IBM PC 300GL, PC 300 GL 6272, PC 300 GL 6282 Using Manual

Personal Computer
Using Your Personal Computer
PC 300 GL (6272 and 6282)
Personal Computer
Using Your Personal Computer
PC 300 GL (6272 and 6282)
IBM
Before using this information and the product it supports, be sure to read the general information under Appendix B, “Product Warranties, License Information, and Notices” on page 121.
Second Edition (April 1997)
The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time.
This publication was developed for products and services offered in the United States of America. IBM may not offer the products, services, or features discussed in this document in other countries, and the information is subject to change without notice. Consult your local IBM representative for information on the products, services, and features available in your area.
Requests for technical information about IBM products should be made to your IBM reseller or IBM marketing representative.
Copyright International Business Machines Corporation 1996, 1997. All rights reserved.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Contents
Safety Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v
Laser Compliance Statement ................................ vi
Lithium Battery Notice .................................. vii
About This Book ...................................... ix
Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x
Identifying Your Computer ................................ xi
3-Bay Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xi
4-Bay Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Chapter 1. Your IBM Personal Computer ....................... 1
What Your IBM Personal Computer Offers ....................... 2
Features at a Glance ..................................... 12
System Specifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Chapter 2. Arranging Your Workspace ........................ 17
Comfort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Glare and Lighting ..................................... 18
Air Circulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Electrical Outlets and Cable Lengths ........................... 18
Chapter 3. Operating Your Computer ......................... 19
Recognizing Controls and Status Indicators ...................... 19
Starting Your Computer .................................. 21
Shutting Down Your Computer .............................. 22
Using a Mouse ........................................ 23
Using a Diskette Drive ................................... 24
Using a CD-ROM Drive .................................. 29
Using Audio Features .................................... 31
Using System Management Features ........................... 32
Updating the POST/BIOS ................................. 33
Chapter 4. Taking Care of Your Computer ...................... 35
Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Cleaning Your Computer ................................. 35
Replacing the Battery .................................... 37
Moving Your Computer .................................. 38
Chapter 5. Using the Configuration/Setup Utility Program ............ 39
Starting the Configuration/Setup Utility Program ................... 39
Copyright IBM Corp. 1996, 1997 iii
Viewing and Changing Settings in the Configuration/Setup Utility Program .. 42
Exiting from the Configuration/Setup Utility Program ................ 43
Saving Settings After Installing an Option ....................... 44
Viewing the System Summary .............................. 45
Setting the Date and Time ................................. 46
Changing Keyboard Speed ................................. 46
Changing Monitor Settings ................................ 47
Changing Serial Port Settings ............................... 50
Changing Parallel Port Settings .............................. 51
Changing Plug and Play Control Features ....................... 52
Using Passwords . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
Using Advanced Power Management Features .................... 61
System Management Settings ............................... 64
Update POST/BIOS from Network ........................... 69
Chapter 6. Solving Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Power-On Self-Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Installing Files from Option Diskettes ......................... 106
Managing TSR Programs ................................. 106
Error Messages Specific to the Integrated Ethernet ................. 107
Chapter 7. Getting Help, Service, and Information ................ 109
Solving Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Getting Customer Support and Service ........................ 109
Purchasing Additional Services ............................. 112
Ordering Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Appendix A. Computer Records . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Identification Numbers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Device Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Appendix B. Product Warranties, License Information, and Notices ..... 121
Hardware Limited Warranty .............................. 121
License Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
iv Using Your Personal Computer
Safety Information
DANGER:
Electrical current from power, telephone, and communication cables is hazardous. To avoid shock hazard, connect and disconnect cables as shown below when installing, moving or opening the covers of this product or attached devices. The power cord must be used with a properly grounded outlet.
To Connect
Turn everything OFF.
To Disconnect
Turn everything OFF.
First, attach all cables to devices.
Attach signal cables to receptacles.
Attach power cord to outlet.
Turn device ON.
12
In the U.K., by law, the telephone cable must be connected after the power cord.
1
First, remove power cord from
2
outlet.
Remove signal cables from receptacles.
Remove all cables from devices.
In the U.K., by law, the power cord must be disconnected after the telephone line cable.
Copyright IBM Corp. 1996, 1997 v
Laser Compliance Statement
Some IBM Personal Computer models are equipped from the factory with a CD-ROM drive. CD-ROM drives are also sold separately as options. The CD-ROM drive is a laser product. The CD-ROM drive is certified in the U.S. to conform to the requirements of the Department of Health and Human Services 21 Code of Federal Regulations (DHHS 21 CFR) Subchapter J for Class 1 laser products. Elsewhere, the drive is certified to conform to the requirements of the International Electrotechnical Commission (IEC) 825 and CENELEC EN 60 825 for Class 1 laser products.
When a CD-ROM drive is installed, note the following.
CAUTION: Use of controls or adjustments or performance of procedures other than those specified herein might result in hazardous radiation exposure.
Opening the CD-ROM drive could result in exposure to hazardous laser radiation. There are no serviceable parts inside the CD-ROM drive. Do not open.
Some CD-ROM drives contain an embedded Class 3A or Class 3B laser diode. Note the following.
DANGER
Laser radiation when open. Do not stare into the beam, do not view directly with optical instruments, and avoid direct exposure to the beam.
vi Using Your Personal Computer
Lithium Battery Notice
CAUTION: Danger of explosion if battery is incorrectly replaced.
When replacing the battery, use only IBM Part Number 33F8354 or an equivalent type battery recommended by the manufacturer. The battery contains lithium and can explode if not properly used, handled, or disposed of.
Do not:
Throw or immerse into waterHeat to more than 100°C (212°F)Repair or disassemble
Dispose of the battery as required by local ordinances or regulations.
ATTENTION Danger d'explosion en cas de remplacement incorrect de la batterie.
Remplacer uniquement par une batterie IBM de type 33F8354 ou d'un type équivalent recommandé par le fabricant. La batterie contient du lithium et peut exploser en cas de mauvaise utilisation, de mauvaise manipulation ou de mise au rebut inappropriée.
Ne pas :
Lancer ou plonger dans l'eauChauffer à plus de 100°C (212°F)Réparer ou désassembler
Mettre au rebut les batteries usagées conformément aux règlements locaux.
Safety Information vii
viii Using Your Personal Computer
About This Book
This book will help you become familiar with your IBM Personal Computer and its many features. It describes how to configure, operate, and maintain your computer. In the unlikely event you experience problems, you will also find helpful troubleshooting information, as well as instructions for obtaining service in this book.
The book is organized as follows:
Chapter 1, "Your IBM Personal Computer," contains an overview of the features
of your computer.
Chapter 2, "Arranging Your Workspace," contains information about setting up
your work area to optimize use of your computer. Safety considerations are also discussed.
Chapter 3, "Operating Your Computer," contains instructions for the day-to-day
operation of your computer, such as starting and shutting down your computer, using a diskette or CD-ROM drive, and using system management features.
Chapter 4, "Taking Care of Your Computer," contains information about the
proper handling and care of your computer.
Chapter 5, "Using the Configuration/Setup Utility Program," contains
information about configuration procedures.
Chapter 6, "Solving Problems," contains information that will help you identify
and correct problems that might arise as you use your computer.
Chapter 7, "Getting Help, Service, and Information," contains a description of
the wide variety of resources available from IBM to assist you in the use of your computer. This chapter also describes how to obtain additional information about IBM products.
Appendix A, "Computer Records," contains forms for recording information
about your computer, which can be helpful if you decide to install any additional options, or if you ever need to have your computer serviced.
Appendix B, "Product Warranties, License Information, and Notices," contains a
copy of the warranty and license agreement for your computer, as well as legal notices and trademark information.
Copyright IBM Corp. 1996, 1997 ix
Related Publications
The following publications, together with this book, contain information about your computer.
Setting Up Your Personal Computer
This publication contains instructions to help you set up your computer.
Installing Options in Your Personal Computer
This publication contains instructions for adding memory, adapters, drives, and other options to your computer.
Understanding Your Personal Computer
This online publication (provided only with computers that have preinstalled software) includes general information about using personal computers and in-depth information about the specific features of your computer. To purchase a printed copy of this publication, refer to “Ordering Publications” on page 115.
About Your Software
This publication (provided only with computers that have preinstalled software) contains information about the preinstalled software package.
Your Ready-to-Configure CD
This publication contains information about the Ready-to-Configure CD that comes with your computer. The publication also contains instructions for starting the CD.
The following publications contain more information about your computer. Both publications can be found on the Internet at http://www.pc.ibm.com/cdt or can be ordered from IBM. To purchase a copy, refer to “Ordering Publications” on page 115.
Hardware Maintenance Manual
This publication contains information for trained service technicians.
Technical Information Manual
This publication contains information for individuals who want to know more about the technical aspects of their computer.
x Using Your Personal Computer
Identifying Your Computer
In most instances, the best way to identify your computer is by the model/type number. The model/type number indicates the various features of the computer, such as the type of microprocessor or whether the computer is a desktop or minitower. You can find this number on the small label on the front of your computer. An example of a model/type number is 6282-54A.
Throughout this book, however, your computer is identified by the number of drive bays offered with these models. If your computer has three drive bays, it is referred to as the 3-bay design. If your computer has four drive bays, it is referred as the 4-bay design. These naming conventions are used only where it is appropriate. Instructions without these naming conventions apply to all computer models.
3-Bay Design
With the cover on, bay 2 in the 3-bay design is not visible. This bay is intended for a hard disk drive, which does not have accessible media such as a CD-ROM drive or diskette drive. The 3-bay design has two expansion slots for adapters, as shown in the rear view below.
