0% found this document useful (0 votes)
60 views

Maintenance Assignment

Here are the key points about 32-bit and 64-bit systems and their relationship to operating systems: - 32-bit systems can access up to 4GB of RAM, while 64-bit systems can access vastly more RAM (up to 16 exabytes theoretically). - 32-bit processors have 32-bit registers that can store 32-bit addresses, while 64-bit processors have 64-bit registers that can store 64-bit addresses. - 64-bit processors can perform more calculations per second than 32-bit processors, resulting in better performance. - A 64-bit operating system is required to take advantage of 64-bit hardware and allow access to more than 4GB of RAM. -

Uploaded by

Mafuz Kemal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Maintenance Assignment

Here are the key points about 32-bit and 64-bit systems and their relationship to operating systems: - 32-bit systems can access up to 4GB of RAM, while 64-bit systems can access vastly more RAM (up to 16 exabytes theoretically). - 32-bit processors have 32-bit registers that can store 32-bit addresses, while 64-bit processors have 64-bit registers that can store 64-bit addresses. - 64-bit processors can perform more calculations per second than 32-bit processors, resulting in better performance. - A 64-bit operating system is required to take advantage of 64-bit hardware and allow access to more than 4GB of RAM. -

Uploaded by

Mafuz Kemal
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 14

WOLAITA SODO UNIVERSITY

SCHOOL OF INFORMATICS

DEPARTMENT OF INFORMATION TECHNOLOGY

Computer maintenance and technical support assignment

PREPARED BY

NAME ID
1. Abdulhafiz Kemal SOI/R/191/10
2. Abebe Geremew SOI/R/006/10
3. Sherefa Kedir SOI/R/159/10
4. Misganaw Ashebir SOI/R/048/10
5. Betelehem Habtamu SOI/R/141/10
6. Melesech Teshome NCS/R/576/06

Submitted to: - Mr. Alemayehu dereje (M.Sc.)


1. What is the difference between L1, L2 and L3 cache memory?
Cache memory is divided into three segments: L1, L2 and L3 cache, in order of increasing size
and decreasing speed. L3 cache is the largest and also the slowest (the 3rd Gen Ryzen CPUs
feature a large L3 cache of up to 64MB) cache level. L2 and L1 are much smaller and faster than
L3 and are separate for each core. Older processors didn’t include a third-level L3 cache and the
system memory directly interacted with the L2 cache.

L1 cache is further divided into two sections: L1 Data Cache and L1 Instruction Cache. The latter
contains the instructions that will be consumed by the CPU core while the former is used to
hold data that will be written back to the main memory.

L1 cache not only works as the instruction cache, but it also holds pre-decode data and
branching information. Furthermore, while the L1 data cache often acts as an output-cache, the
L1 instruction cache behaves like an input-cache. This is helpful when loops are engaged as the
required instructions are right next to the fetch unit.

Modern CPUs include up to 512KB of L1 cache (64KB per core) for flagship processors while
server parts feature almost twice as much.

L2 cache is much larger than L1 but at the same time slower as well. They range from 4-8MB on
flagship CPUs (512KB per core). Each core has its own L1 and L2 cache while the last level, the
L3 cache is shared across all the cores on a die.

L3 cache is the lowest-level cache. It varies from 10MB to 64MB. Server chips feature as much
as 256MB of L3 cache. Furthermore, AMD’s Ryzen CPUs have a much larger cache size
compared to rival Intel chips. This is because of the MCM design vs Monolithic on the Intel side

Basically, L1, L2 and L3 caches are different memory pools similar to the RAM in a computer.
They were built in to decrease the time taken to access data by the processor. This time taken is
called latency. The architecture they are built with also differs considerably. For e.g. the L1
cache is built using larger transistors and wider metal tracks, trading off space and power for
speed. The higher level caches are more tightly packed and use smaller transistors.

