PC,Personal Computer refers to a size, price and performance suitable forpersonal useA multipurpose computer for.DesktopNotebook computer, small laptopstablet PCas well asUltrabookAll of them belong to personal computers.
The second generation (1958-1970)Transistor computerThe main logic elements used by the computer aretransistor。The main memory uses a magnetic core, and the external memory uses tapes and disks.Start using softwareManagement procedures, later using the operating system andAdvanced Programming Language。This periodApplication of computerExpand to data processingAuto-ControlAnd so on.Computerrunning speed It has been increased to several hundred thousand times per second, the volume has been greatly reduced, and the reliability and memory capacity have also been greatly improved.[1]
The fourth generation (after 1971): large-scale andvlsicomputer.The main logic elements of computers in this period are large-scale and superlarge-scale integrated circuit, generally called the era of large-scale integrated circuits.storageuseSemiconductor memory, the external memory adopts large capacity softHard disk, and start importing discs.In terms of software, the operating system continues to develop and improve.The development of computer has enteredcomputer networkThe era characterized by.The running speed of the computer can reach tens of millions to trillions of times per second. The storage capacity and reliability of the computer have been greatly improved, and the functions are more complete.The types of computers in this period are small, mediummainframeOutside, start toSupercomputerandmicrocomputer(Personal computers),MicrocomputerThe birth mark is 1971microprocessorThe main structure of CPU isArithmetic unitAnd controller, so that the computer starts to enterhuman societyVarious fields.[1]
The development of personal computers can be divided into three stages:
The first wave started with personal computers around 1984[2]。
Some amateurs were the first to use personal computers.Most of them are engineers. They know computer hardware and can also use software.The biggest feature of starting to use personal computers is that they have significantly increased productivity. What people used to need to do before is replaced by personal computers, which can be done faster.At this stage, there are few varieties to choose from, and the machine is relatively rough;Users must know a lot about computers before they can use them;There are many people who need to use the machine, but the supply cannot keep up.IBMAfter the launch of its personal computer, users responded enthusiastically, which laid a solid foundation for the development of personal computers.At this stage, there areadded valueOfdistributorAt the beginning, they can provide some special applications or special hardware (such as communications, high-quality printers, etc.), which is very popular with the public.
The following products have laid the foundation for industrial development at this stage:
(1)ApplePersonal computer, which was popular with users at that time.
(2)VisiCalcSpreadsheetThe software is characterized by wide use and convenient use. In just two years, it has sold more than 200000 sets.
(3)IBMPersonal computer, which has played a decisive role in establishing the future of personal computer.
The second wave started from June 1984 to 1987[2]。
At this stage, more and more people use personal computers.Because it is profitable, manufacturers have launched a variety of products with different brands and functions.For a while, personal computers appeared on the market with a wide variety, dazzling;However, the supply exceeds the demand, and users feel confused and at a loss.At this stagecomputer technologyThere is no clear direction. Different operating systems and network designs make it difficult for personal computers to connect with each other and many programs are incompatible.At this time, many large companies began to reconsider the development strategy of personal computers.Many executives believe that the functions that personal computers should have are actually beyond their capabilities.Personal computers have been put to the test again in front of users. As a result of mass production, manufacturers' profits have declined. At the same time, users have gradually learned that the ability of personal computers is actually limited.As a result, both manufacturers and users were dissatisfied. At this time, some visionary manufacturers began to propose to establish industrial standards for personal computers.This standard makes different types of personal computers compatible, which guarantees their development and promotion[2]。
SectionThree wavesNew functions and uses of personal computers in:
1. LAN
Enable personal computers to link to each other through the network.EthernetStandardization of(IEEE 802.3)It is a milestone of computer Internet, and personal computers canHubEstablish a connection with each other.LAN in eachLarge institutionsAnd enterprise network construction is a very important link.And the local area network itself has already expanded into the global Internet.
E-mail was a revolution in communication at that time, and users would feel that it was convenient and attractive.These factors will make e-mail more popular.
