1.1.

Performance of work:

1. Information BIOS on the basic hardware of a computer

1. Turn on the display and a computer. To wait occurrences of the information on the screen about interrogation of disk drives. To press key Pause on the keyboard and to fix the following information in a working writing-book:

1.1. The information on type of ROM and BIOS (first two lines on the screen of the display).

1.2. The information on the central processor (main processor).

1.3. The information on memory (memory).

1.4. The information on disks: primary master (the primary master), primary slave (the primary slave), secondary master (the secondary master), secondary slave (the secondary slave).

For continuation of loading to press Enter.

2. On the screen there is a table which contains the system information.

For a stop of a computer to press Pause. The table looks like (it can differ because of different types of basic input/output system – BIOS):

Diskette drive A:... M... in (the disk drive And:... Mb... Inch) Diskette drive B:... M... in (disk drive B:... Mb... Inch) Primary master

(the primary master)

Display Type... (type of the videoadapter)

Serial Ports...

(Serial ports)

Parallel Ports...

(parallel ports)

Primary slave

(the primary slave)

Secondary master

(the secondary master)

Secondary slave

(the secondary slave)

Bank0 DRAM Type

(type of memory in bank 0) Bank1 DRAM Type

(type of memory in bank 1)

To bring the information in table 1. The sample in section “the Maintenance of the report”. To restore work as pressing Enter.

The maintenance of the report

1. To fix the information on type BIOS, date of its creation, firm-manufacturer, etc.

2. To bring in table 1 the system information on a computer and to analyse it.

Table 1 (sample)

Type of the program Parameter

BIOS

Type of the program Parameter

BIOS

Type of a computer

Type of the videoadapter

Type of the CPU

Presence of ports:

1) parallel

2) consecutive

Clock frequency, MHz

Type of a system bus

Disks: a hard disk, Mb

a floppy disk

Type of the keyboard

Memory, kb:

Type of the mouse

Estimation of laboratory work

The report is carried out individually by each student in a working writing-book. Delivery of laboratory work to the teacher is performed at presence of performed work and the issued report each student separately.

Laboratory work №1.5.

File structures. Operating systems (BIOS).

The purpose of work is:

• Studying by students of standard means of protection BIOS. Therefore from students the limiting attention and performance of work in strict conformity with the operating procedure is required;

• Studying of an installation technique password protection BIOS and possible ways of its removal.

Methodical instructions

See a material of lecture 1.3.

Performance of work:

1. Turn on a computer.

2. Wait the beginnings of loading and closely familiarize with contents of the monitor screen. On it the technical information will be deduced. Try to remember the order of its occurrence and the maintenance. The information stands out quickly enough, that which stands out before loading OS is interesting to you, in this case before occurrence of prompt Windows. Probably, to make a reloading of a computer, for this purpose take advantage of a combination of keys "Ctrl+Alt+Delete".

The note: simultaneously press this three keys on the keyboard.

3. After you had been acquired processes of loading and reloading a computer it is necessary to start the basic part of laboratory work.

4. Define, BIOS what firm (AWARD, Phoenix, American Megatrends (AMI)) it is used on the given computer. For this purpose take advantage of the theoretical description.

5. Bring obtained data (the name of the manufacturer firm) in the corresponding column of table 1 in the report. The form of the table is resulted in item " Registration of the report ".

6. Enter into program BIOS Setup.

7. Establish the password of the supervisor. Bring its value in table 1 (see item " Registration of the report "). Keep the done changes and leave the program.

8. Execute 1 task according to your variant. See table 5.

9. Enter into program BIOS Setup and enter the password for the user. Completely fill table 1 (see " Registration of the report "). Keep the changes done during work. Leave program BIOS Setup.

10. Reload a computer and fill table 2.

11. Enter into program BIOS Setup and establish anti-virus protection.

12. Make adjustment of system so that it requested the password at loading OS (by default values are not established if in your case the system already requested the password at loading, establish a reference value, and then execute this item).

13. Keep changes and leave the program. Reload a computer.

14. Fill table 3.

15. Enter in BIOS Setup and change passwords of the supervisor and the user. Keep changes. Fill table 4.

16. Leave the program and make attempt of an input with old values of passwords.

17. Execute 2 task according to number of a variant (see table 5). Bring in the report results of performance of 1-st and second tasks according to a variant (to specify in the report).

The note: Separately in the report passwords of the supervisor established during work and the user should be written down all, and they should be written down in that sequence in which were established.

18. Result all the parameters changed during work in an initial condition. Passwords are necessary for removing. Leave program BIOS Setup with saving.

19. Theoretically study methods of removal password protection BIOS on the basis of the information resulted above.

20. Finish work. Turn off a computer. To protection of laboratory work its students executed and issued the report are supposed.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]