personal computer

Multi purpose computer for personal use
Collection
zero Useful+1
zero
PC, Personal Computer refers to a size, price and performance suitable for personal use A multipurpose computer for. Desktop Notebook computer , small laptops tablet PC as well as Ultrabook All of them belong to personal computers.
Chinese name
personal computer
Foreign name
Personal Computer
Time to market
1984
product type
electronic product

developing process

Announce
edit
The development of computers is mainly based on the Electronic components Divided into four stages, namely Electronic tube Stage transistor Stage Integrated circuit Stage, scale and vlsi Stage (now). [1]
The first generation (1946-1957) Tube computer , the main use of computers Logic element Is the electronic tube, also known as the electronic tube era. Main memory use drum Magnetic core, External memory Use tape. In terms of software machine language and assembly language Write the program. In this period, computers are characterized by their huge size Operation speed Low (usually thousands to tens of thousands of times per second), high cost, poor reliability Memory capacity Small. [1]
The second generation (1958-1970) Transistor computer The main logic elements used by the computer are transistor The main memory uses a magnetic core, and the external memory uses tapes and disks. Start using software Management procedures , later using the operating system and Advanced Programming Language This period Application of computer Expand to data processing Auto-Control And so on. Computer running speed It has been increased to several hundred thousand times per second, the volume has been greatly reduced, and the reliability and memory capacity have also been greatly improved. [1]
The third generation (1963-1970) Integrated circuit computer In this period, small and medium-sized computers were used Integrated circuit Instead of discrete components Semiconductor memory Replaced Core memory , external storage uses disks. In terms of software, the operating system was further improved, high-level language The number increased. The running speed of the computer has also increased to hundreds of thousands to millions of times per second, and the reliability and storage capacity Further improvement, external Equipment type various. Computer and communication are closely combined and widely used in Scientific computing , data processing transaction management Industrial control And other fields. [1]
The fourth generation (after 1971): large-scale and vlsi computer. The main logic elements of computers in this period are large-scale and super large-scale integrated circuit , generally called the era of large-scale integrated circuits. storage use Semiconductor memory , the external memory adopts large capacity soft Hard disk , and start importing discs. In terms of software, the operating system continues to develop and improve. The development of computer has entered computer network The era characterized by. The running speed of the computer can reach tens of millions to trillions of times per second. The storage capacity and reliability of the computer have been greatly improved, and the functions are more complete. The types of computers in this period are small, medium mainframe Outside, start to Supercomputer and microcomputer (Personal computers), Microcomputer The birth mark is 1971 microprocessor The main structure of CPU is Arithmetic unit And controller, so that the computer starts to enter human society Various fields. [1]
The development of personal computers can be divided into three stages:
The first wave started with personal computers around 1984 [2]
Some amateurs were the first to use personal computers. Most of them are engineers. They know computer hardware and can also use software. The biggest feature of starting to use personal computers is that they have significantly increased productivity. What people used to need to do before is replaced by personal computers, which can be done faster. At this stage, there are few varieties to choose from, and the machine is relatively rough; Users must know a lot about computers before they can use them; There are many people who need to use the machine, but the supply cannot keep up. IBM After the launch of its personal computer, users responded enthusiastically, which laid a solid foundation for the development of personal computers. At this stage, there are added value Of distributor At the beginning, they can provide some special applications or special hardware (such as communications, high-quality printers, etc.), which is very popular with the public.
The following products have laid the foundation for industrial development at this stage:
(1) Apple Personal computer, which was popular with users at that time.
(2) VisiCalc Spreadsheet The software is characterized by wide use and convenient use. In just two years, it has sold more than 200000 sets.
(3) IBM Personal computer, which has played a decisive role in establishing the future of personal computer.
The second wave started from June 1984 to 1987 [2]
At this stage, more and more people use personal computers. Because it is profitable, manufacturers have launched a variety of products with different brands and functions. For a while, personal computers appeared on the market with a wide variety, dazzling; However, the supply exceeds the demand, and users feel confused and at a loss. At this stage computer technology There is no clear direction. Different operating systems and network designs make it difficult for personal computers to connect with each other and many programs are incompatible. At this time, many large companies began to reconsider the development strategy of personal computers. Many executives believe that the functions that personal computers should have are actually beyond their capabilities. Personal computers have been put to the test again in front of users. As a result of mass production, manufacturers' profits have declined. At the same time, users have gradually learned that the ability of personal computers is actually limited. As a result, both manufacturers and users were dissatisfied. At this time, some visionary manufacturers began to propose to establish industrial standards for personal computers. This standard makes different types of personal computers compatible, which guarantees their development and promotion [2]
Section Three waves New functions and uses of personal computers in:
1. LAN
Enable personal computers to link to each other through the network. Ethernet Standardization of( IEEE 802.3 )It is a milestone of computer Internet, and personal computers can Hub Establish a connection with each other. LAN in each Large institutions And enterprise network construction is a very important link. And the local area network itself has already expanded into the global Internet.
E-mail was a revolution in communication at that time, and users would feel that it was convenient and attractive. These factors will make e-mail more popular.
Personal computers already have sufficient image processing capabilities. Better peripherals are available - such as Color printer , display, etc. More powerful applications have emerged: electronic publishing Application, multimedia processing software.