Personal computers already have sufficient image processing capabilities.Better peripherals are available - such asColor printer, display, etc.More powerful applications have emerged:electronic publishingApplication, multimedia processing software.
operating system
Announce
edit
Windows
WindowsThe system is simple, intuitive and easy to use, so it is loved by many users.[3]
DOS
DOSIt's the United StatesMicrosoftIssued by the CompanyDisk Operating System。An operating system is a group of systematic programs that manage and control computer resources.It manages and uses disk information on a file basis.From 1981 to 1995, DOSIBM PCCompatible computerIt plays an important role in the market.[3]
LinuxThe operating system is a modern operating system designed according to the MINIX operating system. It was born on October 5, 1991.Later, with the help of the Internet and the joint efforts of computer enthusiasts around the world, it has become the most used type in the worldUNIX operating system。[3]
system safety
Announce
edit
Botnet
BotnetIt refers to that hackers write control programs similar to trojans through certain computer expertise, and then use computersNetwork virusAnd other forms to spread it, so as to achieve maliciousAttackerThe purpose of.Hackers use their own computer technology to indirectly control different servers, so that botnet programs canComputer serverCarry out infection and attack, and finally achieve the purpose of centralized attack on a network.In addition, the number of computer groups controlled by hackers often exceeds our imagination, so hackers are also very leisurely to steal and send information to the botnets that have been controlledJunk informationAnd software, or even fake networks.[4]
Phishing website
Phishing refers to hackers sending spam or email via botnets through a large number of virtual hypothetical banks and other well-known institutional websites. Once users open the information or email, hackers canhidden information Stealing, such as bank passwords, network accounts or credit cards, for in-depth attacks.Phishing websiteWhen it is important to entice users to open the hypothesized email or information, and then connect it to the official account or website designed by the hacker to obtain the personal basic information and personal information of individual usersSensitive informationAnd then fake the victim to break the lawTrading behaviorAnd gain benefits from it.[4]
Viruses
Malicious program code includes botnetsspyware、Trojan programAnd other program contents.It can artificially write computer attack programsMalwareThreaten and invade the Internet information system.Therefore, the computertechnical study Personnel should use the code research of malicious programs to fully understand the means of hacker intrusion in a timely manner, so as to provide personal computers withsystem safety Scientific advice on threats.[4]
risk-prevention
Announce
edit
Timely carry out relevant workData backup, use the firewall correctly
Perfect and accurate computer systems should be established for both personal computers and enterprise computer clustersSafety awareness。In recent years, with thecomputer virusThe continuous upgrading of and the increase of categories.In order to effectively protect the data and personal information stored in personal computers, genuine computer firewall software and genuine anti-virus software should be installed accordingly, and regularanti-virus softwareUpdate.In the face of the diversification of computer anti-virus software, it is necessary to identify it correctly, and compare the corresponding monitoring files and software killing monitoring products in real time.In addition, on thedata fileWhen storing dataReal time monitoring, ensure that the data file does notVirus invasionTo effectively ensure that the virus is processed and cleared before attacking the computer.[4]
Properly configure the computer system
Through the analysis of hackers, we know that, generally speaking, hackers attack computers in a fraudulent way, and then implant them into personal users' computersVirusesOr attack them to control themUser hostOr arbitrageprivacyThe purpose of.Therefore, personal users should adopt certainSafety measuresKnow more about computer systemSecurity precautionsAnd maintenance measuresGuaranteed onNormal use of personal computing under secure network conditions.[4]
personal computerSystem installationThe correct way is to do a good job in the basic work steps of computing security.First of all, we should avoid selecting GHOS systems in different types of websites, try to purchase the relevant software of the genuine and new versions of the computer system, format the hard disk as the first step when installing the software, and make the computer disconnected when installing the software, so as to minimize the chance of viruses invading the computer.After that, set the user password and set a daily common account accordinglysystem safety After completion, the computer shall be timelynetwork connectionsAnd then fix the system vulnerabilities and patches in a timely manner.[4]
Not all security risks must be controlled by technical means. In fact, many computer information problems can be artificially prevented.This requires computer users to improve their awareness of information security and do the following when using computers at ordinary times: First, pay attention to the setting of private passwords to prevent others from stealing or changing important information in the computer;Second, do not click on unfamiliar links or log on unknown websites to prevent viruses from taking advantage of the opportunity to invade;Third, throughCloud diskBackup measures shall be taken in such ways as backup, so that data loss can be avoided even if there is an error in the computer system.[5]