Bay 1
About This Book xi
Bay 3
Expansion Slots
Bay 2
Front View
Rear View
4-Bay Design
With the cover on, bay 4 in the 4-bay design is not visible. This bay is intended for a hard disk drive, which does not have accessible media such as a CD-ROM drive or diskette drive. The 4-bay design has four expansion slots for adapters, as shown in the rear view below.
Bay 3
Bay 4
Bay 1
Bay 2
Front View
Expansion Slots
Rear View
xii Using Your Personal Computer
Chapter 1. Your IBM Personal Computer
Thank you for selecting an IBM Personal Computer. Your computer incorporates many of the latest advances in personal computer technology and is easy to expand and upgrade as your needs change.
Note: Your computer might differ from the one shown above.
Copyright IBM Corp. 1996, 1997 1
What Your IBM Personal Computer Offers
This section describes the major features of your computer.
Microprocessor
At the core of your computer is an Intel Pentium microprocessor or an Intel Pentium microprocessor with MMX technology. With its advanced performance features, the microprocessor supplies the speed and power you need to take advantage of complex programs. In addition, the microprocessor with MMX technology improves the performance of multimedia and communications applications by accelerating calculations commonly performed for audio, video, speech synthesis and recognition, 2D and 3D graphics, and data communications.
1
Your computer supports microprocessor speeds of 100 MHz to 200 MHz
, and the
system board is designed for microprocessor upgrades as they become available.
System Memory
Your computer comes standard with either extended data out (EDO) dynamic random access memory (DRAM) or synchronous dynamic random access memory (SDRAM). Both EDO and SDRAM memory use advanced technology to increase system performance.
L2 Cache
On the system board is 256 KB of level 2 (L2) cache, which helps speed the exchange of information between the microprocessor and system memory.
Graphics Support
Your computer comes with a graphics subsystem integrated on the system board. The high-performance graphics are powered by the Cirrus Logic CL-GD5446 64-bit VisualMedia accelerator, which provides video playback. Also, your computer supports a maximum of 2 MB of video memory installed on the system board. Some computers come with the maximum amount of video memory preinstalled. If your computer comes with 1 MB of video memory, an optional 1 MB upgrade is available.
1
MHz denotes internal clock speed of the microprocessor only; other factors might also affect application performance.
2 Using Your Personal Computer
Integrated Ethernet Subsystem
Some models have an integrated 10Base-T, Ethernet controller and an RJ-45 connector that provide a high-performance network connection. The integrated Ethernet is a Plug and Play device that has built-in support for Wake on LAN and a viewable MAC (media access control) address for your computer. (See “System Management Settings” on page 64 for more information.) Device drivers for the Ethernet subsystem are provided on the Ready-to-Configure CD that comes with your computer. If your computer has IBM-preinstalled software, the device drivers are already installed on the hard disk drive. For instructions on connecting a network cable to your computer, refer to Setting Up Your Personal Computer.
System Management Features
Your computer has features that make it possible for a network administrator to manage and control it remotely over a network. These features are:
Enablement for LANClient Control Manager softwareCapable of using remote program load (RPL) and dynamic host configuration
protocol (DHCP)
Enablement for Wake on LANPrimary startup sequence and automatic power on startup sequenceEnablement for POST/BIOS updates over a networkDesktop Management Interface (DMI) BIOS and DMI software
For information on these features, refer to “Using System Management Features” on page 32 and “System Management Settings” on page 64.
Audio Support
In some models, an audio adapter is preinstalled. The audio adapter is Sound Blaster compatible and provides a musical instrument digital interface (MIDI) for connecting optional game controls or electronic musical devices. Also, three ports are provided for connecting powered speakers, an audio input device such as a portable CD-ROM, and a microphone.
ISA Bus
Your computer has an industry standard architecture (ISA) bus, which is one of the most widely used and successful input/output (I/O) buses available. The ISA bus is popular because so many adapters and devices have been designed and marketed for it.
Chapter 1. Your IBM Personal Computer 3
PCI Bus
Your computer also has a peripheral component interconnect (PCI) bus. PCI is an advanced bus standard designed to keep up with performance improvements of microprocessor buses and advanced peripheral devices. The PCI bus adds to the capability of the ISA bus, speeding up the exchange of information among the microprocessor and peripheral devices within your computer system.
Expansion with Adapters
By installing adapters, you can expand the capabilities of your computer and take advantage of a variety of peripheral devices and applications. Your computer uses a riser card for connecting adapters to the ISA bus or PCI bus.
High-Capacity Hard Disk Drives
Your computer comes with a hard disk drive that has an enhanced integrated drive electronics (EIDE) interface. The hard disk drive is a SMART (self-monitoring, analysis and reporting technology) drive capable of predicting potential problems. When used with the proper software applications, the SMART hard disk drive protects data and improves reliability.
CD-ROM Drive
In some models, a CD-ROM drive is preinstalled. A CD-ROM (compact disc read-only memory) drive plays back or reads information from a CD providing quick access to large amounts of information. A compact disc can store more than 650 MB of data, such as the large files needed for audio, full-motion video, and animated graphics.
Parallel Port
Your computer has one parallel port. The parallel port is most often used to communicate with a parallel printer, but it can also be used with other parallel devices.
The parallel port can operate in several different modes. The default mode for your computer is standard parallel port (SPP). However, your computer also supports the extended capabilities port/enhanced parallel port (ECP/EPP) modes. For more information, see “Changing Parallel Port Settings” on page 51.
4 Using Your Personal Computer
Serial Ports
Your computer has two standard, 16550-UART serial ports that can be used to connect devices such as modems and printers.
Universal Serial Bus Ports
The Universal Serial Bus (USB) interface is based on a new technology that adds more diversity and capabilities to personal computers. Two USB connectors are provided so you can take advantage of new USB devices as they become available.
The USB interface incorporates Plug and Play technology which allows you to install devices that configure automatically. Also, you can install and remove devices without having to shut off your computer. In addition, an option called a hub enables you to plug in more than one device at a time. A hub converts a single USB connector into multiple ports where USB devices can be attached.
Note: Your computer does not support a keyboard or mouse attached to the USB
port.
Ease-of-Use Features
Using the computer is easier with features such as Plug and Play technology, diagnostic programs, and system management features.
Support for Plug and Play technology is built into the system board of your computer. This allows you to add Plug and Play adapters that are self-configuring, provided that the requested resources are not already in use. In most cases, Plug and Play technology eliminates having to manually configure a device by setting switches or jumpers or by setting ISA legacy resources.
If you have a problem with your computer, a diagnostic program called QAPlus/PRO helps determine if a hardware component is causing the problem. QAPlus/PRO and other operating system-specific diagnostic programs are included on the Ready-to-Configure CD that comes with your computer.
Note: Create the QAPlus/PRO diskette as soon as possible, so that you will be
ready to diagnose a problem if one should occur.
If your computer is properly connected to a network, you can take advantage of advanced system management features, such as Wake on LAN, RPL, and DHCP. For more information, see “Using System Management Features” on page 32.
Chapter 1. Your IBM Personal Computer 5
Ergonomic Features
Your computer has ergonomic features which make it more comfortable to use. The power switch and indicator lights are located on the front panel for easy access and visibility. Also, you can easily change monitor settings to reduce or eliminate flicker and jitter, or you can adjust the angle of the keyboard to make typing more comfortable.
IBM-Preinstalled Software
IBM-preinstalled software is provided with some computer models. This software includes an operating system, device drivers to support built-in features, and other support programs. Detailed information about this software is included in About Your Software, which is included with the preinstallation package.
Supported Operating Systems
Your computer is designed to use a variety of operating systems in order to meet your particular needs. Computer models with IBM-preinstalled software use one of the following operating systems:
Windows NT 4.0
Windows 95 The following operating systems are also supported by your computer:
IBM PC DOSIBM DOS 7.0Windows 3.1, 3.11Windows NT 3.51MS DOS 6.0, 6.2, 6.3OS/2 2.11, 3.0
OS/2 Warp
OS/2 Warp Connect 3.0, 4.0OS/2 LAN Server 2.0OS/2 LAN Server 3.0Windows for WorkGroups 3.11Novell Netware 3.12Novell Netware 4.1
SCO OpenServer Solaris 2.5
DEC PathWorks 5.1
Note: For a complete listing of operating systems certified for use with your
computer, see http://www.pc.ibm.com/cdt/index.html for the online compatibility report.
6 Using Your Personal Computer
Advanced Power Management
Energy conservation is an important concern. Your computer has Advanced Power Management (APM) features that allow you to set different levels of energy conservation for specific components of your computer. You can view and change APM settings using the Configuration/Setup Utility program.
Asset Security Features
Important
For the latest information on IBM Personal Computer Asset Security features, refer to the following Internet page: http://www.pc.ibm.com/asset.
IBM provides a variety of computer security features for your computer. These security features help protect both your hardware and software. The following features are available:
Power-on and administrator password protection
Startup-sequence control
Hard disk drive and diskette drive access controlEnablement for updating the POST/BIOS over the networkCover lock (standard on most 4-bay models)U-bolt and security cabling (optional)Registration, tracking, and recoveryOperating system security
Password Protection: Password protection is available to help you secure your
computer. A power-on password protects your computer by locking the keyboard and mouse. The are three modes to choose from when using a power-on password. Also, you can use an administrator password to protect the configuration settings of your computer. For more information, see “Using Passwords” on page 53.
Startup-Sequence Control: You can control the primary startup sequence and
automatic power on startup sequence of your computer. For more information see “Default Settings for the Startup Sequence” on page 68 and “Automatic Power On Startup Sequence” on page 69.
