background image

 

 

 Information Backup

Most of the information stored on a hard disk is contained in data files. Data files contain
the information you put in the computer, such as letters and reports.

You can lose data files from your hard disk for a variety of reasons. Security violations,
improper handling during a move, or computer viruses can destroy stored information. To
avoid losing information, make copies of the data files using storage devices such as
diskette drives, tape drives, or Zip drives. Also, if you are connected to a LAN, you might
be able to back up information to another computer on the LAN. Backup copies can save
you time and money recovering files accidentally erased from a hard disk or lost when a
hard disk drive fails.

Back up your hard disks on a regular basis (daily, weekly, or monthly depending on how
often the information changes). Also, back up the hard disk before moving the computer.
Backup procedures differ from one operating system to another.

 Erased Files

Erasing a file from a diskette or hard disk does not necessarily destroy the file. With the
proper software tools, someone might be able to restore all or part of an erased file. An
erased file, therefore, might be a security exposure if you sell your computer or give
someone a diskette that once contained confidential information.

The standard operating-system format commands do not remove all information from a
hard disk. Low-level format programs are used for this purpose and are available from a
number of software manufacturers.

Diskettes are a little different. An operating-system format command writes a repeated
pattern over the entire surface of the diskette. As a result, any information that was on the
diskette becomes unreadable.

Depending on the type of information stored, you might require additional safeguards.

 Computer Viruses

A computer virus is a program (or instructions hidden within a program) that can “infect”
files and programs on your computer. Unlike most other programs, viruses are typically
designed to spread themselves. Some viruses can display a message or cause erratic screen
behavior. Others are destructive, erasing or damaging files, or overloading memory and
communication networks.

Viruses are difficult to detect. Many stay inactive until triggered by a specified event such
as a date, command, or some other operation. Some are activated when an infected
program is started a specified number of times. When the symptoms of the virus appear, it

Security 

37

Содержание PC 300GL Types 6275

Страница 1: ...Understanding Your Personal Computer PC 300GL...

Страница 2: ......

Страница 3: ...Understanding Your Personal Computer PC 300GL IBM...

Страница 4: ...iodically made to the information herein these changes will be incorporated in new editions of the publication IBM may make improvements and or changes in the product s and or the program s described...

Страница 5: ...Expansion Bus 8 PCI Bus 8 PCI Interface 9 PCI Performance 9 ISA Bus 9 Expansion Bus Slots 10 Adapter Configuration 10 Plug and Play Adapters 10 Legacy Adapters 11 Chapter 3 Video 12 Monitors 12 Resol...

Страница 6: ...ying Diskettes 33 Hard Disk Drives 33 IDE 34 SCSI 34 CD ROM Drives 34 Zip Drives 35 Chapter 6 Security 36 Information Backup 37 Erased Files 37 Computer Viruses 37 Chapter 7 Software 39 Software Layer...

Страница 7: ...Remote Administration 46 DHCP and RPL 46 Wake on LAN 46 Wake on Modem 47 Wake on Ring 47 Appendix Notices and Trademarks 48 Notices 48 Trademarks 48 Glossary 50 v...

Страница 8: ...s security features and software Not all features and capabilities described in this book are available on all models For specific information on features of the PC 300GL and instructions on how to se...

Страница 9: ...ng the performance of multimedia and communications software For information about the type and speed of the microprocessor in your computer view the System Summary screen displayed by the Configurati...

Страница 10: ...to Chapter 2 Expansion Bus on page 8 for additional information Microprocessor Instructions Data and instructions are necessary for each processing operation that the microprocessor performs Data and...

Страница 11: ...s are located on the system board For information about the type and amount of main memory or System Memory in your computer view the System Summary screen displayed by the Configuration Setup Utility...

Страница 12: ...ed for wait states is by using cache memory which improves system performance by temporarily storing frequently used data and instructions in a cache A cache is a buffer between the microprocessor and...

Страница 13: ...oprocessor updates main memory directly Write through mode is slower because the microprocessor interacts directly with main memory which is slower than cache memory Memory Organization Operating syst...

Страница 14: ...as a separate computer running DOS With very few exceptions these operating systems are fully compatible with application programs written for DOS If you are using any of these operating systems addi...

Страница 15: ...ls only Bus mastering IDE interface Counters and timers Direct memory access DMA controller Diskette port controller and interface Interrupt controller Keyboard and mouse port controller and interface...

Страница 16: ...ntrollers Regardless of how fast the microprocessor and other components are data transfers between them must pass through the expansion bus Your computer has two expansion buses the ISA bus and the P...