Improve the comprehensive quality and ability of computer management personnel
Enterprises or relevant government departments should standardize the work of computer network and organize staff to participate in computer network regularlytraining course Improve the ability of staff to deal with hidden dangers of computer network security, ensure that each staff member can master relevant operations skillfully, and avoid technical mistakes.In addition, the positions of management personnel should be reasonably planned to form a clear division of labor system. Computers in different fieldsNetwork information securityAssign the responsibility to different positions to reach a coordinatedmanagement model 。[5]
Use questions
Announce
edit
Problem introduction
With the rapid development of science and technology, electronic products are widely used in life and work, especially in work, most affairs are handled by computers.[6]
However, in the process of computer use, there will also be a variety of problems, such as failure to start, abnormal display, data loss, file damage, etc., which has brought many unnecessary losses to users.Therefore, understanding the common problems and failures of the computer can not only better use and extend the life of the computer, but also achieveRoutine maintenanceAnd information storage.[6]
The following will analyze and introduce the common problems in the use of the computer, and propose simpleresolvent。[6]
a main boardThe BIOS stores important hardware data. At the same time, the BIOS is also a vulnerable part of the motherboard, which is vulnerable to damage. Once damaged, the system will fail to run, and there will be no display when the system is turned on. This kind of failure usually occurs because the motherboard BIOS isCIH virusDamage (of course, it does not rule out that the system cannot run due to the failure of the motherboard itself).If the BIOS on the motherboard is damaged, you can plug in the ISA graphics card to check whether there is a display (if there is a prompt, you can follow the prompt steps). If there is noStartup screen, the user can create an automatic BIOS updatefloppy disk, refresh BIOS again, but some motherboardsBIOSAfter being destroyed,floppy disk driveUnable to work. At this time, you can tryHot plug(As long as the BIOS is the same, it can be successfully performed on motherboards of the same level).However, hot plug may cause damage to some components of the motherboard in addition to requiring the same BIOS, so the reliable method is to useCoderWrite the BIOS update file into the BIOS.[6]
CMOSThe settings cannot be saved becauseBackup battery If the voltage is insufficient, replace it to solve the problem.If the problem still cannot be solved after replacing the battery on the main board, there are two possibilities: one is that there is a problem with the circuit on the main board, which needs to be solved by professional maintenance personnel;Second, there is a problem with the CMOS jumper on the motherboard. Sometimes, the CMOS jumper on the motherboard is set to the clear option by mistake or set to an external battery, which also makes the CMOS data unable to be saved.[6]
In addition, improper CMOS settings may cause other problems, such as installation or startupWindowsThe mouse is not available when.Set in CMOSPower managementThere is a modem use in the columnIRQItem, the options are 3, 4, 5..., NA, generalDefault OptionsIf it is 3, set it to an interrupt item other than 3.For another example, if a crash occurs in CMOS, it is generally caused by a problem with the mainboard or CPU. If the mainboard cache has a problem or the mainboard design has poor heat dissipation, touch it after the crashCPUIt is found that the temperature of the surrounding main board components is too high.After replacing the high-power fan, the crash fault was solved.For faults with cache problems, you can enter the CMOS settings. After disabling the cache, the problem can be solved successfully. However, the computer speed will be affected to some extent after disabling the cache.Another example is the non display problem caused by CMOS settings,Jumper free motherboardSet in CMOSCPU frequencyIf not, it will cause no display fault. For this, check the motherboardExpansion slotOr clear CMOS to solve the problem.The jumper for clearing CMOS is usually near the lithium battery on the motherboard, and its default position is usually 1 or 2 short circuit. You can solve the problem by changing it to 2 or 3 short circuit for a few seconds. If the user cannot find the jumper on the old motherboard, just remove the battery, turn it off after the power on display enters the CMOS settings, and reinstall the battery to discharge CMOS.[6]
Memory
MemoryIt is one of the important components in the computer, and it is a bridge to communicate with the CPU.Memory is also called internal memory, which is used to temporarily store the calculation data in the CPU, as well as the hard disk, etcExternal memoryData exchanged.As long as the computer is running, the CPU will transfer the data to the memory for calculation. When the calculation is completed, the CPU will transfer the results. The operation of the memory also determines the computer'sstable operation 。Memory is created byMemory chip, circuit boardGoldfingerAnd other parts.[6]
Computer failures due to memory are mainly divided into the following aspects:[6]
No display after startup