Hard Disk Drive and Diskette Drive Access Control: You can control access
to the hard disk and diskette drives of your computer. To access the settings for these features, enter the Configuration/Setup Utility program and select System Security. For more information on using the Configuration/Setup Utility program, see Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.
Chapter 1. Your IBM Personal Computer 7
Updating the POST/BIOS Over the Network: If your computer is properly
configured, you can update the POST/BIOS settings over the network. For more information, see “Update POST/BIOS from Network” on page 69.
Cover Lock and U-Bolt Cabling: You can use the cover lock, which is standard
on most 4-bay models, to secure the outside cover. The cover-lock keys are unique to your computer, and locksmiths are not authorized to duplicate them. If the keys are lost, you must order replacements from the key manufacturer. The key serial number and the address of the manufacturer are on a tag attached to the keys.
You can also use an optional U-bolt that enables you to secure your computer with a cable and lock.
Registration, Tracking, and Recovery: Registration of your computer and its
serialized components is offered online via the Internet. You simply select the registration provider, fill out the online registration form, and then send the completed form to the provider through E-mail. The provider will send you confirmation and a sticker to apply to your computer. Your provider will offer online update registration service for five years.
Operating System Security: Some operating systems provide security features
such as a keyboard and mouse lock-up feature. Refer to the operating system documentation for more information.
Service and Support
You can obtain assistance for using your computer, as well as service, from a number of sources. Help is available by phone, fax, and modem. For detailed information, see Chapter 7, “Getting Help, Service, and Information” on page 109.
8 Using Your Personal Computer
Expandability
You can easily expand the capabilities of your computer by adding system memory, video memory, drives, or adapters.
Drive Bays: The 3-bay design has three drive bays, and the 4-bay design has four
drive bays. The following illustrations show the locations of diskette, CD-ROM and hard disk drives. Unoccupied drive bays can be used for installing additional devices.
3.5-inch Diskette Drive
3.5-inch Hard Disk Drive
3-Bay Design
3.5-inch Diskette Drive
3.5-inch Hard Disk Drive
4-Bay Design
5.25-inch Drive Bay for Optional Drive
CD-ROM Drive (some models only)
5.25-inch Drive Bay for Optional Drive
Chapter 1. Your IBM Personal Computer 9
Expansion Slots: The 3-bay design has two expansion slots, and the 4-bay design
has four expansion slots. The following illustrations show the locations of expansion slots by model. Any unoccupied slots can be used for installing optional adapters.
Expansion Slots
3-Bay Design
10 Using Your Personal Computer
Expansion Slots
4-Bay Design
External Connectors
The location of the external connectors for I/O devices varies by model. Models with an integrated Ethernet subsystem have an RJ-45 connector. Also, if an audio adapter is installed, connectors appear above the I/O panel in an expansion slot.
Ethernet
Note: Your computer might not have all the connectors shown.
Chapter 1. Your IBM Personal Computer 11
Serial
B
A
Serial
Mouse
Keyboard
Line Out
Game/MIDI Microphone
(Audio Adapter)
12
USB Parallel
Line In
Monitor
Features at a Glance
The following information summarizes the features that are available for both the 3-bay design and the 4-bay design. For a list of features specific to your computer, refer to the System Summary screen in the Configuration/Setup Utility program. For more information, see “Viewing the System Summary” on page 45.
Mechanical Designs
3-Bay Design: Three drive bays, two
expansion slots
4-Bay Design: Four drive bays, four
expansion slots
Microprocessor
Intel Pentium microprocessor or Intel Pentium
microprocessor with MMX technology
System board supports speeds from 100 MHz
to 200 MHz
Upgrades supported
Memory
Maximum addressable: 128 MB
Two 168-pin DIMM sockets, 3.3 VSDRAM or EDO DRAM modules
Level 2 Cache
256 KB installedUpgradable to 512 KB
Graphics
Integrated CL-GD5446 64-bit VisualMedia
accelerator
1 or 2 MB DRAM video memory preinstalled;
1 MB models upgradable to 2 MB
Ethernet Subsystem (optional feature) 10Base-T connectivity
RJ-45 connector
Support for Wake on LAN
Diskette Drives
Standard: One 3.5-inch 1.44 MB drive Maximum: Two Options:
– 5.25-inch 1.2 MB drive – 3.5-inch 1.44 MB or 2.88 MB drive
Hard Disk Drives
Standard: One PCI bus-master EIDE drive
Maximum for the 3-bay design: Two
Maximum for the 4-bay design: Three
Expansion
Riser card with ISA/PCI expansion slotsPlug and Play support
Input/Output Features
ECP/EPP parallel portTwo 16550-UART serial portsTwo universal serial bus (USB) ports
Monitor port
Mouse (PS/2) port (mouse included)Keyboard port (keyboard included)Ethernet port (optional feature)
Power
3-Bay Design: 85 W, 115/230 V ac, 50/60 Hz4-Bay Design: 145 W, 115/230 V ac, 50/60 HzBuilt-in overload and surge protectionAdvanced power managementWake on LAN enabled
Asset Security Features
Security features are provided for both the
software and hardware of your computer. For more information, see “Asset Security Features” on page 7.
System Management
Enabled for LANClient Control Manager
software
Wake on LAN supportWake Up on AlarmUpdate POST/BIOS from the networkDMI BIOS and DMI software
IBM-Preinstalled Software
Preinstalled in some models are an operating
system, device drivers to support built-in features, and other support programs. See About Your Software for a detailed description of the preinstalled package.
For information on supported operating
systems, see “Supported Operating Systems” on page 6, or online at http://www.pc.ibm.com/cdt/index.html.
12 Using Your Personal Computer
System Specifications
The size, weight, and heat output specifications vary be model. The other system specifications apply to both the 3-bay design and the 4-bay design.
Size
3-Bay Design
– Depth: 400 mm (15.8 in.) – Height: 95 mm (3.7 in.) – Width: 369 mm (14.5 in.)
4-Bay Design
– Depth: 420 mm (16.5 in.) – Height: 110 mm (4.3 in.) – Width: 440 mm (17.3 in.)
Weight
3-Bay Design
– Minimum configuration as shipped: 6.80 kg (15 lb) – Maximum configuration: 8.16 kg (18 lb)
2
4-Bay Design
– Minimum configuration as shipped: 9.07 kg (20 lb) – Maximum configuration: 11.3 kg (25 lb)
2
Maximum configuration weight depends on actual optional features installed. Figures shown are for a system fully populated with typical optional features.
2
Chapter 1. Your IBM Personal Computer
13
Heat Output
3-Bay Design
– Approximate heat output in British thermal units (Btu) per hour:
- Minimum configuration: 110 Btu (35 watts)
- Maximum configuration: 273 Btu (80 watts)
3
4
4-Bay Design
– Approximate heat output in British thermal units (Btu) per hour:
- Minimum configuration: 120 Btu (35 watts)
- Maximum configuration: 685 Btu (200 watts)
3
4
Heat output varies depending on the number and type of optional features installed and the power-management optional features in use.
Environment
Air temperature:
– System on: 10° to 32°C (50° to 95°F) – System off: 10° to 43°C (50° to 110°F)
Humidity:
– System on: 8% to 80% – System off: 8% to 80%
Maximum altitude: 2134 m (7000 ft)
3
Minimum wattage for base models will comply with EnergyStar requirements.
4
Maximum heat specifications are based on the maximum capacity of the system power supply, 85 watts for the 3-bay design and 145 watts for the 4-bay design.
14 Using Your Personal Computer
Electrical Input
5
Sine-wave input (50 to 60 Hz) is requiredInput voltage for the 3-bay design:
– Low range:
- Minimum: 100 V ac at 3 A
- Maximum: 127 V ac at 3 A
- Voltage switch setting: 115 or 115 V
– High range:
- Minimum: 200 V ac at 1.5 A
- Maximum: 240 V ac at 1.5 A
- Voltage switch setting: 230 or 230 V
– Input kilovolt-amperes (kVA) (approximately):
- Minimum configuration as shipped: 0.08 kVA
- Maximum configuration: 0.30 kVA
Input voltage for the 4-bay design:
– Low range:
- Minimum: 100 V ac at 5 A
- Maximum: 127 V ac at 5 A
- Voltage switch setting: 115 or 115 V
– High range:
- Minimum: 200 V ac at 3 A
- Maximum: 240 V ac at 3 A
- Voltage switch setting: 230 or 230 V
– Input kilovolt-amperes (kVA) (approximately):
- Minimum configuration as shipped: 0.08 kVA
- Maximum configuration: 0.30 kVA
Power consumption varies depending on the number and type of optional features installed and the power-management optional features in use.
5
Maximum power specifications are based on the maximum capacity of the system power supply, 85 watts for the 3-bay design and 145 watts for the 4-bay design.
Chapter 1. Your IBM Personal Computer
15
Airflow
Approximately 0.56 cubic meters per minute (20 cubic feet per minute)
Acoustical Noise-Emission Values
Average sound-pressure levels:
– At operator position:
- 38 dBA idle
- 43 dBA operating
– At bystander position–1 meter (3.3 ft):
- 33 dBA idle
- 37 dBA operating
Declared (upper limit) sound power levels:
– 4.8 bels idle – 5.1 bels operating
These levels were measured in controlled acoustical environments according to procedures specified by the American National Standards Institute (ANSI) S12.10 and ISO 7779, and are reported in accordance with ISO 9296.
Actual sound-pressure levels in your location might exceed the average values stated because of room reflections and other nearby noise sources. The declared sound power levels indicate an upper limit, below which a large number of computers will operate.
16 Using Your Personal Computer
Chapter 2. Arranging Your Workspace
To get the most from your computer, arrange both the equipment you use and your work area to suit your needs and the kind of work you do. Your comfort is of foremost importance, but light sources, air circulation, and the location of electrical outlets also can affect the way you arrange your workspace.