operating system

Announce
edit

Windows

Windows The system is simple, intuitive and easy to use, so it is loved by many users. [3]

DOS

DOS It's the United States Microsoft Issued by the Company Disk Operating System An operating system is a group of systematic programs that manage and control computer resources. It manages and uses disk information on a file basis. From 1981 to 1995, DOS IBM PC Compatible computer It plays an important role in the market. [3]

MacOS

MacOS yes Apple Computer Dedicated system , the operating system cannot be installed on an ordinary PC. Apple Inc Not only production Mac Most of the computer hardware, but also Self development The operating system used by the Mac. [3]

Linux

Linux The operating system is a modern operating system designed according to the MINIX operating system. It was born on October 5, 1991. Later, with the help of the Internet and the joint efforts of computer enthusiasts around the world, it has become the most used type in the world UNIX operating system [3]

system safety

Announce
edit

Botnet

Botnet It refers to that hackers write control programs similar to trojans through certain computer expertise, and then use computers Network virus And other forms to spread it, so as to achieve malicious Attacker The purpose of. Hackers use their own computer technology to indirectly control different servers, so that botnet programs can Computer server Carry out infection and attack, and finally achieve the purpose of centralized attack on a network. In addition, the number of computer groups controlled by hackers often exceeds our imagination, so hackers are also very leisurely to steal and send information to the botnets that have been controlled Junk information And software, or even fake networks. [4]

Phishing website

Phishing refers to hackers sending spam or email via botnets through a large number of virtual hypothetical banks and other well-known institutional websites. Once users open the information or email, hackers can hidden information Stealing, such as bank passwords, network accounts or credit cards, for in-depth attacks. Phishing website When it is important to entice users to open the hypothesized email or information, and then connect it to the official account or website designed by the hacker to obtain the personal basic information and personal information of individual users Sensitive information And then fake the victim to break the law Trading behavior And gain benefits from it. [4]