L1 (Level 1), L2, L3 cache are some specialized memory which work hand in hand to improve
computer performance. When a request is made to the system, CPU has some set of
instructions to execute, which it fetches from the RAM. Thus to cut down delay, CPU maintains
a cache with some data which it anticipates it will be needed.(L1) Level 1 Cache(2KB - 64KB) -
Instructions are first searched in this cache. L1 cache very small in comparison to others, thus
making it faster than the rest. (L2) Level 2 Cache(256KB - 512KB) - If the instructions are not
present in the L1 cache then it looks in the L2 cache, which is a slightly larger pool of cache,

1
thus accompanied by some latency.(L3) Level 3 Cache (1MB -8MB) - With each cache miss, it
proceeds to the next level cache. This is the largest among the all the cache, even though it is
slower, it’s still faster than the RAM. Now you know what cache is and what different level of
cache are. And that 6MB value of the L3 Cache in your Intel 4700MQ microprocessor is actually
the memory size of that Cache. Thus Cache improves the overall performance of the CPU but
these numbers shouldn't be considered while purchasing any system. Look at the benchmarks
of the CPU as a whole. A CPU with similar architecture but with more cache wouldn't make any
noticeable difference. The technology these days have advanced to such a point that the specs
of a CPU are just meaningless.

2
2. Briefly explain 32-bit and 64 bit Systems and their relationship
with Operating System

A 32-bit system can access 232 memory addresses, i.e. 4 GB of RAM or physical memory
ideally, it can access more than 4 GB of RAM also.

The CPU register stores memory addresses, which is how the processor accesses data from
RAM. One bit in the register can reference an individual byte in memory, so a 32-bit system can
address a maximum of 4 GB (4,294,967,296 bytes) of RAM. The actual limit is often less around
3.5 GB since part of the register is used to store other temporary values besides memory
addresses. Most computers released over the past two decades were built on a 32-bit
architecture; hence most operating systems were designed to run on a 32-bit processor.

A 64-bit system can access 264 memory addresses, i.e. actually 18-Quintillion bytes of
RAM. In short, any amount of memory greater than 4 GB can be easily handled by it.

A 64-bit register can theoretically reference 18,446,744,073,709,551,616 bytes, or


17,179,869,184 GB (16 Exabyte) of memory. This is several million times more than an average
workstation would need to access. What’s important is that a 64-bit computer (which means it
has a 64-bit processor) can access more than 4 GB of RAM. If a computer has 8 GB of RAM, it
better has a 64-bit processor. Otherwise, at least 4 GB of the memory will be inaccessible by the
CPU.

A major difference between 32-bit processors and 64-bit processors is the number of


calculations per second they can perform, which affects the speed at which they can
complete tasks. 64-bit processors can come in dual-core, quad-core, six-core,
and eight-core versions for home computing. Multiple cores allow for an increased
number of calculations per second that can be performed, which can increase the
processing power and help make a computer run faster. Software programs that
require many calculations to function smoothly can operate faster and more efficiently
on the multi-core 64-bit processors, for the most part. 

 Using 64-bit one can do a lot in multi-tasking, user can easily switch between
various applications without any windows hanging problems. 
 
 Gamers can easily play High graphical games like Modern Warfare, GTA V, or
use high-end software like Photoshop or CAD which takes a lot of memory since it
makes multi-tasking with big software, easy and efficient for users. However
upgrading the video card instead of getting a 64-bit processor would be more
beneficial. 

3
A 64-bit operating system will not work in a 32-bit computer, but a 32-bit
operating system will run in a 64-bit computer.

The terms "32-bit" and "64-bit" are commonly seen in system requirements and other technical
literature, but few people actually know what these terms mean. Do they refer to hardware or
software specifications? What makes a system 64-bit and what is the difference between a 64-
bit computer and a 32-bit model? In most cases, you simply need to know if your operating
system is 32-bit or 64-bit in order to run a certain program. However, when determining what
software to install on your computer, it is helpful to understand what the terms actually mean.