This kind of failure usually occurs becauseMemory moduleAnd mainboardMemory socketpoor contactThe problem can be solved by rubbing the golden finger with an eraser back and forth (do not clean it with alcohol, etc.). It can also be caused by memory damage or a problem with the motherboard memory slot.[6]
This kind of failure is generally caused by the incompatibility between the motherboard and the memory module or the poor quality of the memory module. It is common for the memory with high frequency to be used on some motherboards that do not support memory modules with this frequency. You can try to reduce the memory reading speed in the CMOS settings to solve this problem. If not, you can only replace the memory module.[6]
Random crash fault
It is generally caused by the use of several memory modules with different chips and the time difference caused by the different speed of each memory modulecrash, which can be reduced in CMOS settingsMemory speedOtherwise, only the memory of the same model can be used.Another possibility is that the memory module is not compatible with the motherboard, which is generally rare. In addition, it may be that the poor contact between the memory module and the motherboard causes a random computer crash.[6]
Graphics card
Graphics cardThe full name of the display interface card, also known as the display configuration card, is one of the most basic components of the computer.The purpose of the graphics card is tocomputer systemThe required display information is converted and driven.[6]
The computer failures caused by the graphics card are mainly divided into the following aspects:[6]
No display after startup
This kind of failure is generally caused by poor contact between the graphics card and the motherboard or a problem with the motherboard slot.For someintegrated graphics Motherboard, ifVideo memoryshareMain memory, you should pay attention to the location of the memory module. Generally, a memory module should be inserted in the first memory module slot.There is no display fault when the computer is turned on due to the graphics card, and one long or two short messages will be sent after the computer is turned onBeep。[6]
This kind of failure is generally caused by the monitor or graphics card does not support high resolution.blurred screenYou can switch the startup mode to the safe mode, and then enter the display settings "Application" and "OK", and click and button in the 16 color state.Restart, in the systemNormal modeDelete the video cardDriver, restart the computer.[6]
Color display is abnormal
Such failures generally have the following reasons: ①Display cardAnd displayThe signal linePoor contact; ②Display failure; ③In some softwareRuntimeThe color is abnormal, which is commonly found in old computers. There is an option to verify the color in the BIOS, which can be turned on; ④The video card is damaged; ⑤The display is magnetized. This phenomenon is generally caused by the excessive proximity to objects with magnetic properties. After magnetization, the display screen may deflect.[6]
Crash or abnormal miscellaneous spots on the screen
Such failures are generally caused by problems with the video memory of the video card or poor contact between the video card and the motherboard;Incompatibility between the graphics card and other expansion cards may also cause a crash.Cleaning is generally requiredGold finger of graphics cardPosition or replace the graphics card.[6]
Hard disk
Hard disk is one of the main storage media of computer, which is composed of one or more aluminum or glass discs.These discs are covered with ironmagnetic material 。Most hard disks are fixed and arePermanentThe ground seal is fixed atHard driveMedium.[6]
The hard disk is the software warehouse responsible for storing data. If the failure of the hard disk is not handled properly, the system cannot be started and data is lost. The common failures of the hard disk mainly include the following aspects:[6]
The system does not recognize the hard disk
The system cannot be started from the hard disk. Use theautomatic monitoring The feature cannot find the existence of the hard disk.This kind of failure mostly occurs in the hard disk power cable orIDEPort/SATAportdata interface The hard disk itself is unlikely to fail. You can conduct replacement tests by reinserting the hard disk cable or changing the data interface and cable, and you will soon find the fault.[6]
Most of the hard disks have bad tracksLogical badness, can be repaired.Once used“SCANDISK”When scanning the hard disk, if the program prompts that there is a bad track, first use the self inspection program of each brand of hard disk again to conduct a full scan.However, fast scanning is not an option because it can only detect about 90% of the problems.If the check result is "successfully repaired", it can be determined that it is a logical bad track. Just reformat the hard disk.[6]
Generally speaking, the capacity of the hard disk after formatting will be less than the nominal value, but the gap will never exceed 20%. If the gap between the two is very large, you should enter BIOS settings when starting up.Make reasonable settings according to the hard disk.If it still cannot be solved, it may be the computera main boardLarge capacity hard disks are not supported. At this time, you can try to download the latest motherboard BIOS and refresh it.This kind of failure often occurs when a large capacity hard disk is paired with an older motherboard.In addition, confusion in BIOS settings due to sudden power failure and other reasons may also lead to this failure.[6]
In short, in the process of computer use, in the face of various possible failures, only by finding out the cause of the problem from the source and taking appropriate methods to deal with it, can we avoid unnecessary losses such as data damage and loss caused by blind operation, so that computers can bring more convenience and comfort to our life and work.[6]