Comfort
Although no single working position is ideal for everyone, here are a few guidelines to help you find a position that suits you best.
Sitting in the same position for a long time causes fatigue. A good chair can make a big difference. The backrest and seat should adjust independently and provide good support. The seat should have a curved front to relieve pressure on the thighs. Adjust the seat so that your thighs are parallel to the floor and your feet are either flat on the floor or on a footrest.
When using the keyboard, keep your forearms parallel to the floor and your wrists in a neutral, comfortable position. Try to keep a light touch on the keyboard and your hands and fingers relaxed. You can change the angle of the keyboard for maximum comfort by adjusting the position of the keyboard feet.
Adjust the monitor so the top of the screen is at, or slightly below, eye level. Place the monitor at a comfortable viewing distance, usually 51 to 61 cm (20 to 24 in.), and position it so you can view it without having to twist your body.
Copyright IBM Corp. 1996, 1997 17
Lower Back Support
Seat Height
Viewing Distance
Glare and Lighting
Position the monitor to minimize glare and reflections from overhead lights, windows, and other light sources. Place the monitor at right angles to windows and other light sources, when possible. Reduce overhead lighting, if necessary, by turning off lights or using lower wattage bulbs. If you install the monitor near a window, use curtains or blinds to block the sunlight. You might have to adjust the Brightness and Contrast controls on the monitor as the room lighting changes throughout the day.
Where it is impossible to avoid reflections or to adjust the lighting, an antiglare filter placed over the screen might be helpful. However, these filters might affect the clarity of the image on the screen; try them only after you have exhausted other methods of reducing glare.
Dust buildup compounds problems associated with glare. Remember to clean your monitor screen periodically using a soft cloth moistened with a nonabrasive liquid glass cleaner.
Air Circulation
Your computer and monitor produce heat. The computer has a fan that pulls in fresh air and forces out hot air. The monitor lets hot air escape through vents. Blocking the air vents can cause overheating, which might result in a malfunction or damage. Place the computer and monitor so that nothing blocks the air vents; usually, 51 mm (2 in.) of air space is sufficient. Also, make sure the vented air is not blowing on someone else.
Electrical Outlets and Cable Lengths
The location of electrical outlets and the length of power cords and cables that connect to the monitor, printer, and other devices might determine the final placement of your computer.
When arranging your workspace:
Avoid the use of extension cords. When possible, plug the computer power
cord directly into an electrical outlet.
Keep power cords and cables neatly routed away from walkways and other
areas where they might get kicked accidentally.
For more information about power cords, see “Power Cord Notice” on page 131.
18 Using Your Personal Computer
Chapter 3. Operating Your Computer
This chapter provides information to help you in the day-to-day use of your computer.
Recognizing Controls and Status Indicators
Look at the front of your computer. The buttons are controls that allow you to perform a specific function, such as powering on the computer. The lights are status indicators that tell you when a certain function is in use, such as the diskette drive.
Note: If your computer has a preinstalled CD-ROM drive, controls and status
indicators are available. For more information, see “Using a CD-ROM Drive” on page 29.
The following illustrations show the controls and status indicators for both models.
Diskette Drive Light
Diskette Eject Button
Power Switch
Hard Disk Drive Light
LAN Activity Light
3-Bay Design
Power-On Light
Copyright IBM Corp. 1996, 1997 19
Diskette Drive Light
Power Switch
Power-On Light
Diskette Eject Button
Hard Disk Drive Light
LAN Activity Light
4-Bay Design
The following list explains the controls and status indicators located on the front of your computer.
Diskette-Drive Light: When this light is on, it indicates that the diskette drive
heads are being positioned or that your computer is reading from or writing to a diskette. Do not eject a diskette when the light is on.
Diskette Eject Button: Push this button to release a diskette from the drive.Power Switch: Press this switch to turn your computer on or off. Do not turn
off your computer if the in-use light for the hard disk drive or diskette drive is on.
Power-On Light: This status indicator lights when you turn on your computer.Hard-Disk Drive Light: When this light is on, it indicates that the hard disk
drive heads are being positioned or that your computer is reading from or writing to the hard disk.
LAN Activity Light: This light indicates network activity.
20 Using Your Personal Computer
Starting Your Computer
Note: If your computer is configured correctly, it can be started remotely over a
network. For more information, see “Wake on LAN” on page 69.
1. Turn on all devices connected to the computer.
2. Press and release the power switch on your computer. This starts the computer, and the following actions occur:
a. The IBM logo appears centered on the screen. b. The power-on self-test (POST) is performed. You can recognize this by
looking for the increasing number in the upper-left corner of the screen. This number is the amount of memory being tested by POST. When the number stops, the memory is tested and POST is complete.
If POST detects a problem, you hear multiple beeps (or no beep) and an error message appears on the screen. Write down any error code numbers and descriptions, and see “Solving POST Problems” on page 74 and “POST Error Message Charts” on page 77 for more information. (If you do not hear a beep during POST, refer to “Troubleshooting Charts” on page 96. You might need to have your computer serviced.)
c. The computer allows you to enter the Configuration/Setup Utility program
(by pressing F1) or run a fast POST (by pressing Esc). These options are shown in the lower-left corner of the screen.
3. If the computer is not password protected, you hear a beep, and the first screen of the operating system or application program appears.
If the computer is password protected, a prompt is displayed for entering either the power-on or administrator password. If both a power-on and an administrator password have been set, you must type either password at the password prompt. (Refer to “Using Passwords” on page 53 for instructions on setting and using passwords.) Type your password at the prompt and press Enter. The first screen of the operating system or application program appears.
6
Models with integrated Ethernet have special factory settings that affect the primary startup sequence. If your model comes with integrated Ethernet, the computer tries to perform a remote program load (RPL) of the operating system. If RPL is unsuccessful, several messages might appear and then your computer loads the operating system from the hard disk drive. For more information on these factory settings, see “Network-Enabled Startup Sequence” on page 66. For information on the messages that might appear, see “Error Messages Specific to the Integrated Ethernet” on page 107.
Chapter 3. Operating Your Computer
6
21
Shutting Down Your Computer
When you are ready to turn off your computer, follow the shutdown procedures for your operating system to prevent the loss of unsaved data or damage to your software programs. See your operating system documentation for instructions.
In some operating systems, you can set up the computer to automatically turn off after the operating system has shut down. If you have not selected this setting, you must manually turn off the computer by pressing and releasing the power switch.
Important
If you plan to restart your computer, do not use Ctrl+Alt+Del while the operating system is running. Instead, follow the shutdown procedure for your operating system, turn off the computer by pressing and releasing the power switch, wait a few seconds until all the status-indicator lights are off, and then follow the procedures in “Starting Your Computer” on page 21.
22 Using Your Personal Computer
Using a Mouse
A mouse is a device that you use to point to and select objects on the monitor screen. The mouse that comes with your computer attaches with a cable to the mouse port on the back of the computer. For information on connecting the mouse, see Setting Up Your Personal Computer.
Note: Optional mouse devices might connect to the computer through a serial port.
A mouse device cannot be connected through the USB port.
With a mouse, you can move the pointer on the screen. If you have never used a mouse before, it might feel a bit awkward at first. However, with a little practice, the mouse movements will seem natural.
To set up the mouse, place the mouse beside the keyboard on a flat surface or mouse pad. A mouse pad is a flat, smooth foam-rubber pad available at most computer stores. The mouse has a ball on the bottom, so working on a flat, smooth surface is important. Most operating systems allow you to configure the mouse buttons for either right-hand or left-hand operation. When a two-button mouse is configured for right-handed user, the left button is used for most tasks. When a two-button mouse is configured for a left-handed user, the right button is used for most tasks. For more information, see your operating system documentation.
To use the mouse, slide it from side to side and forward and backward over a flat surface. When you see an item that you want to select on the screen, simply move the pointer to that item (this is called pointing), and press and release either the left or right button on the mouse (this is called clicking).
To learn how to use the mouse with the software in your computer, see the documentation accompanying the software. Some programs support only one mouse button, others support two, and some support three. Despite the differences, some terms are fairly standard throughout the industry.
Point Move the mouse so the pointer is on the object you want. Click Press and release the mouse button once. Double-click Rapidly press and release the mouse button twice. Drag Point to an object, press the mouse button, and hold it down as you
move the mouse to relocate the object.
Drop After dragging an object to a new location, release the mouse button.
Chapter 3. Operating Your Computer 23
Using a Diskette Drive
You can use 3.5-inch diskettes in the diskette drive of your computer. If you want to use 5.25-inch diskettes, you must install a 5.25-inch diskette drive. (Refer to Installing Options in Your Personal Computer for instructions on installing optional diskette drives.)
The information that follows will help you identify and use 3.5-inch diskettes.
Identifying Diskettes
The labeling on 3.5-inch diskettes is not consistent among manufacturers. Some diskettes are labeled with the letters DD or HD to identify the diskette type; other diskettes might not be labeled. However, the appearance of the lower-right corner of a 3.5-inch diskette always can be used to identify the diskette type, as shown in the following illustrations.
DD
No Window
3.5 Diskette
2.0 MB capacity
1 MB Double Density (DD)
HD
Window
2 MB High Density (HD)
24 Using Your Personal Computer
Handling and Storing Diskettes
Inside the protective diskette case is a flexible disk with a magnetic-sensitive coating. This disk can be damaged by heat, dust, a magnetic field, or even a fingerprint. Use the following guidelines when handling and storing diskettes.
Data is stored on the magnetic surface of the diskette. On 3.5-inch diskettes,
this surface is protected by a plastic cover. If the cover is damaged, do not use the diskette. A damaged diskette might damage the diskette drive.
A protective slide on the top of a 3.5-inch diskette covers part of the magnetic
surface. The diskette drive moves this slide to read data from or write data to the diskette. Do not move this slide, because fingerprints and dust can cause loss of data.
Top
Protective Slide
3.5 Diskette
2.0 MB capacity
Diskette Label
Never touch the magnetic disk itself.Keep diskettes away from magnets or devices that create a strong magnetic
field, such as electric motors and generators. Diskettes are sensitive to magnets found in television sets, telephones, stereo speakers, and other such items. A magnetic field can erase the data on your diskettes. Do not set diskettes on the monitor or use magnets to attach notes to your computer.
Do not store diskettes at high temperatures, low temperatures, or in direct
sunlight. Temperatures ranging from 4° to 53°C (39° to 127°F) are acceptable for
3.5-inch diskettes. Keep diskettes away from heat. The plastic outer covering might warp, damaging the diskette.
Chapter 3. Operating Your Computer 25
Labeling Diskettes
Before using a diskette, label it so that you can identify the data stored on it. Labels usually come in the package with the diskettes. Diskette labels can become a problem if you do not apply them correctly. Loose edges or an excessive buildup of labels can prevent the diskette from being inserted or ejected.
To prevent this problem, take the following precautions:
Remove an old label before you apply a new one.Apply labels carefully to ensure that all edges are secure.Apply labels only to the front of diskettes. Do not place a label where it
interferes with the protective slide or covers an opening in the protective diskette case.
Inserting and Removing Diskettes
Important
Always make certain that the diskette drive is empty before inserting a diskette. If the diskette eject button is flush with the front of the computer, a diskette can be inserted. If the diskette eject button is not flush with the computer, a diskette is already inserted.
To insert a 3.5-inch diskette, hold the diskette with the label facing up and insert the end with the protective slide first. Push the diskette into the diskette drive until the diskette clicks into place. The diskette eject button pops out.
To remove the diskette, press the eject button and slide the diskette out of the drive. Do not remove the diskette while the in-use light is on.
Diskette-Drive In-Use Light
26 Using Your Personal Computer
Diskette Eject Button
Write Protecting Diskettes
It is possible to accidentally format a diskette or unintentionally write data to it. Important information can be written over or lost. For this reason, it is a good idea to write protect important diskettes. You can read data from a write-protected diskette, but you cannot erase or change the data.
Most 3.5-inch diskettes have a write-protect switch that can be used to prevent data from being written to or erased from the diskette. If a 3.5-inch diskette does not have a write-protect switch, it is permanently write protected.
The write-protect switch is located on the back of 3.5-inch diskettes.
Write-Protect
Switch
To allow writing to the diskette, slide the switch so the write-protect window is
covered.
To prevent writing to the diskette, slide the switch so the write-protect window
is open.
Formatting Diskettes
You can buy diskettes either formatted or unformatted. Formatted diskettes are ready to use; unformatted diskettes must be formatted by your operating system before you can use them. The format operation checks a diskette for defects and prepares it for storing data. If data is already stored on the diskette, the format operation writes over it, and the data is lost.
Chapter 3. Operating Your Computer 27
The operating system FORMAT command specifies how to format a specific type of diskette.
Important
Always format diskettes to their correct capacity. Failing to do so might cause unreliable results. Differences such as magnetic coatings, the thickness of the diskette material, and the recording technique used all affect the formatting operation. Refer to your operating-system documentation for detailed information on formatting diskettes.
The following table shows diskette types, their formatted capacities, and the drive type that can be used with each diskette.
3.5-Inch Diskette Type Formatted Capacity
1 MB (MF2DD) 720 KB 1.44 MB 2 MB (MF2HD) 1.44 MB 1.44 MB
Drive Type
Notes:
1. MF2DD = Mini-floppy, two-sided, double density
2. MF2HD = Mini-floppy, two-sided, high density
3. If you are using DOS, use FORMAT A: /F:720 to format a 1 MB diskette in a
1.44 MB drive.
Copying Diskettes
If you are using DOS, you can copy one or more files to or from a diskette using the COPY command. Groups of files can be copied faster using the XCOPY command. Both COPY and XCOPY can copy files to different types of diskettes. For duplicating a diskette, use the DISKCOPY command. DISKCOPY requires that both the source diskette (the diskette you copy from) and the target diskette (the diskette you copy to) be the same type.
Refer to your operating-system documentation for more information on copying diskettes.
28 Using Your Personal Computer
Using a CD-ROM Drive
Some models have a preinstalled CD-ROM drive. CD-ROM (compact disc read-only memory) technology offers quick access to enormous amounts of information. A compact disc can store more than 650 MB of data, such as the large files needed for audio, still and full-motion video, and still and animated graphics. A CD-ROM drive can play back or read from a CD, but it cannot write information to it. CD-ROM drives use industry-standard, 12 cm (4.75-inch) CDs.
Follow these guidelines when using a CD-ROM drive:
Do not place the drive where there is:
– High temperature – High humidity – Excessive dust
– Excessive vibration or sudden shock – An inclined surface
– Direct sunlight
Do not insert any object other than a CD into the drive.Before moving the computer, remove the CD from the drive.
The following illustration shows the controls and status indicator for a preinstalled CD-ROM drive.
Emergency Eject Hole
Indicator Light
Note: Your computer might differ from the one shown above.
Chapter 3. Operating Your Computer 29
Tray
Eject/Load Button
Handling a CD
When handling a CD, follow these guidelines:
Hold the CD by its edges. Do not touch the surface.To remove dust or fingerprints, wipe the CD from the center to the outside.
Wiping the CD in a circular direction might cause loss of data.
Do not write or stick paper on the CD.Do not scratch or mark the CD.Do not place or store the CD in direct sunlight.Do not use benzene, thinners, or other cleaners to clean the CD.Do not drop or bend the CD.
Loading a CD
To load a CD into the CD-ROM drive:
1. Press the Eject/Load button. The tray slides out of the drive. (Do not manually force the tray open.)
2. Place the CD in the tray with the label facing up. If you have placed your computer in a vertical position using the optional floor stand, extend the two CD-retainer clips on the lower side of the CD-ROM drive tray to keep the CD in position as you open and close the drive.
3. Close the tray by pressing the Eject/Load button, or by gently pushing the tray forward. When the tray is closed, the indicator light on the front of the drive will activate to indicate that the drive is in use.
4. To eject the CD, press the Eject/Load button. When the tray slides out, carefully remove the CD.
5. Close the tray by pressing the Eject/Load button, or by gently pushing the tray forward.
Note: If the tray does not slide out of the drive when you press the Eject/Load
button, insert the pointed end of a large paper clip into the emergency eject hole located above and to the left of the CD-ROM indicator light.
If you have installed a CD-ROM drive yourself and need additional information about the drive, refer to the documentation that comes with the CD-ROM drive.
30 Using Your Personal Computer
Using Audio Features
If your computer comes with a preinstalled audio adapter, it is Sound Blaster compatible and capable of playing and recording sounds.
The device drivers for the preinstalled audio adapter are preinstalled on the hard disk drive. If you install this adapter as an option, use the device drivers on the Ready-to-Configure CD.
If you connect an optional device to the audio adapter, follow the manufacturer's instructions (device drivers might also be required). Contact the manufacturer for information on the necessary device drivers.
The following ports are available on the audio adapter:
Game/MIDI (musical instrument digital interface) port for connecting a game
control or a musical device such as an electronic keyboard.
7
Line in port for connecting musical devices such as a portable CD-ROM or
stereo.
Line out port for connecting powered speakers. Your audio system requires a
set of speakers connected to the line output in order to hear audio from the adapter. These speakers must be powered (with a built-in amplifier). In general, any powered speakers designed for use with personal computers might be used with your audio adapter. These speakers are available with a wide range of features and power output.
Microphone in for connecting a microphone.
GAME/MIDI OUT LINE IN MIC
7
An electronic device connected to the Game/MIDI port might require an optional adapter cable. For more information, refer to the documentation that comes with the electronic device.
Chapter 3. Operating Your Computer
31
Using System Management Features
This section is intended primarily for network administrators. It describes features of your computer that make it possible for a network administrator to remotely manage and control your computer.
The BIOS (basic input output system) of your computer supports an interface called Desktop Management Interface (DMI). DMI is a mechanism for gathering information about the hardware and software in your computer to enable network administrators to remotely monitor and control computers in a network environment. DMI can be used to remotely track many types of information about computers, including serial numbers, memory attributes, product-specific characteristics of installed peripherals, and operating system configuration information. This information can be accessed using a DMI browser. DMI browsers are provided by all major operating systems and all major LAN management packages, including TME 10 NetFinity, Intel LANDesk, and Microsoft SMS.
The Wake on LAN feature can be used by a network administrator to turn on your computer from a remote location. When Wake on LAN is used in conjunction with network management software, such as LANClient Control Manager and TME 10 NetFinity (provided on the Ready-to-Configure CD that comes with your computer), many types of functions, such as data transfers, software updates, and POST/BIOS flashes can be performed remotely on your computer and other Wake on LAN-enabled computers linked to your network. These functions can be done after hours and on weekends, which saves time and increases productivity since users are not interrupted during normal working hours. Refer to “Wake on LAN” on page 69 for further information.
Other features such as remote program load (RPL) and dynamic host configuration protocol (DHCP) also allow a network administrator to remotely control your computer. If you use remote program load in conjunction with LANClient Control Manager software, you can use a feature called Hybrid RPL. Using LANClient Control Manager, you set up your computer by installing hybrid images (or files) on the hard disk drive. Then, each time the computer starts from the network, LANClient Control Manager recognizes your computer as a Hybrid RPL client and a bootstrap program is downloaded to your computer. This bootstrap program is small and helps prevent network congestion. Working off the hybrid images, the bootstrap program initiates the startup process from the hard disk drive of your computer. An advantage to Hybrid RPL is that the network load associated with standard RPL is avoided. For more information on these two features, refer to “RPL and DHCP” on page 65.
32 Using Your Personal Computer
Updating the POST/BIOS
POST/BIOS is the basic layer of software built into every IBM computer. POST (power-on self-test) is a set of tests and procedures that is performed every time you turn on your computer. The BIOS (basic input output system) is a layer of software that translates instructions from other layers of software into electrical signals that the computer hardware can understand. Also included in the POST/BIOS is the Configuration/Setup Utility program, which enables you to view and change the configuration and setup of your computer.
In the past, the POST/BIOS was contained in a read-only memory (ROM) module on the system board. If you wanted to update POST routines, BIOS instructions, and the Configuration/Setup Utility program, you had to disassemble the computer and replace modules, or you had to replace the system board. Now, a module called electrically erasable programmable read-only memory (EEPROM, also referred to as flash memory) has replaced the ROM module on the system board. You can easily update POST information, the BIOS code, and the Configuration/Setup Utility program in your computer from an update diskette. This procedure is often referred to as flashing the POST/BIOS.
If your computer is properly connected to a network, you can update the POST/BIOS over the network. For further information, refer to “Update POST/BIOS from Network” on page 69.
As part of the continuing work to improve quality, IBM might make changes and enhancements to the POST/BIOS. When updates are released, they are available via download files on the World Wide Web (http://www.pc.ibm.com) or through the PC Company Bulletin Board Service (see “Using Electronic Support Services” on page 109). Instructions for using POST/BIOS updates will be available in a README file included in the download files.
Chapter 3. Operating Your Computer 33
34 Using Your Personal Computer
Chapter 4. Taking Care of Your Computer
This chapter provides guidelines for the proper handling and care of your computer.
Basics
Here are some basic points about keeping your computer functioning properly:
Keep your computer in a clean, dry environment. Make sure it rests on a flat,
sturdy surface.
Do not place items on top of the monitor or cover any of the vents in the
monitor or computer. These vents provide air flow to keep your computer from overheating.
Keep food and drinks away from all parts of your computer. Food particles
and spills will make the keyboard and mouse sticky and unusable.
Do not get the power switches or other controls wet. Moisture can damage
these parts and cause an electrical hazard.
Always disconnect a power cord by grasping the plug, not the cord.
Cleaning Your Computer
It is a good practice to clean your computer periodically to protect the surfaces and ensure trouble-free operation.
CAUTION: Be sure to turn off the computer and monitor power switches before cleaning the computer and monitor screen.
Computer and Keyboard
Use only mild cleaning solutions and a damp cloth to clean the painted surfaces of the computer.
Monitor Screen
Do not use abrasive cleaners when cleaning the surface of the monitor screen. The screen surface is easily scratched, so avoid touching it with pens, pencil points, and erasers.
Copyright IBM Corp. 1996, 1997 35
To clean the screen surface, wipe it gently with a soft, dry cloth, or blow on the screen to remove grit and other loose particles. Then use a soft cloth moistened with a nonabrasive liquid glass cleaner.
Mouse
If the pointer on the screen does not move smoothly with the mouse, you might need to clean the mouse.
1. Turn off the computer.
2. Disconnect the mouse cable from the computer.
3. Turn the mouse upside down. Unlock the retainer on the bottom of the mouse by moving it in the direction indicated by the arrow on the retainer.
4. Turn the mouse right-side up, and the retainer and ball will drop out.
5. Wash the ball in warm, soapy water, and dry it well.
6. Using a damp cloth, wipe the outside of the mouse and the retainer. Be sure to wipe the rollers inside the mouse and then let them dry.
7. Insert the ball and retainer. Lock the retainer by moving it in the opposite direction of the arrow.
8. Reconnect the mouse cable to the computer.
36 Using Your Personal Computer
Replacing the Battery
Your computer has a special type of memory that maintains the date, time, and the settings for built-in features, such as serial- and parallel-port assignments (configuration). A battery keeps this information active when you turn off the computer.
The battery requires no charging or maintenance throughout its life; however, no battery lasts forever. If the battery fails, the date, time, and configuration information (including passwords) are lost. An error message is displayed when you turn on the computer.
Refer to “Lithium Battery Notice” on page vii of this publication and Installing Options in Your Personal Computer for information about replacing the battery.
If you replace the original lithium battery with a heavy-metal battery or a battery with heavy-metal components, be aware of the following environmental consideration: batteries and accumulators that contain heavy metals must not be disposed of with normal domestic waste. They will be taken back free of charge by the manufacturer, distributor, or representative to be recycled or disposed of in a proper manner. For further information on battery disposal, call IBM at 1-800-IBM-4333 (1-800-426-4333) in the U.S. For information outside of the U.S., contact your IBM reseller or marketing representative.
Chapter 4. Taking Care of Your Computer 37
Moving Your Computer
CAUTION:
Do not move your computer while it is on. Always turn off the computer
before you move it.
Do not risk injury by moving or lifting the computer by yourself. Ask
another person to help you.
Normal shipping and handling can cause loss of data from a hard disk. If your computer has a hard disk drive, take the following precautions:
1. Back up all files and data from the hard disk. Operating systems can vary in the way they perform backup procedures. Some
operating systems save only data files, while others make copies of application program files and data files. Refer to your operating system documentation for information about software backup.
2. Remove all media (diskettes, compact discs, tapes, and so on) from the drives.
3. Turn off the computer and all attached devices. Your hard disk drive automatically parks the read/write heads in a nondata area. This process prevents damage to the hard disk.
4. Unplug the power cords from electrical outlets.
5. Note where you have attached your cables to the rear of the computer; then remove them.
6. If you saved the original shipping cartons and packing materials, use them to pack the units. If you are using different cartons, cushion the units to avoid any damage.
38 Using Your Personal Computer
Chapter 5. Using the Configuration/Setup Utility Program
This section discusses the Configuration/Setup Utility program that is provided with your computer. The Configuration/Setup Utility program enables you to view and change the configuration and setup of your computer, regardless of which operating system you are using.
Important
Operating systems often provide a way of changing many of the same settings found in the Configuration/Setup Utility program. If you do use the operating system to make changes, be aware that these changes might conflict with or override any similar settings in the Configuration/Setup Utility program.
Starting the Configuration/Setup Utility Program
1. Start the computer by following steps 1 and 2 on page 21.
2. When the Configuration/Setup Utility prompt appears in the lower-left corner
of the screen, quickly press F1. If you have not set an administrator password, the Configuration/Setup Utility program menu appears.
If you have set an administrator password, a prompt appears on the screen. Type the administrator password, and press Enter.
If the computer is protected by both an administrator and power-on password, you can type either password at the prompt and press Enter. However, if you need to change settings in the Configuration/Setup Utility program, you must enter the administrator password. Entering the power-on password will only enable you to view the System Summary and Product Data information of your computer.
Copyright IBM Corp. 1996, 1997 39
After you start the Configuration/Setup Utility program, the following menu appears.
Configuration/Setup Utility
Select Option:
System Summary Product Data Devices and I/O Ports Start Options Date and Time System Security Advanced Setup ISA Legacy Resources Advanced Power Management
Save Settings Restore Settings
Load Default Settings
Exit Setup
The following is a list of the categories that appear in the preceding menu. After each category are the actions you can take within each one.
System Summary
You can view information about the current options and features in your computer. Included in the system summary is information about the microprocessor, memory, video controller, and diskette and hard disk drives.
Product Data
You can view information about the machine type and model, flash EEPROM revision level, system-board identifier, system serial number, and BIOS date.
Devices and I/O Ports
You can view and change settings for devices and I/O ports, including video, IDE drive, serial port, parallel port, and Ethernet settings.
Start Options
You can view and change settings for device startup sequence, keyboard speed, virus detection, various power-on options, and other features of your computer.
40 Using Your Personal Computer
Date and Time
You can view and change the date and time of the internal clock in your computer.
System Security
You can view and change settings that control access to the hard disk and diskette drives. You can also set, change, and delete power-on and administrator passwords.
Advanced Setup
You can view and change settings for advanced hardware features, including ROM shadowing and microprocessor, memory, and PCI control. If the settings in Advanced Setup are not configured correctly, your computer might malfunction.
ISA Legacy Resources
You can view and change system resources (DMA, interrupt, memory, and I/O port) used by ISA legacy adapters.
Advanced Power Management
You can view and change settings that affect the energy-saving features of your computer, including the automatic power-on feature.
Chapter 5. Using the Configuration/Setup Utility Program 41
Viewing and Changing Settings in the Configuration/Setup Utility Program
You must use the keyboard to navigate through the different menus of the Configuration/Setup Utility program. Active keys for each menu are always displayed at the bottom of each screen. The following table shows the functions of the available keys.
Keys Function
Use these arrow keys to move between menu items until the item you want is
highlighted.
Use these arrow keys to display and toggle between choices for a menu item. Enter Press this key to select a highlighted menu item. Esc Press this key to exit from a menu after viewing or making changes to the
settings in the menu.
+ Use this key in some menus to increase the numerical value of a setting.
Use this key (the minus or hyphen key) in some menus to decrease the
numerical value of a setting.
0–9 Use these number keys in some menus to change the numerical value of a
setting.
F1 Press this key for help on a selected menu item. F9 Press this key if you changed a setting and you want to restore the setting
that was active before you made the change.