Hardware
32-bit and 64-bit are commonly used to describe processor architecture or design. A 32-bit
processor includes a 32-bit register, which can store 232 or 4,294,967,296 values. A 64-bit
processor includes a 64-bit register, which can store 264 or 18,446,744,073,709,551,616 values.
Therefore, a 64-bit register is not twice as large as a 32-bit register, but is 4,294,967,296 times
larger. That's a big difference, but how does it affect computing performance?

While 64 bits is far more storage than what modern computers require, it removes all
bottlenecks associated with 32-bit systems. For example, 64-bit systems run more efficiently
since memory blocks are more easily allocated. They also support 64-bit instructions and have
64-bit data paths, which enables them to process more data at once than 32-bit systems can.

Software
So how does 32-bit or 64-bit hardware affect software? Generally speaking, 32-bit programs
can run on a 64-bit system, but 64-bit programs will not run on a 32-bit system. This is because
64-bit applications include 64-bit instructions that will not be recognized by a 32-bit processor.

In order to run a 64-bit program, your operating system must be 64-bit. Around 2008, 64-bit
versions of Windows and OS X became standard, though 32-bit versions were still available.
Therefore, if you bought your computer in 2009 or later, there is a good chance you are running
a 64-bit operating system. In Windows, you can check your OS version by right-clicking My
Computer, selecting Properties, and clicking System to view the system type. If you have a Mac
and you are running OS X 10.7 or later, your OS is 64-bit.

While it is possible to install a 32-bit operating system on a 64-bit system, it is best to install a
64-bit version if possible. The 64-bit OS will allow your computer to access more RAM, run
applications more efficiently, and, in most cases, run both 32-bit and 64-bit programs.

4
Exceptions to this rule include system utilities and antivirus programs that are written
specifically for a 32 or 64-bit operating system. In these cases, you will need to install the
version of the software that corresponds to your OS (which may be different than your
hardware). Additionally, device drivers are often written for specific operating systems, so it is
important to install 32-bit drivers if you are running a 32-bit OS and 64-bit drivers if your
operating system is 64-bit.

3. What is maintenance and troubleshooting?


Maintenance: Avoiding the problems and keep the system out of issue.

Troubleshooting: Depend on procedure to fix the problem after it's happen.

Computer maintenance is the practice of keeping computers in a good state of repair.


A computer containing accumulated dust and debris may not run properly.

Dust and debris will accumulate as a result of air cooling. Any filters used to mitigate this need
regular service and changes. If the cooling system is not filtered then regular computer cleaning
may prevent short circuits and overheating. Computer maintenance involves keeping a
computer in a good state of repair and physical health. Meaning, it’s set of maintenance tasks
and procedures that help to keep the computer software and hardware updated and
operational.

1. PREVENTIVE MAINTENANCE: This is performed even if the computer is still operating at its
efficient level. It is done to prevent degradation of performance.

2. CORRECTIVE /BREAKDOWN MAINTENANCE: This type of maintenance is required when a


system or subsystem finally collapse.

3. ROUTINE MAINTENANCE: This involves a regular schedule or time table strictly adhered to
by the owner of the computers and the party offering the maintenance service to perform an
overhaul of machinery.

 computer maintenance generally requires several steps, including:

 Checking computer log files

5
 Assessing hard disk space
 Examining computer folder permissions
 Monitoring computer temperature
 Ensuring adequate redundancy of computer systems
 Examining security features
 Examining computer cleaning
 Installing security software patches
 Reading computer logs for security alerts or evidence of computer hacking
attempts
 Updating antivirus software on all computers on the network
 Updating critical service packs and software updates
 Performing regular comprehensive back-ups to ensure that vital data can be
retrieved from storage in the event of a system failure.

Troubleshooting is a systematic process used to locate the cause of a fault in a computer


system and correct the relevant hardware and software issues. Approaching problem solving
using a logical and methodical approach is essential to successful resolution. Although
experience is very useful to problem solving, following a troubleshooting model will enhance
effectiveness and speed.