Viruses

Malicious program code includes botnets spyware Trojan program And other program contents. It can artificially write computer attack programs Malware Threaten and invade the Internet information system. Therefore, the computer technical study Personnel should use the code research of malicious programs to fully understand the means of hacker intrusion in a timely manner, so as to provide personal computers with system safety Scientific advice on threats. [4]

risk-prevention

Announce
edit
Timely carry out relevant work Data backup , use the firewall correctly
Perfect and accurate computer systems should be established for both personal computers and enterprise computer clusters Safety awareness In recent years, with the computer virus The continuous upgrading of and the increase of categories. In order to effectively protect the data and personal information stored in personal computers, genuine computer firewall software and genuine anti-virus software should be installed accordingly, and regular anti-virus software Update. In the face of the diversification of computer anti-virus software, it is necessary to identify it correctly, and compare the corresponding monitoring files and software killing monitoring products in real time. In addition, on the data file When storing data Real time monitoring , ensure that the data file does not Virus invasion To effectively ensure that the virus is processed and cleared before attacking the computer. [4]
Properly configure the computer system
Through the analysis of hackers, we know that, generally speaking, hackers attack computers in a fraudulent way, and then implant them into personal users' computers Viruses Or attack them to control them User host Or arbitrage privacy The purpose of. Therefore, personal users should adopt certain Safety measures Know more about computer system Security precautions And maintenance measures Guaranteed on Normal use of personal computing under secure network conditions. [4]
personal computer System installation The correct way is to do a good job in the basic work steps of computing security. First of all, we should avoid selecting GHOS systems in different types of websites, try to purchase the relevant software of the genuine and new versions of the computer system, format the hard disk as the first step when installing the software, and make the computer disconnected when installing the software, so as to minimize the chance of viruses invading the computer. After that, set the user password and set a daily common account accordingly system safety After completion, the computer shall be timely network connections And then fix the system vulnerabilities and patches in a timely manner. [4]
Improve user fundamentals Information security awareness
Not all security risks must be controlled by technical means. In fact, many computer information problems can be artificially prevented. This requires computer users to improve their awareness of information security and do the following when using computers at ordinary times: First, pay attention to the setting of private passwords to prevent others from stealing or changing important information in the computer; Second, do not click on unfamiliar links or log on unknown websites to prevent viruses from taking advantage of the opportunity to invade; Third, through Cloud disk Backup measures shall be taken in such ways as backup, so that data loss can be avoided even if there is an error in the computer system. [5]
Improve the comprehensive quality and ability of computer management personnel
Enterprises or relevant government departments should standardize the work of computer network and organize staff to participate in computer network regularly training course Improve the ability of staff to deal with hidden dangers of computer network security, ensure that each staff member can master relevant operations skillfully, and avoid technical mistakes. In addition, the positions of management personnel should be reasonably planned to form a clear division of labor system. Computers in different fields Network information security Assign the responsibility to different positions to reach a coordinated management model [5]

Use questions

Announce
edit

Problem introduction

With the rapid development of science and technology, electronic products are widely used in life and work, especially in work, most affairs are handled by computers. [6]
However, in the process of computer use, there will also be a variety of problems, such as failure to start, abnormal display, data loss, file damage, etc., which has brought many unnecessary losses to users. Therefore, understanding the common problems and failures of the computer can not only better use and extend the life of the computer, but also achieve Routine maintenance And information storage. [6]
The following will analyze and introduce the common problems in the use of the computer, and propose simple resolvent [6]