Software and hardware maintenance
Announce
edit
hardware component
The probability of hardware failure during the use of computers is very high and complex, such as:Black screenPhenomenon, no display when starting.Frequent alarms and frequent crashes, etc.These phenomena are actually caused by hardware failures.[7]
Methods to follow in case of computer hardware failure
(1) Peripherals first, then hosts: Since it is easy to find and remove faults on peripherals, we first check the mouse, keyboard, monitor, etc. according to the error information on the systemperipheralAnd working conditions.After exclusion, consider the complex host part.[7]
(2) Power supply before components: power supply is easy to be ignored by users, generallyPower supplyNot enough. Abnormal output current can easily lead to some failures. Many times, users have checked the motherboard, graphics card, and hard disk, but still can't find the cause. But they don't know that this is the power supply.[7]
(3) First simple then complex: When the microcomputer fails, first check the simplest reason.In many cases, the fault is caused by loose data lines, excessive dust, and card insertionpoor contactAnd so on.After the simple method test, consider whether it is the same problem of hardware damage.[7]
Troubleshooting method
PluggingSubstitution method: Plug and replace is the most original method.Is also the mostDirect effectA method of.The plug and replace method is very simple.First of all, according to the problem on the computer, we generally doubt where the problem is.For example, on the display, video card, hard disk, keyboard... of a microcomputer, remove the suspect object and install it on another good microcomputer. If another microcomputer fails to work, you can directly know that the object is faulty.If there is no problem, continue to doubt and replace, and eventually find the problem object.[7]
Direct observation: The direct observation method is based on the alarm sound of BIOS,POSTInformation to determine hardware failure.Troubleshoot according to various sounds and instructions.For example, when self inspection shows that there is a problem with one of the hard disks, you can check thedata lineandpower cordCheck for looseness.When problems are displayed.Check the monitor and video card andVGA interface。EraseCheck whether there is dust on the interfaceBroken needleAnd so on.[7]
Detect with special diagnostic software: diagnostic software is a special hardware faultInspection toolsIt can help quickly find out the cause of the fault.E.g. Norton Tools(Nortonhold-all)。This diagnostic software can not only check the internal components of the whole system (such asCPU, memory, motherboard, hard disk, etc.If the same question is found, detailed report information will be given to facilitate our searchCause of faultAnd troubleshooting.[7]
System minimization check: The principle of system minimization check is very similar to the plug and replace method.Is to adoptMinimum systemLet's diagnose one by one.For example, only install CPU, memory, graphics card and motherboard.If it does not work normally after startup.Then check the four parts by plugging and replacing them. If they work normally, connect the hard disk and then the monitor.And so on until the fault is found.[7]
Software
The software is mainly divided into two parts: system software and application software. When users use system software, such as XP/2000 system, there will be manyJunk FilesIt may occupy system space, or hinder daily system operationSlowerEven the system cannot work.In the process of using application software, many application software will appear inexplicable system conflicts in the system after installation, and some normal functions will also appear abnormal after permanent, which is inevitable.[7]
Generally speaking, the questions appearing in software can be classified into the following categories:
(1) Failure caused by incompatibility between software and system.The version of the software is incompatible with the running environment configuration, resulting in failure to run, system crash, changes and loss of some files, etc.[7]
(2) Faults caused by software conflicts.Of two or more software and programsOperating environment, access area, work address, etc. conflict, resulting in system chaos, file loss and other failures.[7]
(3) Malfunctions caused by misoperation are divided into command misoperation andsoftware program Running misoperation, executing commands that should not be used, selecting operations that should not be used, running some destructive programs, incorrect or incompatibleDiagnostic procedures. Disk making procedure and performanceTest procedureAnd so on,Disk formatwait.[7]
(4)computer virusCausing malaria.Computer viruses will greatly interfere with and affect the use of computersComputer storageOur data and information are damaged, or even lost, and will infect other computers.Most computer viruses can be hidden like time bombs waiting to attack.[7]
(5) Incorrectsystem configurationFault caused by.There are three types of system configuration failures, namely, basic system startupCMOS chipConfigurationsystem bootFor the system command configuration of process configuration, if the parameters and settings of these configurations are incorrect or not set, the microcomputer may not work and cause operation troubleshooting.MicrocomputerSoft faultGenerally, it can be recovered, but in some casesSoftware failureIt can also be converted into hardware failure.[7]