There are simple rules that experienced troubleshooter follows:

(a) Identify the exact nature of the problem

(b) Isolate the cause of the problem

(c) Resolve the problem

IDENTIFY THE PROBLEMS

1. Observe outward symptoms

2. Form a hypothesis (likely causes)

ISOLATE THE PROBLEMS

1. Test the hypothesis (swapping and eliminating)

2. Check if the hypothesis is correct

COMPONENTS TO TROUBLESHOOT:

6
 MONITOR this is a television-like device which displays the activities of a computer per
time.
PROBLEM 1: Monitor not coming on
SOLUTION: Check the power source and the power cable
PROBLEM 2: Monitor is on, but not displaying
SOLUTION: i. Check the data cable if well connected ii. Check the brightness and the
contrast buttons if they are set zero.
 KEYBOARD this is a typewriter-like device which is used for sending signals into the
computer as input.
PROBLEM 1: Keyboard not responding
SOLUTION: Check the cable if properly connected
PROBLEM 2: Keyboard beeping continuously
SOLUTION: Check if no key is hooked
PROBLEM 3: A key or keys hooking always
SOLUTION: Replace the keyboard
 MOUSE: This is a hand-held pointing device used for executing commands on the
computer.
PROBLEM 1: Mouse not responding
SOLUTION: i. Check the cable if properly connected ii. The computer should be restarted
iii. The mouse should be clean if it is a ball-bearing type
 HARD DISK DRIVE: This is a permanent storage device found on a computer. It is very
fragile.
PROBLEM 1: Strange noise when being accessed
SOLUTION: Back up data and replace the hard disk
PROBLEM 2: Insufficient disk space
SOLUTION: Delete some files or uninstall some programs
PROBLEM 3: No fixed disk found
SOLUTION: Check the data cable and the power connector
 CD-ROM DRIVE/DVD DRIVE This is used for accessing data or information stored on
compact disks or DVD disks
PROBLEM 1: Drive cannot be accessed
SOLUTION: Check the data cable and power connector
PROBLEM 2: Disks cannot be read
SOLOUTION: Lens is weak or dirty. Replace the drive or clean the lens.
PROBLEM 3: Indicator LED is on constantly
SOLUTION: Correct the data cable orientation
 MEMORY (RAM) The computer memory or RAM is the working storage of the computer.
The higher the capacity, the better the performance of a computer.

7
PROBLEM 1: Computer is working but no display
SOLUTION 1: Check if the RAM is well-seated
PROBLEM 2: Computer not recognizing the RAM
SOLUTION 2: Check if the RAM is compatible
 SOFTWARE Computer problems are not only that of hardware malfunctioning. Software
as well can make a computer to misbehave. This often arises from improper shut down
or when new software is added. To correct software problems most times a system
restore should be done or the newly installed software should be removed. If this does
not solve the problem, the operating system could be reinstalled as the last resort.
 PRECAUTIONS: A computer should be installed in a well-ventilated room Liquid
substances must not be brought into the computer room. Food particles must not be
left in the computer room so as not to invite pests and rodents. A computer technician
should always guide against static electricity. A computer must not be worked on when
still powered.

4. Discuss about dual boot, BIOS & POST?


Dual-booting:- is a term used to describe a computer that utilizes two operating
systems. For example, with a dual-boot you could have Windows 8 and macOS X on the same
machine. The concept of installing more than two operating systems is referred to as a multi-
boot. Some examples of software that assist with a dual-boot include Acronis Disk Director for
Windows, Apple boot camp for Mac, and GRUB for Linux users. These programs allow users to
pick which operating system they want to load as the computer is starting up. Users can change
operating systems for different applications, if desired.

As an alternative, a virtual machine allows you to run an operating system within an operating
system.

Trial run for new operating systems


Dual-boot is a great way for users to try out a new operating system. With dual-boot, you can
try a new OS, and still boot into your original OS whenever you want. A dual-boot configuration
can be especially beneficial to network administrators or computer technicians who need to
support or work with multiple system types.

Testing compatibility
Aside from testing a new operating system, dual-boot is also helpful in determining the
compatibility of an application with your present computing environment. For example, a user

8
could perform a dry run of an application on a separate OS installation. Doing this would ensure
that the software is compatible with both systems, before deleting their previous setup.

Multi-user connectivity
Another advantage of dual-boot is that it can make one computer functional for different users.
For example, in a home setting, dual-boot allows you to keep your work or files from being
infected by questionable software downloaded by your kids. Or, for instance, you may have a
Mac user and a PC user in your home. Dual-booting makes one machine work for both parties.

BIOS (basic input/output system):- is the program a computer's


microprocessor uses to start the computer system after it is powered on. It also manages data
flow between the computer's operating system (OS) and attached devices, such as the hard
disk, video adapter, keyboard, mouse and printer.

Location of BIOS:
BIOS is typically placed in a chip known as Read Only Memory (ROM) that comes with the
computer. This ensures that the BIOS will always be available even if the hard disk is formatted
or replaced. However, in many cases the content of the ROM is transferred to the RAM when
the system is started. This is because the RAM allows quicker access as compared to the ROM.
Copying of the content of the ROM to the RAM is known as shadowing

Uses of BIOS
The main use of BIOS is to act as a middleman between OS and the hardware they run on. BIOS
is theoretically always the intermediary between the microprocessor and I/O device control
information and data flow. Although, in some cases, BIOS can arrange for data to flow directly
to memory from devices, such as video cards, that require faster data flow to be effective.

How does BIOS work?


BIOS comes included with computers, as firmware on a chip on the motherboard. In contrast,
an OS like Windows or iOS can either be pre-installed by the manufacturer or vendor or
installed by the user. BIOS is a program that is made accessible to the microprocessor on an
erasable programmable read-only memory (EPROM) chip. When users turn on their computer,
the microprocessor passes control to the BIOS program, which is always located at the same
place on EPROM.

When BIOS boots up a computer, it first determines whether all of the necessary attachments
are in place and operational. Any piece of hardware containing files the computer needs to

9
start is called a boot device. After testing and ensuring boot devices are functioning, BIOS loads
the OS -- or key parts of it -- into the computer's random access memory (RAM) from a hard
disk or diskette drive (the boot device).

The 4 functions of BIOS


BIOS identifies, configures, tests and connects computer hardware to the OS immediately after
a computer is turned on. The combination of these steps is called the boot process.
These tasks are each carried out by BIOS' four main functions:
1. Power-on self-test (POST). This tests the hardware of the computer before loading the OS.
2. Bootstrap loader. This locates the OS.
3. Software/drivers. This locates the software and drivers that interface with the OS once
running.
4. Complementary metal-oxide semiconductor (CMOS) setup. This is a configuration program
that enable users to alter hardware and system settings. CMOS is the name of BIOS' non-
volatile memory.

Accessing BIOS
With BIOS, the OS and its applications are freed from having to understand exact details, such
as computer hardware addresses, about the attached I/O devices. When device details change,
only the BIOS program needs to be changed. Sometimes, this change can be made during
system setup.

Users can access BIOS and configure it through BIOS Setup Utility. Accessing BIOS Setup Utility
varies somewhat depending on the computer being used. However, the following steps
generally enable users to access and configure BIOS through Setup Utility:
• Reset or power off the computer.
• When the computer turns back on, look for a message that says "entering setup" or
something similar. Accompanying that message will be a key that the user should press to enter
system configuration. Here's an example message a user might see: "Press [key] to enter BIOS
setup." Some keys often used as prompts are Del, Tab, Esc and any of the function keys (F1-
F12).
• Upon seeing the prompt, quickly press the key specified.

Once in BIOS Setup Utility, users can change hardware settings, manage memory settings,
change the boot order or boot device, and reset the BIOS password, among other configuration
tasks.

BIOS security

10
BIOS security is a somewhat overlooked component of cybersecurity; however, it should still be
managed to prevent hackers from executing malicious code on the OS. Security group Cylance,
in 2017, showed how modern BIOS security flaws could enable ransomware programs inside a
motherboard's UEFI and exploit other PC BIOS vulnerabilities.

Another unique exploit involving the manipulation of BIOS was Plundervolt. Plundervolt could
be used to mess with a computer's power supply at the time data was being written to
memory, causing errors that lead to security gaps. Intel released a BIOS patch to defend against
it.

BIOS manufacturers
BIOS, in its beginnings, was originally owned by IBM. However, some companies, such as
Phoenix Technologies, have reverse-engineered IBM's original version to create their own.
Phoenix, in doing this, allowed other companies to create clones of the IBM PC and, more
importantly, create non-IBM computers that work with BIOS. One company that did this was
Compaq.

Today, many manufacturers produce motherboards with BIOS chips in them. Some examples
are the following:

• AMI
• Asus
• Foxconn
• Hewlett Packard (HP)
• Ricoh
Knowing the motherboard manufacturer is important because users may want to update their
BIOS and chipset drivers -- the drivers that enable the OS to work with other devices in the
computer, such as a video card -- to the most recent versions. Driver updates may improve
computer performance or patch recent BIOS-level security vulnerabilities. Each manufacturer
has a unique way of updating these drivers.

Power-on self-test (POST):- is a set of routines performed by firmware or


software immediately after a computer is powered on, to determine if the hardware is working
as expected. The process would proceed further only if the required hardware is working
correctly, else the BIOS (Basic Input Output Software) would issue an error message. POST
sequence is executed irrespective of the Operating System and is handled by the system BIOS.
Once the tests are passed the POST would generally notify the OS with beeps while the number
of beeps can vary from system to system. When POST is successfully finalized, bootstrapping is
enabled. Bootstrapping starts the initialization of the OS.

11
Advantages of POST

• Automatic Testing Sequence: POST is automatic so no extra command is needed to run them,
they run automatically on the system just after switching ON the system.

• Works as Safety Feature: POST works as a safety feature of the system as it generates warning
before booting the system if anything found faulty.

• Fast in Speed: It takes very little time to run the testing sequence of POST.

• Helps in Fault Detection: POST gives warning about the problem and the name of the device
from where the problem is generated which makes it easy to detect the problem.

Disadvantages of POST:

• The only major disadvantage of POST is that it only checks the internal functioning of the
system; external interface logic is not tested.

The Role of POST in the Boot Sequence

The boot sequence is the process of starting a computer/system. The boot process is initiated
when the power button is pressed; it sends power to the boot-loader in the cache memory. The
Boot loader performs POST as a preboot sequence and if everything is working well without any
errors the BIOS (Basic Input Output System) is activated which finds and loads the operating
system.

Finally the software has to interact with the hardware units to complete the process. To avoid
any hardware errors while executing a software program, the pre-boot sequence would test the
hardware and initiate the OS if and only if the basic hardware units are functioning as expected.

The principal duties of the main BIOS during POST are as follows:

1. Find, size, and verify the system main memory.

2. Initialize BIOS.

3. Identify, organize, and select which devices are available for booting.

4. Verify CPU registers.

5. Verify the integrity of the BIOS code itself.

6. Verify some basic components like DMA, timer, and interrupt controller.

7. Pass control to other specialized extensions BIOS (if installed).

12
The checks are performed majorly on:

• Hardware elements like processor, storage devices and memory.

• Basic System Devices like keyboard, and other peripheral devices.

• CPU Registers

• DMA (Direct Memory Access)

• Timer

• Interrupt controller

Types of Errors encountered during POST

If there are any errors in the POST the system would fail to proceed towards the next steps
(boot process) as it would throw a fatal error. The POST sequence is executed irrespective of
the Operating System. However, how the POST is handled and the types of errors thrown can
be modified by the Vendor as per the system requirements.

The error message could consist of text messages on the console or audio in the form of beeps.
Irrespective of the vendor there would be a manual describing the types of errors and the error
message mappings to help us troubleshoot. The error messages can vary from a parity error to
a faulty motherboard.

13

You might also like