a main board

a main board BIOS problems
a main board The BIOS stores important hardware data. At the same time, the BIOS is also a vulnerable part of the motherboard, which is vulnerable to damage. Once damaged, the system will fail to run, and there will be no display when the system is turned on. This kind of failure usually occurs because the motherboard BIOS is CIH virus Damage (of course, it does not rule out that the system cannot run due to the failure of the motherboard itself). If the BIOS on the motherboard is damaged, you can plug in the ISA graphics card to check whether there is a display (if there is a prompt, you can follow the prompt steps). If there is no Startup screen , the user can create an automatic BIOS update floppy disk , refresh BIOS again, but some motherboards BIOS After being destroyed, floppy disk drive Unable to work. At this time, you can try Hot plug (As long as the BIOS is the same, it can be successfully performed on motherboards of the same level). However, hot plug may cause damage to some components of the motherboard in addition to requiring the same BIOS, so the reliable method is to use Coder Write the BIOS update file into the BIOS. [6]
CMOS Setup Questions
CMOS The settings cannot be saved because Backup battery If the voltage is insufficient, replace it to solve the problem. If the problem still cannot be solved after replacing the battery on the main board, there are two possibilities: one is that there is a problem with the circuit on the main board, which needs to be solved by professional maintenance personnel; Second, there is a problem with the CMOS jumper on the motherboard. Sometimes, the CMOS jumper on the motherboard is set to the clear option by mistake or set to an external battery, which also makes the CMOS data unable to be saved. [6]
In addition, improper CMOS settings may cause other problems, such as installation or startup Windows The mouse is not available when. Set in CMOS Power management There is a modem use in the column IRQ Item, the options are 3, 4, 5..., NA, general Default Options If it is 3, set it to an interrupt item other than 3. For another example, if a crash occurs in CMOS, it is generally caused by a problem with the mainboard or CPU. If the mainboard cache has a problem or the mainboard design has poor heat dissipation, touch it after the crash CPU It is found that the temperature of the surrounding main board components is too high. After replacing the high-power fan, the crash fault was solved. For faults with cache problems, you can enter the CMOS settings. After disabling the cache, the problem can be solved successfully. However, the computer speed will be affected to some extent after disabling the cache. Another example is the non display problem caused by CMOS settings, Jumper free motherboard Set in CMOS CPU frequency If not, it will cause no display fault. For this, check the motherboard Expansion slot Or clear CMOS to solve the problem. The jumper for clearing CMOS is usually near the lithium battery on the motherboard, and its default position is usually 1 or 2 short circuit. You can solve the problem by changing it to 2 or 3 short circuit for a few seconds. If the user cannot find the jumper on the old motherboard, just remove the battery, turn it off after the power on display enters the CMOS settings, and reinstall the battery to discharge CMOS. [6]

Memory

Memory It is one of the important components in the computer, and it is a bridge to communicate with the CPU. Memory is also called internal memory, which is used to temporarily store the calculation data in the CPU, as well as the hard disk, etc External memory Data exchanged. As long as the computer is running, the CPU will transfer the data to the memory for calculation. When the calculation is completed, the CPU will transfer the results. The operation of the memory also determines the computer's stable operation Memory is created by Memory chip , circuit board Goldfinger And other parts. [6]
Computer failures due to memory are mainly divided into the following aspects: [6]
No display after startup
This kind of failure usually occurs because Memory module And mainboard Memory socket poor contact The problem can be solved by rubbing the golden finger with an eraser back and forth (do not clean it with alcohol, etc.). It can also be caused by memory damage or a problem with the motherboard memory slot. [6]
Windows frequently enters automatically safe mode
This kind of failure is generally caused by the incompatibility between the motherboard and the memory module or the poor quality of the memory module. It is common for the memory with high frequency to be used on some motherboards that do not support memory modules with this frequency. You can try to reduce the memory reading speed in the CMOS settings to solve this problem. If not, you can only replace the memory module. [6]
Random crash fault
It is generally caused by the use of several memory modules with different chips and the time difference caused by the different speed of each memory module crash , which can be reduced in CMOS settings Memory speed Otherwise, only the memory of the same model can be used. Another possibility is that the memory module is not compatible with the motherboard, which is generally rare. In addition, it may be that the poor contact between the memory module and the motherboard causes a random computer crash. [6]

Graphics card

Graphics card The full name of the display interface card, also known as the display configuration card, is one of the most basic components of the computer. The purpose of the graphics card is to computer system The required display information is converted and driven. [6]
The computer failures caused by the graphics card are mainly divided into the following aspects: [6]
No display after startup
This kind of failure is generally caused by poor contact between the graphics card and the motherboard or a problem with the motherboard slot. For some integrated graphics Motherboard, if Video memory share Main memory , you should pay attention to the location of the memory module. Generally, a memory module should be inserted in the first memory module slot. There is no display fault when the computer is turned on due to the graphics card, and one long or two short messages will be sent after the computer is turned on Beep [6]
display blurred screen , illegible handwriting
This kind of failure is generally caused by the monitor or graphics card does not support high resolution. blurred screen You can switch the startup mode to the safe mode, and then enter the display settings "Application" and "OK", and click and button in the 16 color state. Restart, in the system Normal mode Delete the video card Driver , restart the computer. [6]
Color display is abnormal
Such failures generally have the following reasons: ① Display card And display The signal line Poor contact; ② Display failure; ③ In some software Runtime The color is abnormal, which is commonly found in old computers. There is an option to verify the color in the BIOS, which can be turned on; ④ The video card is damaged; ⑤ The display is magnetized. This phenomenon is generally caused by the excessive proximity to objects with magnetic properties. After magnetization, the display screen may deflect. [6]
Crash or abnormal miscellaneous spots on the screen
Such failures are generally caused by problems with the video memory of the video card or poor contact between the video card and the motherboard; Incompatibility between the graphics card and other expansion cards may also cause a crash. Cleaning is generally required Gold finger of graphics card Position or replace the graphics card. [6]

Hard disk

Hard disk is one of the main storage media of computer, which is composed of one or more aluminum or glass discs. These discs are covered with iron magnetic material Most hard disks are fixed and are Permanent The ground seal is fixed at Hard drive Medium. [6]
The hard disk is the software warehouse responsible for storing data. If the failure of the hard disk is not handled properly, the system cannot be started and data is lost. The common failures of the hard disk mainly include the following aspects: [6]
The system does not recognize the hard disk
The system cannot be started from the hard disk. Use the automatic monitoring The feature cannot find the existence of the hard disk. This kind of failure mostly occurs in the hard disk power cable or IDE Port/ SATA port data interface The hard disk itself is unlikely to fail. You can conduct replacement tests by reinserting the hard disk cable or changing the data interface and cable, and you will soon find the fault. [6]
The system cannot be started
There are usually four possible causes of this fault: ① Main Bootstrap Damage; ② Partition table Damage; ③ partition Significant bit Error; ④ DOS boot file Damage. [6]
Hard disk appears Bad track
Most of the hard disks have bad tracks Logical badness , can be repaired. Once used“ SCANDISK ”When scanning the hard disk, if the program prompts that there is a bad track, first use the self inspection program of each brand of hard disk again to conduct a full scan. However, fast scanning is not an option because it can only detect about 90% of the problems. If the check result is "successfully repaired", it can be determined that it is a logical bad track. Just reformat the hard disk. [6]
Hard disk capacity And Nominal value Obvious discrepancy
Generally speaking, the capacity of the hard disk after formatting will be less than the nominal value, but the gap will never exceed 20%. If the gap between the two is very large, you should enter BIOS settings when starting up. Make reasonable settings according to the hard disk. If it still cannot be solved, it may be the computer a main board Large capacity hard disks are not supported. At this time, you can try to download the latest motherboard BIOS and refresh it. This kind of failure often occurs when a large capacity hard disk is paired with an older motherboard. In addition, confusion in BIOS settings due to sudden power failure and other reasons may also lead to this failure. [6]
In short, in the process of computer use, in the face of various possible failures, only by finding out the cause of the problem from the source and taking appropriate methods to deal with it, can we avoid unnecessary losses such as data damage and loss caused by blind operation, so that computers can bring more convenience and comfort to our life and work. [6]