Страница 17: ...at speeds up to 132 MB per second While many factors can reduce practical performance achieving just half or a third of the PCI maximum theoretical throughput far exceeds the practical performance of...

Страница 18: ...assignment of computer resources such as interrupt request IRQ lines direct memory access DMA channels and memory address ranges Determining how to set switches for or configuring these resources can...

Страница 19: ...s not currently being used by adapters already installed in your computer are set to Available When you install an additional legacy adapter set the resources used to ISA Resource This enables the Plu...

Страница 20: ...e distance from the center of one phosphor dot to the center of the next phosphor dot of the same color is the dot pitch Dot pitch is measured in millimeters such as 0 28 0 31 0 39 and 0 41 In general...

Страница 21: ...the screen remains stable DDC Protocol Potential problems with monitor flicker are reduced by operating a monitor at its highest refresh rate To simplify the job of setting the refresh rate some moni...

Страница 22: ...o Control on page 15 for more information The graphics controller supports various SVGA monitor resolutions If you connect an SVGA monitor to your computer you can take advantage of SVGA resolutions s...

Страница 23: ...ions that handle a high volume of data and computations These typically require a high degree of speed Moving a window from one location to another dragging an icon across the screen and scrolling thr...

Страница 24: ...des The device drivers for your computer and instructions for installing them README files are provided on the IBM Software Selections CD that comes with your computer If your computer has IBM preinst...

Страница 25: ...computer model might not include all of the I O devices or connectors described in this section Refer to the PC 300GL User Guide for more specific information Following are the system board I O conne...

Страница 26: ...one bit at a time at speeds ranging from 300 to 115000 bits per second bps The serial ports are 16550 UART universal asynchronous receiver transmitter compatible so they can support high speed modems...

Страница 27: ...pter or use special hardware or software that causes a configuration conflict you might have to change port settings If so you can change the settings for the serial port using the Configuration Setup...

Страница 28: ...ng switches on the adapter as well as changing settings in the Configuration Setup Utility Program Each parallel connector or adapter on your computer can use any of three available port settings prov...

Страница 29: ...idirectional mode that uses direct memory access DMA for data transfer to a high speed printer or other devices EPP The enhanced parallel port EPP mode is a high performance bidirectional mode that ha...

Страница 30: ...aps Lock Scroll Lock C t r l C t r l 104 Key Keyboard Figure 1 Keyboard Layout The illustrations in this section show the 104 key keyboard The keyboard includes the following groups of keys Standard t...

Страница 31: ...ys are arranged across the top of your keyboard Use them to send instructions to the software you are using Think of them as shortcuts for doing routine tasks on your computer Caps Lock Caps Lock Scro...

Страница 32: ...defined by the program in use When two or more keys are used together to perform a certain function they are called combination keys To use combination keys you simply hold them down at the same time...

Страница 33: ...tion as long as you hold them down Home Moves the cursor to the beginning of a line or document End Moves the cursor to the end of a line or document Page Up Moves the cursor up one screen of informat...

Страница 34: ...G H J L K o Z X C B V N M _ C t r l C t r l 9 0 I n s Canc Windows Interface Keys Figure 7 The two keys with the Windows logo are supported by the operating system and provide system level functionali...

Страница 35: ...f mouse will operate provided you have the correct device driver installed Monitor Port The monitor port allows you to connect a variety of video graphics array VGA or super video graphics array SVGA...

Страница 36: ...ays are available Refer to PC 300GL User Guide for more information on expansion space Diskette Drives Your computer comes with a 1 44 MB diskette drive designed to use only 3 5 inch diskettes Optiona...

Страница 37: ...3 5 Diskette 2 0 MB capacity No Window DD 3 5 Diskette 2 0 MB capacity HD Window 1 MB Double Density DD 2 MB High Density HD Storage Devices 29...

Страница 38: ...te Do not move this slide because fingerprints and dust can cause loss of data 3 5 Diskette 2 0 MB capacity 3 5 Diskette 2 0 MB capacity Protective Slide Top Diskette Label Never touch the magnetic di...

Страница 39: ...ly to ensure that all edges are secure Apply labels only to the front of diskettes Do not place a label where it interferes with the protective slide or covers an opening in the protective diskette ca...

Страница 40: ...switch it is permanently write protected The write protect switch is located on the back of 3 5 inch diskettes Write Protect Switch To allow writing to the diskette slide the switch so the write prote...