F10 Press this key to return the setting of a selected menu item to a default value.
The Configuration/Setup Utility program uses the following symbols to assist you with viewing and changing settings.
Symbol Meaning
An additional menu is available.
[ ] You can only change settings within these brackets.
5 A change has been made or the Configuration/Setup Utility program detected
an error and attempted to correct it. Also, an additional menu might follow a menu item with a beside it.
* A system resource conflict. Resolve this conflict before exiting from the
Configuration/Setup Utility program so that your computer will function properly.
42 Using Your Personal Computer
Exiting from the Configuration/Setup Utility Program
When you finish viewing or changing settings in the Configuration/Setup Utility program, follow these steps to exit from the program:
1. Press Esc until you return to the Configuration/Setup Utility program menu.
2. Do one of the following:
a. To restore the settings before they were changed and saved, select Restore
Settings.
b. To load the default values for all settings, select Load Default Settings. c. To save any changed settings (including restored settings or default
settings), select Save Settings. If you do not save settings here, you are given the opportunity to do so in the Exit Setup menu.
3. Press Esc to enter the Exit Setup menu and follow the instructions on the screen.
8
8
If you are a network administrator using RPL or DHCP in conjunction with network-management software, read “Network-Enabled Startup Sequence” on page 66 before loading the default settings.
Chapter 5. Using the Configuration/Setup Utility Program
43
Saving Settings After Installing an Option
In most cases, when you add or remove hardware from your computer, the BIOS (basic input/output system) detects the changes and then updates the configuration automatically. Although the computer changes the configuration settings automatically, you must save these changes in the Configuration/Setup Utility program for the new configuration to take effect. If you do not save the new settings, your operating system will not start.
To save the configuration after adding or removing hardware, complete the following steps.
1. When you turn on the computer, an error message indicating that a configuration change has occurred appears approximately 30 seconds after the memory count numbers stop cycling in the upper-left corner of the screen. When the configuration error message disappears, the POST Startup Errors screen appears, and you are prompted to Continue or Exit Setup. Select Continue. (If you select Exit Setup, you will get another error message.)
2. The Configuration/Setup Utility program menu appears with a right arrowhead (5) next to the menu category in which the configuration change has occurred. Select this menu item if you want to view the new configuration settings, and then press Esc to return to the Configuration/Setup Utility program menu.
3. Select Save Settings from the Configuration/Setup Utility program menu.
4. Press Esc to exit the Configuration/Setup Utility program, and follow the instructions on the screen.
44 Using Your Personal Computer
Viewing the System Summary
You can use the Configuration/Setup Utility program to view a summary of the options and features in your computer. To view the system summary:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select System Summary from the Configuration/Setup Utility program menu. The System Summary screen appears.
Depending on the model and configuration, your screen might appear slightly different from the one shown here.
System Summary
Processor Pentium Processor Speed 166 MHz Math Coprocessor Internal System Memory 640 KB Extended Memory 31 MB Video Controller Cirrus Logic GD-5446 SVGA Cache Size 256 KB Cache State Enabled Shadow RAM 384 KB System ROM F000h - FFFFh Memory Type Non-parity Diskette Drive A: 1.44 MB, 3.5" Diskette Drive B: Not Installed Hard Disk Drive 0 1.2 GB CD-ROM Drive 1 Installed Hard Disk Drive 2 Not installed Hard Disk Drive 3 Not installed
Chapter 5. Using the Configuration/Setup Utility Program 45
Setting the Date and Time
Your computer has an internal clock that maintains the date and time. A battery keeps the clock active when you turn off the computer.
To set the date and time:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select Date and Time from the Configuration/Setup Utility program menu.
3. Type the date and time in the appropriate fields.
4. Press Esc to return to the Configuration/Setup Utility program menu.
5. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu and press Enter.
6. To exit from the Configuration/Setup Utility program, press Esc and follow the instructions on the screen.
Your operating system might also have a function for setting the date and time. Refer to your operating system documentation for more information.
Changing Keyboard Speed
You can change the speed at which the keyboard responds when you hold down a key. The normal typematic rate is 10 characters per second, but you can use the Configuration/Setup Utility program to increase this rate to up to 30 characters per second.
To change the keyboard speed:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select Start Options from the Configuration/Setup Utility program menu.
3. Set Keyboard Speed to Normal or Fast. Use Left Arrow () or Right Arrow () to toggle between selections.
4. Press Esc to return to the Configuration/Setup Utility program menu.
5. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
6. To exit from the Configuration/Setup Utility program, press Esc and follow the instructions on the screen.
46 Using Your Personal Computer
Changing Monitor Settings
Your computer has a graphics controller. SVGA is a video standard for displaying text and graphic images on a monitor screen. Like other video standards, SVGA supports a variety of video modes. Video modes are different combinations of resolution, refresh rate, and color defined by a video standard for displaying text or graphics.
SVGA provides higher-resolution graphics, faster refresh rates, and more colors than previous video standards, such as video graphics array (VGA). At the same time, SVGA supports all standard VGA modes.
To get the best possible image on your screen and to reduce or eliminate flicker, you might need to reset the resolution and refresh rate of your monitor. Refer to your operating system documentation for further information on monitor settings.
Important
Before you change any monitor settings, be sure to review the information that comes with your monitor. Using a resolution or refresh rate that is not supported by your monitor might cause the screen to become unreadable and damage the monitor. The information that comes with your monitor usually includes the resolutions and refresh rates that the monitor supports. If you need additional information, contact the manufacturer of the monitor.
To minimize screen flicker and jitter, set your monitor for the highest noninterlaced refresh rate that the monitor supports. If your monitor complies with the VESA Display Data Channel (DDC) standard, it is probably already set to the highest refresh rate that the monitor and graphics controller can support. If you are not sure if your monitor is DDC-compliant, refer to the documentation provided with the monitor.
To change the monitor settings, select Devices and I/O Ports and then Video Setup from the Configuration/Setup Utility program menu.
Chapter 5. Using the Configuration/Setup Utility Program 47
The following modes are supported by your computer.
Resolution (Pels)
640 x 480 8/15/16 60, 72, 75, 85 1 640 x 480 32 60, 72, 75, 85 2 800 x 600 8/15/16 60, 72, 75, 85 1 800 x 600 32 60, 72, 75, 85 2 1024 x 768 8 43i, 60, 70, 72, 75, 85 1 1024 x 768 15/16 43i, 60, 70, 72, 75 2 1280 x 1024 8 45i, 60, 72, 75 2 1600 x 1200 8 49i 2
Bits per
Pixel
Refresh Rates
(Hz)
Memory Required (MB)
Notes:
1. 43, 45, and 49 Hz are interlaced (i); all other refresh rates shown are noninterlaced.
2. If 2 MB of memory is required for the video mode, an optional 1 MB of memory must be installed in the system board.
Some application programs require video device drivers to use SVGA modes. If your computer has IBM-preinstalled software, the video device drivers are included and instructions are provided online. If your software is not preinstalled, the video device drivers are on the Ready-to-Configure CD.
Some application programs provide their own video device drivers to take advantage of SVGA modes. These device drivers are installed through a setup program built into the application program. Setting up these applications to operate in SVGA modes might be confusing because terminology for these modes is not consistent throughout the industry. If you are uncertain about the terminology used by your application program, refer to the documentation that comes with the application for additional information.
48 Using Your Personal Computer
Software Compatibility
The graphics controller can display application programs written for any of the following video modes. Monochrome graphics adapter (MGA), color graphics adapter (CGA), enhanced graphics adapter (EGA), multicolor graphics array (MCGA), and video graphics array (VGA) are all video standards used with earlier personal computers.
Video Standard
MGA 720 x 350 — CGA 320 x 200 4 EGA 640 x 350 16 MCGA 320 x 200
VGA 640 x 480 16
Monitor
Resolution
640 x 480
Colors
(1 MB DRAM)
256
2
Chapter 5. Using the Configuration/Setup Utility Program 49
Changing Serial Port Settings
If you add a serial adapter or use special hardware or software that causes a configuration conflict, you might need to change the serial port settings. The serial port can use any of the following settings:
The four available port addresses are (in hex): 3F8, 2F8, 3E8, 2E8.The two recommended IRQ assignments are: IRQ 4 and IRQ 3. You can also use
IRQ 9, IRQ 10, IRQ 11, IRQ 14, and IRQ 15, but these settings might not work with some operating systems and applications.
To change the serial port settings:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select Devices and I/O Ports from the Configuration/Setup Utility program menu.
3. Select Serial Port Setup.
4. Use the arrow keys to select the settings for Serial Port A Address or Serial Port A IRQ.
5. Press Esc to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the instructions on the screen.
Note: For more information on the serial ports, see Understanding Your Personal
Computer.
50 Using Your Personal Computer
Changing Parallel Port Settings
If you add a parallel adapter or use special hardware or software that causes a configuration conflict, you might need to change the parallel port settings.
The parallel port can operate in several different modes. The default mode for your computer is SPP (standard parallel port). However, your computer also supports the ECP/EPP (extended capabilities port/enhanced parallel port) mode. ECP/EPP has two advantages over SPP. When your computer is in ECP/EPP mode, you can print documents faster than when the computer is in SPP mode, and you can attach devices other than printers, such as communication and storage devices, to the parallel port. You can set modes of operation for the parallel port using the Configuration/Setup Utility program.
The parallel port can use any of the following settings:
The three available port addresses are (in hex): 3BC, 378, and 278.The two available IRQ assignments are: IRQ 7 and IRQ 5.
To change the parallel port settings:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select Devices and I/O Ports from the Configuration/Setup Utility program menu.