Software and hardware maintenance

Announce
edit

hardware component

The probability of hardware failure during the use of computers is very high and complex, such as: Black screen Phenomenon, no display when starting. Frequent alarms and frequent crashes, etc. These phenomena are actually caused by hardware failures. [7]
Methods to follow in case of computer hardware failure
(1) Peripherals first, then hosts: Since it is easy to find and remove faults on peripherals, we first check the mouse, keyboard, monitor, etc. according to the error information on the system peripheral And working conditions. After exclusion, consider the complex host part. [7]
(2) Power supply before components: power supply is easy to be ignored by users, generally Power supply Not enough. Abnormal output current can easily lead to some failures. Many times, users have checked the motherboard, graphics card, and hard disk, but still can't find the cause. But they don't know that this is the power supply. [7]
(3) First simple then complex: When the microcomputer fails, first check the simplest reason. In many cases, the fault is caused by loose data lines, excessive dust, and card insertion poor contact And so on. After the simple method test, consider whether it is the same problem of hardware damage. [7]
Troubleshooting method
Plugging Substitution method : Plug and replace is the most original method. Is also the most Direct effect A method of. The plug and replace method is very simple. First of all, according to the problem on the computer, we generally doubt where the problem is. For example, on the display, video card, hard disk, keyboard... of a microcomputer, remove the suspect object and install it on another good microcomputer. If another microcomputer fails to work, you can directly know that the object is faulty. If there is no problem, continue to doubt and replace, and eventually find the problem object. [7]
Direct observation : The direct observation method is based on the alarm sound of BIOS, POST Information to determine hardware failure. Troubleshoot according to various sounds and instructions. For example, when self inspection shows that there is a problem with one of the hard disks, you can check the data line and power cord Check for looseness. When problems are displayed. Check the monitor and video card and VGA interface Erase Check whether there is dust on the interface Broken needle And so on. [7]
Detect with special diagnostic software: diagnostic software is a special hardware fault Inspection tools It can help quickly find out the cause of the fault. E.g. Norton Tools( Norton hold-all )。 This diagnostic software can not only check the internal components of the whole system (such as CPU , memory, motherboard, hard disk, etc. If the same question is found, detailed report information will be given to facilitate our search Cause of fault And troubleshooting. [7]
System minimization check: The principle of system minimization check is very similar to the plug and replace method. Is to adopt Minimum system Let's diagnose one by one. For example, only install CPU, memory, graphics card and motherboard. If it does not work normally after startup. Then check the four parts by plugging and replacing them. If they work normally, connect the hard disk and then the monitor. And so on until the fault is found. [7]

Software

The software is mainly divided into two parts: system software and application software. When users use system software, such as XP/2000 system, there will be many Junk Files It may occupy system space, or hinder daily system operation Slower Even the system cannot work. In the process of using application software, many application software will appear inexplicable system conflicts in the system after installation, and some normal functions will also appear abnormal after permanent, which is inevitable. [7]
Generally speaking, the questions appearing in software can be classified into the following categories:
(1) Failure caused by incompatibility between software and system. The version of the software is incompatible with the running environment configuration, resulting in failure to run, system crash, changes and loss of some files, etc. [7]
(2) Faults caused by software conflicts. Of two or more software and programs Operating environment , access area, work address, etc. conflict, resulting in system chaos, file loss and other failures. [7]
(3) Malfunctions caused by misoperation are divided into command misoperation and software program Running misoperation, executing commands that should not be used, selecting operations that should not be used, running some destructive programs, incorrect or incompatible Diagnostic procedures . Disk making procedure and performance Test procedure And so on, Disk format wait. [7]
(4) computer virus Causing malaria. Computer viruses will greatly interfere with and affect the use of computers Computer storage Our data and information are damaged, or even lost, and will infect other computers. Most computer viruses can be hidden like time bombs waiting to attack. [7]
(5) Incorrect system configuration Fault caused by. There are three types of system configuration failures, namely, basic system startup CMOS chip Configuration system boot For the system command configuration of process configuration, if the parameters and settings of these configurations are incorrect or not set, the microcomputer may not work and cause operation troubleshooting. Microcomputer Soft fault Generally, it can be recovered, but in some cases Software failure It can also be converted into hardware failure. [7]