Страница 41: ...COPY command Groups of files can be copied faster using the XCOPY command Both COPY and XCOPY can copy files to different types of diskettes For duplicating a diskette use the DISKCOPY command DISKCOP...

Страница 42: ...ve connected to an optional SCSI adapter SCSI can be faster than IDE particularly when used with a multitasking operating system such as Microsoft Windows 95 Windows 98 and Windows NT With SCSI instru...

Страница 43: ...apacity disk drive that uses a removable disk that is slightly larger and about twice as thick as a conventional 3 5 inch floppy diskette The Zip disk has a capacity of 100 MB of data They have become...

Страница 44: ...authorized programs to bypass security controls Selectable disabling of diskette and IDE drives to prevent unauthorized use I O port control to disable input and output functions of the serial and par...

Страница 45: ...t of an erased file An erased file therefore might be a security exposure if you sell your computer or give someone a diskette that once contained confidential information The standard operating syste...

Страница 46: ...mputer to computer when programs are copied or exchanged If you don t know where a program came from be careful Most reputable bulletin board owners and distributors of programs scan their files to gu...

Страница 47: ...ich allows the computer to conserve energy or allows the computer to turn on when it is unattended An operating system is the layer of software that manages all computer operations by directing the fl...

Страница 48: ...apters and other optional features have programmable settings Your computer has a special type of nonvolatile memory called CMOS where it saves these settings This memory is kept active by a battery s...

Страница 49: ...tor These programs provide instructions that allow the computer to interact with the device or take advantage of the special features of a device Device drivers are necessary because the BIOS cannot b...

Страница 50: ...ers are provided on the IBM Software Selections CD that comes with your computer If your computer has IBM preinstalled software video device drivers are already installed on the hard disk of your comp...

Страница 51: ...working with numbers using graphics and performing many other personal and business functions Many application programs are commercially available for your computer After you determine the types of ap...

Страница 52: ...Back up your operating system and other software so that you can more easily recover from an operating system or hard disk drive failure For instructions on how to back up the operating system progra...

Страница 53: ...ance network connection with an 8 conductor Rj 45 unshielded twisted pair UTP connector For computers with IBM installed software device drivers for this adapter are on the hard disk for some adapters...

Страница 54: ...computer by installing hybrid images or files on the hard disk Then each time the computer starts from the network LANClient Control Manager recognizes your computer as a Hybrid RPL client and a boot...

Страница 55: ...ns and help increase productivity these updates can be done after normal working hours or on weekends when telecommunication traffic is at a minimum Wake on Ring Your computer might have an external m...

Страница 56: ...onsibility of the user IBM may have patents or pending patent applications covering subject matter in this document The furnishing of this document does not give you any license to these patents You c...

Страница 57: ...s Machines Corporation 1998 All rights reserved Note to U S Government Users Documentation related to restricted rights Use duplication or disclosure is subject to restrictions set forth in GSA ADP Sc...

Страница 58: ...eadphones auxiliary storage Addressable storage other than memory that can be accessed by means of an input output channel for example direct access storage devices or magnetic tape B back up To copy...

Страница 59: ...oints for example assignment of characters and meanings to 256 code points for an 8 bit code assignment of characters and meanings to 128 code points for a 7 bit code compatibility The capability of a...

Страница 60: ...mory access DMA The transfer of data between memory and input output devices without microprocessor intervention diskette A small magnetic disk permanently enclosed in a rigid or semi rigid protective...

Страница 61: ...rogrammable erasable and does not require continuous power The chief benefit of flash memory over other programmable and erasable data storage devices is that it can be reprogrammed without being remo...

Страница 62: ...computer can run the program local area network LAN 1 A computer network located on a user s premises within a limited geographical area Communication within a local area network is not subject to ex...

Страница 63: ...an have network server See server nonvolatile 1 Pertaining to a storage device whose contents are not lost when power is cut off 2 Contrast with volatile ns nanosecond O operating system Software that...

Страница 64: ...tructions A processor consists of at least an instruction control unit and an arithmetic and logic unit See microprocessor and central processing unit program 1 A sequence of instructions that a compu...

Страница 65: ...2 Contrast with hardware startup sequence In personal computer systems the order that the computer uses to search the direct access storage devices for an operating system storage A functional unit i...

Страница 66: ...achment points Data is transmitted in asynchronous or isochronous mode USB Universal serial bus utility program 1 A computer program in general support of computer processes for example a diagnostic p...

Страница 67: ......

Страница 68: ...IBM Part Number xxxxxxx Printed in U S A XXXXXXX...

Отзывы: