Friday, August 29, 2008

MEMORY ROM, RAM, and PACKAGING


ROM | RAM | CACHE | MEMORY CHIP PACKAGING | DOS & WINDOWS 95 MEMORY BREAKDOWN | VIRTUAL MEMORY


PHYSICAL MEMORY

Memory management at the hardware level is concerned with the electronic devices that actually store data. There are basically two types of physical memory: ROM and RAM. Different variations of physical memory are used for system RAM, cache RAM, system ROM memory, BIOS ROM/Flash BIOS ROM, CMOS, keyboard controller, bus system RAM, and expansion card RAM, etc.

1. ROM (Read Only Memory) Chipset

Function - ROM chips contain permanently stored information. It is NONVOLATILE, in that the information remains stored regardless of what electrical current passes through it. ROM is where the basic instructions the computer needs for operation is stored. These instructions include moving data in and out of RAM for processing, storing data permanently on magnetic media, displaying information on a screen, and interpreting commands typed on a keyboard.

It also performs a series of tests when the computer is turned on, to determine if the computer is functioning properly. The part of the ROM called the ROM BIOS (basic input/output system) is what starts a computer. It allows the microprocessor to control data between the RAM and the input/output devices such as the keyboard, monitor, printer, modem, and disk drives.

  • BIOS (Basic Input Output System): Most PC systems display a system configuration screen when the computer is turned on. This is the BIOS reporting what it sees to the computer. The information contains the CPU type, Co-Processor, CPU clock speed, base memory, cache memory, drive capabilities, monitor, and COM ports. The BIOS is an instruction set. The BIOS resides on one or more chips in the motherboard.

There are different types of ROM:

    • Programmable ROM(PROM). This is basically a blank ROM chip that can be written to, but only once. It is much like a CD-R drive that burns the data into the CD. Some companies use special machinery to write PROMs for special purposes.
    • Erasable Programmable ROM (EPROM). This is just like PROM, except that you can erase the ROM by shining a special ultra-violet light into a sensor atop the ROM chip for a certain amount of time. Doing this wipes the data out, allowing it to be rewritten.
    • Electrically Erasable Programmable ROM (EEPROM). Also called flash BIOS. This ROM can be rewritten through the use of a special software program. Flash BIOS operates this way, allowing users to upgrade their BIOS. BIOS is a chipset to which the BIOS manufacturer has written a program code with software known as firmware.

· The motherboard manufacturer determines the type of BIOS chipset on the motherboard. Some BIOS manufacturers are Award, Phoenix Technologies, AMI (American Magatrends, Micro Firmware Inc., TTi Technologies, etc. You can easily see the manufacturer's name labeled on the BIOS chipset.

Since the newer BIOS chips are flash programmable, you can upgrade the BIOS by running a program that changes the BIOS's internal program code. Other BIOS chips need to be entirely replaced when upgrading. NOTE: The BIOS chip must be upgraded when the BIOS code no longer supports any new devices you add during upgrading.

When your computer starts up, if there is some internal problem your computer will send out beeps to indicate what is wrong. The number and duration of the beeps depending on your BIOS chip determines what that message means.

2. RAM (Read Access Memory) Chipset

About RAM

Function: RAM is the main and "short term memory" of the computer. RAM chips store data in rows and columns in an array of transistors and capacitors and use a memory-controller circuit to retrieve information located at specific addresses. The chips must be constantly refreshed with electrical pulses to keep the charges current. In RAM, data is stored as the presence or absence of an electronic charge within a series of microchips called RAM or memory chips. When you turn your computer off, anything that is contained in RAM disappears. Thus RAM is VOLATILE since it's data can be erased.

To talk about RAM we must know our bits and bytes.

There are two main types of RAM: DRAM (Dynamic RAM) and SRAM (Static RAM). Both are VOLATILE. RAM comes in module packaging of SIMMs and DIMMs. Remember SIMMs and DIMMs are not memory chips. They are packaging modules.

1. DRAM typically has access times of 50 to 70 nanoseconds (ns) and it is what makes up the bulk of the system memory in most systems. DRAM is slower and less expensive but needs to be refreshed often or data is just lost. It is often referred to as "main memory". RAM comes in module packaging of SIMMs and DIMMs. SIMMs and DIMMs are not memory chips. They are modules.

Types of DRAM Chips

o DRAM (Dynamic Real Access Memory: DRAM consists of micro capacitors, while SRAM consists of off/on switches. Therefore, SRAM can respond much faster than DRAM.

o Fast Page Mode (FPM) DRAM: FPM was the traditional RAM for PC's, before the EDO was introduced. It is mounted in SIMM modules of 2, 4, 8, 16, or 32 MB. Typically, it is found in 60 ns or 70 ns versions. 60 ns is the fastest and the one to use. You cannot mix different speeds on the same Pentium mainboard.

o EDRAM (Enhanced DRAM)

o EDO DRAM Memory (Extended Data Output). 72 pin SIMM configuration. EDO memory should say EDO right on the chip. EDO RAM are usually sold in 60 ns versions. EDO memory is faster becuase it doesn't produce as many wait states before holding anew electrical charge.(from What Is EDO DRAM Memory?)

o SYNCHRONOUS DRAM (SDRAM). SDRAM is the developing new standard for PC memory. Its speed is synchronous, meaning that it is directly dependent on the clock speed of the entire system. It works at the same speed as the system bus, up to 100MHz. This means that the memory must be fast enough to work on the system you intend to put it on. SDRAM is the newest RAM type for PC's. It comes only in 64 bit modules (long 168 pin DIMM's). SDRAM has a access time of only 8-12 ns. The performance improvement over EDO RAM is only 5 percent running at 66 MHz, but at 100 MHz it will prove a lot better.

SDRAM speed is critical to your system's operation. If it is not fast enough, it doesn't simply slow your system down, but also makes it unstable. A 100 Mhz. bus must be supported with SDRAM that qualifies as PC100, a standard assuring that the memory is fast enough, and a 133 Mhz. bus requires PC133 SDRAM.

o RAMBUS RAM (RDRAM): RAMBUS is a future RAM type. Intel and others have great expectations from this type. RDRAM will have a bus speed of 600mhz vs. SDRAM of 100mhz.

2. SRAM is faster with a typical assess time of nanoseconds. It is more expensive and can only store a quarter of the data that DRAM is able to in the same given area, however data will remain stored as long as power is on. SRAM can have an access time as low as 10 nanoseconds. FAST SRAM can be found in most CPU's, in memory cache, on graphic/video cards, and on credit-card memory cards. Cache Memory is SRAM.

Types of SRAM Chips

o SRAM (Static Read Access Memory)

o VRAM (Video Read Access Memory): This is RAM optimized for graphics cards. VRAM and WRAM are both dual-ported memories that allow the microprocessor to draw into memory two chips at the same time. VRAM chips are larger tham DRAM and can boost video performance by 60%.

o WRAM (Windows Ram): makes it easier to allow blocks or windows of memory to be addressed with just a few commands.

Further Information:

o "The RAM Guide", Tom's Hardware Guide (detailed)

o More Detail about RAM Memory

o A RAM Guide

o RAM Memory Guide

o Memory Types

o RAM Guide


Installation: On modern system boards, RAM is installed on SIMM or DIMM modules. Before, small individual DRAM's were used. There was usually room for 36 small chips on the system board. That made it cumbersome to install new RAM. Then, someone figured out to install RAM chips on cards, which are easily installed. First came the SIPP modules. They had multiple pins, which fit in the mainboard. Since came the SIMM modules. They are mounted on a card, which has an edge connector. They fit in sockets on the mainboard, and anyone can install them.

Do not mix different types of SIMM's within the memory bank. The system will fail to boot or fail to recognize how much RAM you really have. You can occassionally substitute a SIMM with a different speed, only if the replacement is equal to or faster than the replaced module.


Cache Memory (Pronouced CASH)

CPU Cache Ram

CACHE MEMORY is SRAM. It is a high speed memory that speeds up the processing of memory to the CPU. It attempts to predict what instruction is about to be used.

It is a bridge between the CPU and slower main memory. Cache is available in two different types, asynchronous and synchronous. Asynchronous cache is not synchronized with the processor. This means the processor has to wait for the data in cache to be ready before it can be retrieved. Synchronous cache is synchronized with the processor, and therefore there is no delay between the cache and the processor. In general the difference would be very hard to notice, but go with synchronous if you have the choice.


NOTE: SMARTDRIVE.SYS and SMARTDRIVE.EXE are DOS program utilities that provide disk caching. The efficiency of cache is reported as hit ratio. To send an efficiency report to the screen, type the command SMARTDRIVE /S from the DOS command prompt.


10. Primary Cache(L1, Level 1 Cache): internal cache located inside the CPU chip.

11. Secondary Cache(L2, Level 2 Cache): external cache located on the motherboard. It is usually soldered on the motherboard near the processor or in the form of a cache module in a socket near the processor. It is installed in sizes of 256K and 512K. From the Pentium II on, secondary cache(L2) is located on the processor itself.

Further Information:

System Cache: Don't miss this section!

§ Role of Cache in the PC

§ "Layers" of Cache

§ Function and Operation of the System Cache

§ Cache Characteristics

§ Cache Transfer Technologies and Timing

§ Cache Structure and Packaging

MEMORY CHIP PACKAGING


A memory chip is a small piece of semiconducting silicon on which an integrated circuit containing millions of transistors is imbedded. Memory Chips come in different forms of packaging.

1. Processor Packaging

o DIP (Dual Line Package): has legs, evenly divided in 2 rows. Form of processor and other IC chipsets.

Processors: 8088. 8086, 8026.

o PGA (Pin-grid Array): has pins arranged in concentric squares. PGA chips are good for chips that have many pins, such as the CPU. PGA (Pin Grid Array)memory is used by processors that are placed in a ZIF (Zero Insertion Force) socket. Installing a CPU in a ZIF socket.

Processors: 80286, 80386, 80486.

o SPGA (Staggered Pin Grid Array) : have pins organized in a diagonal pattern. Pins can be more closely packed together.

Processors: Pentium, K5, K6, 6086.

o PQEP/CQEP (Plastic/Ceramic Quad Flat Pack): small size for laptop machines Inserted in a special mount called a carrier ring.

o PLCC/CLOCC (Plastic/Ceramic Leaderless Chip Carrier). No Lead pins. Designed for upgradability.

Processor: 80826, 80386.

o SEC (Single Edge Contact): SEC is a new packaging that was created for the Intel Pentium II. It is a move away from the single-chip-style packaging that Intel has used for all of its processors up to the Pentium Pro. With the creation of the Pentium II processor, Intel moved the secondary cache off-chip, but wanted to be able to maintain a special high-speed connection between it and the actual processor. To do this, they decided to not sell the Pentium II as a separate chip, but rather as an integrated package with the level 2 cache.

The processor is mounted with a proprietary connector on its edge. The level 2 cache is also mounted onto the chipset, which goes into the socket 1 slot on the motherboard.


This is used in the latest Pentium II chipset.

For Further Information:

§ What is SEC Packaging?

§ Installation of SEC

§ SEC Components

RAM Packaging

o DIPP (Dual InLine Pin Package): has legs, evenly divided in 2 rows. Dip chips were fragile. Difficult to insert because of legs.

In the 80's RAM DIPPs were soldered on the board. These RAM DIPP chips were 1 bit wide. 8 bits make a byte. RAM in a computer needed to 8 bits wide to make a bank A bank is a row of chips. To reach 1 MB of RAM, 8 DIPP chips of RAM were placed in a bank, i.e., in a row aside of each other. A bank must be completely filled or not populated. In a bank the same kind of RAM must be used.

Older RAM had sizes 64K X 1 or 256K X 1. The 1 equals 1 bit wide. Thus 8-bit wide RAM = eight 64K X 1 chips in a bank or eight 256K X 1 chips in a bank. Of course this only equaled 64 or 264 kilobytes of RAM.

Sample:
256 256 256 256 256 256 256 256 = 8 bit RAM = 256 kilobytes of RAM
64 64 64 64 64 64 64 64 = 8 bit RAM = 64 kilobytes of RAM.

You can use multiple rows of RAM to create byte-wide memory. Chips in each row must be the same. But chips in different rows can be different.

Sample:
256 256 256 256 256 256 256 256
256 256 256 256 256 256 256 256 = 2 rows of 8 bits = 512 kilobytes of memory.

256 256 256 256 256 256 256 256
64 64 64 64 64 64 64 64 = 2 rows of 8 bits = 320 kilobytes of memory.

o SIPP (Single Inline Pin Package): one row of legs in a straight line like a comb. The legs of these chips were difficult to insert and the SIPP RAM chip did not last long. SIPPS came in 30-pins just as SIMMS.

o ZIP (ZigZag Inline Package): a ZIP is a DIP package that has its legs on one edge in a zigzag pattern.

o SIMM (Single Inline Memory Module): A SIMM consists of several memory chips mounted on a small circuit board that is placed in a socket on the motherboard. A spring clip on the motherboard holds the SIMMs.

§ 30-pin SIMMS: Older computers used 30 pin SIMMS (8-bit wide path). One row or bank of 30-pin SIMMS = 8 bits of data transfer or an 8-bit path, 2 banks = 16-bit path, 3 banks = 24-bit path, 4 banks = 32-bit path.

How many SIMMS does a computer need? The rule of thumb is

The width of the external bus
the width of the SIMM

286 computers had a 8-bit and 16-bit path; 386's and 486's used a 32-bit path. A 486 then would need 32/8 or 4 30-pin SIMMS to make a bank.

How many banks would accomodate the new pentiums that required a 64-bit path. 64/8 = 8 banks. Imagine 1 full bank = 8 30-pin SIMMS on a motherboard and this equaled 1 MB of memory. Adding more memory would take so much motherboard space that 72-pin SIMMS were created.

30-pin SIMMS can in a variety of configurations.

If you say...
2 4-bit chips + 1 1-bit chip X 3 = 1 30-pin SIMM/parity

30 Pin SIMMs


8 1-bit chips X 8 = 1 30-pin SIMM/without parity
9 1 bit chips X 9 = 1 30-pin SIMM/parity
...you are still talking about 30-pin SIMMS.

IF you see ...X 3, X 9, X 8, you are talking about 30-pin SIMMS.

§ Newer computers use 72 pin SIMMS. 72 pin SIMMs have a 32-bit path(32/8 = 4 MB RAM). Unlike the 30-pin SIMM, they have a notch in the middle to help with insertion and are about an inch longer.

If you see X 32 = non parity; X 36 = with parity. Here you are talking about 72-pin SIMMS.

1 X 32 = 4 MB/no parity




72 Pin SIMMs




1 X 36 = 4 MB/parity
2 X 32 = 8 MB/no parity
2 X 36 = 8 MB/parity
4 X 32 = 16 MB/no parity
4 X 36 = 16 MB/parity
8 X 32 = 32 MB/mo parity
8 X 36 = 32 MB/parity
16 X 32 = 64 MB/no parity
16 X 36 = 64 MB/parity

The number -100. -80. -70, -60, -50 found on the chip gives its access speed in nanoseconds. The lower the number the faster the chip.

Pins in the upper right corner of SIMMS may have jumpers installed on them. Determine the size and speed of the SIMM based on the configuration of those jumpers.

1. DIMM (Dual Inline Memory Module): The DIMM is a newer designed memory module. It has 168 pins and provides a 64-bit memory pathway. While SIMMs need to be placed in their sockets in sets of two, a pentium processor that has a 64-bit path of memory can use one DIMM at a time, ie., 64/64 = 1.

1 X 64 = 8 MB


What kid of DIMM does your computer have? See the DIMM Keying Methodology

1. SO-DIMM: 72 pins, shorter than DIMMS for laptops. Wider in look.

2. MMO (Mobile Module): This is mobile module packaging, which actually incorporates the processor, secondary cache, and chipset into a small module. It looks like a motherboard but it isn't.


MEMORY DIAGNOSTICS When a PC powers up on a cold boot. Memory integrity is one of the first things tested. Memory integrity can be checked in two ways: parity checking and ECC checking.

3. PARITY vs. NON-PARITY: Memory modules have traditionally been available in non-parity and parity types. (Actually, some sizes and styles are only available in non-parity, but most are available either way.)

o Non-parity is "regular" memory. It contains exactly one bit of memory for every bit of data to be stored. 8 bits are used to store each byte of data.

o Parity memory adds an extra single bit for every eight bits of data, used only for error detection and correction. 9 bits of data are used to store each byte. The extra bit is either set to 1 or 0, depending on whether the byte is made up of an even or odd number of 0's and 1's.

Parity checking is a rudimentary method of detecting simple, single-bit errors in a memory system. It in fact has been present in PCs since the original IBM PC in 1981, and until the early 1990s was used in every PC sold on the market.

ECC Checking: There is also an advanced form of error detection and correction called ECC on Pentium class or later systems that support it. Parity memory uses 12.5% more DRAM memory than non-parity (1 bit extra for every 8) which makes it more expensive, but the major reason that it costs more is simply that it is produced in much smaller quantities today. With processors increasing in speed and more high-end applications coming into prominence on the PC platform, error-checking memory is now again on the increase. At one time, all computers used parity memory. In fact, until well into the fourth generation of PC systems it was impossible to even turn off parity checking on a PC. This changed rapidly, and in a few short years parity went from the default and the standard to the minority in new systems. Most Pentium class systems not only do not use parity memory, most cannot support parity checking (or ECC) at all.

Parity/ECC has made a comeback, particularly in file server systems where integrity is important. In fact, not only is ECC getting renewed interest in memory, Intel has added it to its secondary cache bus on faster Pentium II and III processor modules, due to the need for data integrity with these higher-speed processors.

Most MacIntoshes use nonparity SIMMs (x8, x32), and most PCs use parity SIMMs (x9, x36). However, the recent trend is using non-parity SIMMs on Pentium systems because parity is not required on most 64-bit systems.

How do I know whether or not my SIMMs are parity? Print out and hang up the RULES OF THUMB FOR MEMORY.

Note:

o A 30-pin SIMM has parity checking if it has chips in multiples of 3 (or 9).

o If it has chips in powers of 2 (2, 4, 8, ...) then it has no parity checking.

o 72-pin SIMMs are more difficult to identify visually due to the many different possible chip configurations on SIMMs made by different manufacturers. Generally if they have 4, 8, 16 or 32 chips on them, they have no parity.

For more information on parity and ECC, go to Memory Errors, Detection, and Correction.

Issues to Consider Before Buying RAM


APPLICATION MEMORY MANAGEMENT - WDOS & WINDOWS 95

How the computer uses and allocates memory.

MEMORY BREAKDOWN is how your computer handles memory. The first 640 KB of system memory is conventional memory. This is the area that is available for use by standard DOS programs, along with many drivers, memory-resident programs, and everything that runs under DOS. MEMORY-RESIDENT PROGRAMS (TSR's) refers to DOS programs that remain in memory at all times once they are loaded.

Upper memory (UM) ranges from 640KB to 1 MB. This is the upper 384 KB of the first megabyte of system memory (immediately above conventional memory). It is reserved for use by system devices and for special uses such as ROM shadowing and drivers.

This is the first 64 KB (less 16 bytes) of the second megabyte or extended memory of system memory.

Extended Memory is anything over 1 MB. This is all the memory above the high memory area until the end of system memory. It is used for programs and data when using an operating system running in PROTECTED MODE, such as any version of Windows.

See also the Windows 95 Helpdesk and Memory Allocation at this site.


OPERATING SYSTEM MEMORY - VIRTUAL MEMORY

Virtual memory provides applications with more memory space than allocated in the computer. A technique which operating systems use to load more data into memory than it can hold. Part of the data is kept on disk and is constantly swapped back and forth into system memory. For instance, when your run a CD application.

Virtual memory is available to Macs with a 68030 and 68040 processors and those 68020's that were also equipped with the Motorola 68851 MMU (memory management units). The 68030 and 68040 processors have built in MMU function. Other CPU's cannot use virtual memory.


FURTHER MEMORY INFORMATION:

o Motherboard and BIOS Guides

o MEMORY MODULES FOR SPECIFIC PROCESSORS/COMPUTERS

o The Computer Information Center: Many Links to keep informed about chips.

o "Installing Memory", The-Hand-Me-Down PC




Thursday, August 28, 2008

Ad-Aware 2008 Free Available for Download


THE NEW VERSION of Lavasoft’s flagship antispyware application, Ad-Aware 2008 free, aims to supplement your existing antivirus protection by detecting spyware and privacy risk.

The feature –limited free version lacks real-time protection, and it will discover security or privacy threats only when you run a manual scan. The program also doesn’t automatically updated, so before you start a scan , you must click a button on the main window to receive the latest spyware definations.

You can choose either a “smart scan, which focuses on critical parts of your computer, or a full scan that digs in everywhere

Besides scans, you can run a “Track sweep” to clear browsing history, Cache elements,Cookies and other data from Firefox, Internet Explorer, and Opera. You’ll also see options for add-watch, which actively monitors for threats, and references to other tools and plug-ins, but you have to upgrade to plus or pro to use them.

True , your existing antivirus program likely antispyware features of its own. But if you might have spyware on your PC and you want to double check your antivirus program’s assessment, download Ad-aware Free from find.pcworld.com/60901 for an extra spyware and privacy scan.

Friday, August 22, 2008

Get Mobile Reminders in Three Easy Steps


GOOGLE CALENDAR CAN syncs your schedule to blackberry smart phones, but it can also send event notifications to even the dumbest cell phone. In fact, setting up SMS alerts is even easier than configuring Google sync.

Here’s how to get started right now.

1. 1. Log in to Google calendar and click settings at the top of the page. Choose the mobile setup tab from the calendar settings and enter your cell phone number in the “phone Number” field. Choose your cellular carrier from the carrier drop-down list, and then click send verification Code. Now wait for a text message from Google Calendar.

2. 2.When you receive the verification Code via SMS on your phone, type it into the “verification code” field in calendar settings, and click finish setup.

3. 3. Create a new event in Google Calendar. Once you have entered the event details, locate the reminder drop-down menu under options and choose SMS. Select how long before the event you would like to be notified (for example 10 mints.) and then save your event as you normally would. You’ll receive the event reminder on your phone at the specified time.


Send Text Messages From Your Computer

Suppose A Text message arrives on your phone while you’re sitting at your desk. Do you really have to peck out the reply on the phone’s tiny keypad? Not if you know the recipient’s phone number and carrier. Just fire up outlook or any other mail client and compose your reply as you would an ordinary e-mail. The trick lies in knowing the proper way to address the message. Foe Example, e-mail sent to phones on the AT&T network must be formatted as phone-number@txt.att.net. To send email via SMS to a Verizone Customer, use phonenumber@vtext.com. On sprint, use phonenumber@messagingsprintpcs.com. And for T-mobile it’s phonenumber@tmomail.com you can find a more complete list of carriers and their text-message addresses at sms411.net.

If you don’t know the recipient’s carrier or can’t remember all those abbreviated addresses, take this shortcut: send your email to phonenumber@teleflip.com the handy, free Teleflip service does the legwork for you, routing your message to the appropriate carrier. Whatever method you use, keep in mind that replies will come to your email inbox, not your cell phone --which can be a good thing if you are spending the day working at your desk anyhow.

How do I restore Windows if I’ve lost my restore CD?

When WINDOWS Misbehaves and nothing else works, restoring the operating system via your restore CD or hidden hard-drive partition may be your last restore. So what should you do if you can’t find that precious CD?

The first thing to do is to get in touch with your system’s manufacturer and find out its policies. Usually ,some option will be available .I checked with six PC manufacturers ,and five of them(Gateway, HP, Lenovo, micro Electronics and micro Express)will sell you a recovery CD for between $15 and $40(Recovery media may not be available for older systems, however)Also, several companies include software on their machines for creating a new recovery disc.

The sixth PC manufacturer DELL has no stated replacement policy. But you worry that you don’t have a recovery tool and that someday you’ll desperately need one, create your won with a good backup program. The resulting recovery disc is arguably better than a factory issued back up tool, because it will restore a version of Windows that includes all of your personalized settings.

You’ll need a backup program with good disaster-recovery capabilities. Image-based backup programs such as Symatec’s Norton Ghost and Acronis’s True Image do nicely. Partial to Genie backup manager, which doesn’t use images but reliable restores Windows. You may own an image backup app already, such programs come with Vista’s Business, Enterprise and Ultimate editions, with Nero Burning, and with some external hard Drives. The trick is to make a single image or disaster-recovery backup of your drive and then put it aside. You should also create regular daily backups with the same program or another one, but you should keep your recovery backup separate from these, in a place where it won’t be overwritten.

If Windows ever becomes too broken to fix, first restore backup, and then restore your newer data from a recent data backup.

Wednesday, August 20, 2008

Recognizing and Resolving Common Operational

Fixing Boot Errors
If the files that are needed to boot the operating system aren’t present and accounted for, you
will get an error message at boot. But not all files are needed for every boot situation. For
example, if you don’t use a SCSI boot drive, you don’t need the NTBOOTDD.SYS file.
Let’s take a brief look at some common Windows 2000/XP boot errors, what might be
causing them, and how to solve them:
Invalid Boot Disk You get the Invalid boot disk error when the BIOS finds a partition that
could be bootable but is missing the essential system files. You can correct this problem by
reinstalling the OS.
Operating System Not Found This error means exactly what it says. Essentially, the system
BIOS could not find an OS, or even a valid boot partition, on any of the boot devices (floppy,
hard disk, or CD-ROM). You will get this error on a brand-new computer that you have just
built, until you install the OS. Other causes are a corrupted boot sector or boot files.
There are a couple of solutions to the Invalid Boot Disk and Operating System Not Found problems.
First, if the file or files are missing, copy them from the original setup diskettes or CD-ROM,
or copy them from a backup (assuming you have one). The same holds true if you have a corrupt
file, except you must delete the corrupt files first, and then replace them with new copies.
Inaccessible Boot Device If, on bootup, you receive an error that states STOP: 0x0000007B
inaccessible boot device, you may have one of several problems. The most common is that
Windows could not load the driver for the disk controller on the boot device. This could be
because it is the wrong driver or because the disk controller is conflicting with some other
hardware in the system.
Missing NTLDR or Missing or Corrupt NTOSKRNL.EXE As you’ve learned, NTLDR is
relied on heavily during the boot process. If it is missing or corrupted, Windows NT will
not be able to boot, and you’ll get an error similar to Can’t find NTLDR.
On the other hand, if you get an error such as NTOSKRNL.EXE missing or corrupt on
bootup, it may be an error in the BOOT.INI file. This is a common occurrence if you have
improperly used the multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft
Windows XP Professional" syntax for partition entries or had the partition table modified
in a multidisk setup. If these entries are correct, the NTOSKRNL.EXE file may be corrupt or
missing. Boot to a startup disk and replace the file from the setup disks or CD-ROM.

Keystroke shortcuts for Windows XP

General

General Keystrokes
Use this key: To do this:
F1 Get help.
F3 Find file or folder
Windows key or CTRL+Esc Open the Start menu.
Windows key+E Open Windows Explorer.
Windows key+R Open Run dialoge.
Windows key+M Minimise all applications.
Windows key+M Minimise all applications.
Alt+TAB Switch between applications.
Alt+F4 Close current application.
CTRL+C Copy.
CTRL+X Cut.
CTRL+V Paste.
CTRL+Z Undo.
DELETE Delete.
SHIFT+DELETE Delete selected item permanently without placing the item in the Recycle Bin.
CTRL while dragging an item Copy selected item.
CTRL+SHIFT while dragging an item Create shortcut to selected item.
F2 Rename selected item.
CTRL+RIGHT ARROW Move the insertion point to the beginning of the next word.
CTRL+LEFT ARROW Move the insertion point to the beginning of the previous word.
CTRL+DOWN ARROW Move the insertion point to the beginning of the next paragraph.
CTRL+UP ARROW Move the insertion point to the beginning of the previous paragraph.
CTRL+SHIFT with any of the arrow keys Highlight a block of text.
SHIFT with any of the arrow keys Select more than one item in a window or on the desktop, or select text within a document.
CTRL+A Select all.
ALT+ENTER View properties for the selected item.
ALT+F4 Close the active item, or quit the active program.
ALT+SPACEBAR Opens the shortcut menu for the active window.
CTRL+F4 Close the active document in programs that allow you to have multiple documents open simultaneously.
ALT+TAB Switch between open items.
ALT+ESC Cycle through items in the order they were opened.
F4 Display the Address bar list in My Computer or Windows Explorer.
F5 Refresh the active window.
F6 Cycle through screen elements in a window or on the desktop.
SHIFT+F10 Display the shortcut menu for the selected item.
ALT+SPACEBAR Display the System menu for the active window.
CTRL+ESC Display the Start menu.
ALT+Underlined letter in a menu name Display the corresponding menu.
Underlined letter in a command name on an open menu Carry out the corresponding command.
F10 Activate the menu bar in the active program.
RIGHT ARROW Open the next menu to the right, or open a submenu.
LEFT ARROW Open the next menu to the left, or close a submenu.
BACKSPACE View the folder one level up in My Computer or Windows Explorer.
ESC Cancel the current task.
SHIFT when you insert a CD into the CD-ROM drive Prevent the CD from automatically playing.

Sunday, August 17, 2008

Identifying Windows File Realeted Problems

The first set of specific Windows problems we’ll discuss are those that can be traced to missing,
corrupt, or misconfigured files. These issues can cause consternation to no end because they
can be troublesome to fix. Thankfully, the error message usually gives an indication of which
file is the problem.
In this section, you will learn about some of the various file-related problems that can
occur in Windows, as well as their solutions. These problems can be categorized into four
main areas:
System files not found
Configuration file issues
Swap file issues
Boot issues
Because the most easily fixed problems are related to missing system files, that’s the next
topic we’ll cover.

System Files Not Found
Every operating system or operating environment has certain key system files that must be
present in order for it to function. If these files are missing or corrupt, the OS will cease to function
properly. Files can be deleted by accident rather easily, so it’s important to know what
these system files are, where they are located, and how to replace them.
When you boot, the presence of the system files is checked, and each file is loaded. If you
remember, the computer’s BIOS first checks the PC’s hardware and then looks for a boot sector
on one of the disks and loads the OS found in that boot sector. However, if the computer
can’t find a boot sector with an OS installed on any of the disks, it displays an error similar
to the following:
No operating system found
This error means the computer’s BIOS checked all the drives it knew about and couldn’t find
any disk with a bootable sector. This could be due to any number of reasons, including these:
An operating system wasn’t installed.
The boot sector has been corrupted.
The boot files have been corrupted.
Thankfully, there are a couple of solutions to these problems. First, if the file or files
are missing, copy them from the original setup diskettes or CD-ROM, or copy them from a
backup (assuming you have one). The same holds true if you have a corrupt file, except you
must delete the corrupt file first and then replace it with a new copy.
These same concepts hold true for another system file–related problem:
Missing NTLDR
This error means that the NTLDR file is either missing or corrupt. Just replace it with a fresh
copy. The error should go away, and the computer will function properly. In the worst-case
scenario, an OS reinstall should take care of these issues.

Configuration File Issues
In older versions of Windows, this was a common problem because users could easily edit their
configuration files. Now, the Windows Registry stores nearly every configuration parameter
available, but on many computers it’s not secured: People can edit it. And worse yet, its structure
is incredibly complex and there’s no "undo" feature or Save button. Once you delete
something, it’s immediately gone. In addition, most software installation programs modify the
Registry when a new program is installed. An error you might see is this:
A device referenced in the Registry can not be found
If you just added hardware, then it might make sense that the particular piece of hardware or
its driver might be causing the problem. If not, then you would have to use the Registry Editor
(REGEDIT.EXE or REGEDT32.EXE) to search for corrupt or invalid entries.

Swap File Issues
Windows uses swap files (also called page files or paging files) to increase the amount of usable
memory by using hard-disk space as memory. However, sometimes problems can occur when
a computer doesn’t have enough disk space to make a proper swap file. Because Windows
relies on swap files for proper operation, if a swap file isn’t big enough, Windows will slow
down and start running out of usable memory. All sorts of memory-related problems can stem
from swap files that are incorrect or too small. Symptoms of swap-file problems include an
extremely slow system and a disk that is constantly being accessed. This condition, known as
hard disk thrashing, occurs because Windows doesn’t have enough memory to contain all the
programs that are running, and there isn’t enough disk space for a swap file to contain them
all. This situation causes Windows to swap between memory and the hard disk.
The solution to this problem is to first free up some disk space. With hard drives big
and cheap these days, the easiest thing to do is install a bigger hard disk. If that solution isn’t
practical, you must delete enough unused files that the swap file can be made large enough to
be functional.

Windows Boot Issues
Troubleshooting Windows boot issues is another type of Windows troubleshooting that is
commonly performed. To understand Windows boot issues, you must first understand the
Windows boot process, which was described a few sections ago.
Let’s take a brief look at some common Windows 2000/XP boot errors, what might be
causing them, and how to solve them:
Invalid Boot Disk You get the Invalid Boot Disk error when the BIOS finds a partition that
could be bootable but is missing the essential system files. You can correct this problem by
reinstalling the OS.
Operating System Not Found This error means exactly what it says. Essentially, the system
could not find an OS, or even a valid boot partition, on any of the boot devices (floppy, hard
disk, or CD-ROM). You will get this error on a brand-new computer that you have just built,
until you install the OS.
Inaccessible Boot Device If, on bootup, you receive an error that states STOP: 0x0000007B
Inaccessible Boot Device, you may have one of several problems. The most common is that
Windows could not load the driver for the disk controller on the boot device. This could be
because it is the wrong driver or because the disk controller is conflicting with some other
hardware in the system.

Missing NTLDR As you’ve learned, NTLDR is relied on heavily during the boot process. If it
is missing or corrupted, Windows NT will not be able to boot, and you’ll get an error similar
to Can’t find NTLDR.
On the other hand, if you get an error such as NTOSKRNL.EXE missing or corrupt on
bootup, it may be an error in the BOOT.INI file. This is a common occurrence if you have
improperly used the multi(0)disk(0)rdisk(0)partition(1)\WINDOWS="Microsoft
Windows XP Professional" syntax for partition entries or had the partition table modified
in a multidisk setup. If these entries are correct, the NTOSKRNL.EXE file may be corrupt or missing.
Boot from a startup disk and replace the file from the setup disks or CD-ROM.