3. Select Parallel Port Setup.
4. Use the arrow keys to select the settings.
5. Press Esc to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the instructions on the screen.
Note: For more information on the parallel port, see Understanding Your Personal
Computer.
Chapter 5. Using the Configuration/Setup Utility Program 51
Changing Plug and Play Control Features
If you are installing a Plug and Play adapter or other device and experience problems, you might need to change certain settings in Plug and Play Control in the Configuration/Setup Utility program.
Note: If you experience any error message related to Plug and Play adapters or
devices, see “POST Error Message Charts” on page 77 for complete information on solving the problem.
A setting that might affect the way a Plug and Play adapter behaves is the Address Decode setting. Most Plug and Play adapters use 16-bit address decoding (this is the default setting for Address Decode.). Some Plug and Play adapters have not fully implemented this addressing scheme. If you are experiencing problems with a Plug and Play adapter, changing the address decoding to 10-bit might fix the problem. Conversely, if you are experiencing an 1852 error message, changing the address decode setting to 16-bit might fix the problem.
Another setting that affects any type of Plug and Play device is the Plug and Play Operating System setting. If you install a Plug and Play adapter or device and experience a 185x error messages, and your computer will be loading a Plug and Play-compliant operating system, set this value to Yes.
Note: Check your operating system documentation to determine if it supports this
function.
The 185x error messages occur because the computer is unable to configure all adapters and devices in the system due to conflicting resource assignments. Selecting Yes allows the configuration of Plug and Play devices to be performed by the operating system.
To change Plug and Play control settings, select Advanced Setup and then Plug and
Play Control. The next menu displays Address Decode and Plug and Play Operating System.
52 Using Your Personal Computer
Using Passwords
Two types of password protection are available to help you secure your computer and the information you store in it. The power-on password feature deters unauthorized persons from gaining access to the information stored in your computer. The administrator password feature helps prevent unauthorized persons from accessing the Configuration/Setup Utility program and changing the setup of your computer. If you are responsible for maintaining the settings of several computers, you might want to set an administrator password.
Other password security features might be available through your operating system or network.
Power-On Password
You do not need a power-on password to use your computer, but setting this type of password deters unauthorized persons from using your computer. When a power-on password is set, you must type the password at the password prompt that appears as the computer starts.
When you set the power-on password, you can choose one of three password prompt modes:
On In On mode, you are prompted for the power-on password when you
turn on the computer. Until the correct password is entered, the computer will not run the CONFIG.SYS or AUTOEXEC.BAT instructions, the operating system will not start, and the keyboard will remain locked. If you have a mouse connected to the mouse port, it also will remain locked. If you have a mouse connected to a serial port, it will be activated when the computer is started, regardless of whether a password is set.
9
Off In Off mode (also referred to as Unattended Start mode), you are not
prompted to enter your power-on password when you turn on the computer. The computer will run the CONFIG.SYS and AUTOEXEC.BAT instructions and start the operating system. However, if you have a mouse connected to the mouse port, refer to the following text box.
9
CONFIG.SYS and AUTOEXEC.BAT do not exist with some operating systems, such as Windows NT.
Chapter 5. Using the Configuration/Setup Utility Program
53
Important Information for Mouse Users
This information applies only to those who have a mouse connected to the mouse port; a serial mouse is not affected by the Off mode.
The Off mode prevents the computer from detecting that a mouse is attached. Because the mouse device driver will not be loaded automatically through the CONFIG.SYS or AUTOEXEC.BAT files in this mode, an error message that the mouse port is disabled will appear and the computer will halt. To enable the operating system to load without displaying the error message, read the information below that applies to your operating system.
If you are using OS/2, do one of the following before enabling the Off mode:
Set the CONFIG.SYS file so the operating system does not stop on
a device-driver error. To do this, put the command "PAUSEONERROR=NO" near the top of the CONFIG.SYS file.
or
Remove the mouse driver statement from the CONFIG.SYS file.
If you are using Windows 95, do the following:
When the computer is started and the mouse port disabled error
message appears, enter either your power-on or administrator password to enable the keyboard. Then use the keyboard to put a checkmark in the "Do not display this message in the future" checkbox.
Once the operating system starts in the Off mode, the keyboard will remain locked. If you have a mouse connected to the mouse port, it also will remain locked.
Although you are not prompted to type a password in this mode, you can type either your power-on or administrator password anytime after POST has completed, even after the operating system has loaded. If you type a password, the keyboard will unlock, but the mouse connected to the mouse port will remain disabled.
The Off mode is useful for network servers and other computers that operate unattended. If a power failure occurs, the computer will automatically restart and resume operating in this mode when power is restored, without operator intervention.
54 Using Your Personal Computer
Dual In Dual mode, the startup behavior of the computer depends on whether
the computer is started from the computer power switch or by an unattended method, such as a modem, timer, or Wake on LAN.
If you start the computer by using the power switch, the computer operates the same as it does in the On mode. Refer to page 53 for further information.
If the computer is started by an unattended method, such as remotely over a LAN, the computer operates the same as it does in Off mode. Refer to page 53 for further information.
Note: Even though the mouse and keyboard are not active, the system
can still be managed remotely by network management software, such as TME 10 NetFinity or Intel LANDesk.
If both a power-on and administrator password are set, you can type either of the passwords at the password prompt that appears as you start your computer. However, if you want to change any settings in the Configuration/Setup Utility program, you must type your administrator password at the password prompt that appears when you try to access the Configuration/Setup Utility program. If you type your power-on password at this prompt, you will be able to view limited information in the Configuration/Setup Utility program, but you will not be able to change any settings.
The password does not appear on the screen as you type it. If you type the wrong password, you receive a screen message telling you so. If you type the wrong password three times, you must turn off the computer and start again. When you type the correct password, the keyboard and mouse will unlock, and the computer will begin normal operation.
Chapter 5. Using the Configuration/Setup Utility Program 55
Setting and Changing a Power-On Password: Use the Configuration/Setup
Utility program to set or change a power-on password. You can use any combination of up to seven characters (A–Z, a–z, and 0–9) for this password.
Important
Keep a record of your power-on password in a secure place. When a power-on password has been set, you cannot activate the keyboard and mouse without first using the password. If you lose or forget your password, you cannot change or delete it without removing the computer cover and moving a jumper on the system board. Refer to “Erasing Lost or Forgotten Passwords” on page 60 for further information.
To set or change a power-on password:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Power-on Password.
4. Type your password and press Down Arrow ().
5. Type your password again.
6. At Password Prompt, select On, Off, or Dual. Press Left Arrow () or Right Arrow () to toggle between selections.
7. Select Change Power-on Password, and follow the instructions on the screen.
8. The System Security menu appears. Press Esc to return to the Configuration/Setup Utility program menu.
9. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
10. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
56 Using Your Personal Computer
Deleting a Power-On Password: Use the Configuration/Setup Utility program
to delete a power-on password.
To delete a power-on password:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Power-on Password.
4. Select Delete Power-on Password and follow the instructions on the screen.
5. The System Security screen appears. Press Esc to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the instructions on the screen.
Chapter 5. Using the Configuration/Setup Utility Program 57
Administrator Password
Setting an administrator password deters unauthorized persons from changing settings in the Configuration/Setup Utility program. When an administrator password is set, you can change settings in the Configuration/Setup Utility program only after typing the administrator password at the password prompt that appears when you try to access the Configuration/Setup Utility program.
If you are responsible for maintaining the settings of several computers, you might want to set an administrator password.
When you set an administrator password, a password prompt appears each time you try to access the Configuration/Setup Utility program. The password does not appear on the screen as you type it. If you type the wrong password, you receive a screen message telling you so. If you type the wrong password three times, you must turn off the computer and start again. When you type the correct password, the Configuration/Setup Utility program menu appears.
If both a power-on and administrator password are set, you can type either of the passwords at the password prompt that appears as you start your computer. However, if you want to change any settings in the Configuration/Setup Utility program, you must type your administrator password at the password prompt that appears when you try to access the Configuration/Setup Utility program. If you type your power-on password at this prompt, you will be able to view limited information in the Configuration/Setup Utility program, but you will not be able to change any settings.
58 Using Your Personal Computer
Setting and Changing an Administrator Password: Use the
Configuration/Setup Utility program to set or change an administrator password. You can use any combination of up to seven characters (A–Z, a–z, and 0–9) for the password.
Important
Keep a record of your administrator password in a secure place. When an administrator password has been set, you cannot access the Configuration/Setup Utility program without first using the administrator password. If you lose or forget your password, you cannot change or delete it without removing the computer cover and moving a jumper on the system board. Refer to “Erasing Lost or Forgotten Passwords” on page 60 for further information.
To set or change an administrator password:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Administrator Password.
4. Type your password and press Down Arrow ().
5. Type your password again.
6. At Power-On Password Changeable by User, select Yes or No. Press Left Arrow () or Right Arrow () to toggle between selections. (If you select Yes, the user will be able to change the power-on password if an administrator password is set. If you select No, the user will not be able to change the power-on password if an administrator password is set.)
7. Select Set or Change Administrator Password and follow the instructions on the screen.
8. The Administrator Password menu appears. Press Esc twice to return to the Configuration/Setup Utility program menu.
9. Before you exit from the Configuration/Setup Utility program, select Save Settings from the Configuration/Setup Utility program menu.
10. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Chapter 5. Using the Configuration/Setup Utility Program 59
Deleting an Administrator Password: Use the Configuration/Setup Utility
program to delete an administrator password.
To delete an administrator password:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Administrator Password.
4. Select Delete Administrator Password and follow the instructions on the screen.
5. The System Security screen appears. Press Esc to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the instructions on the screen.
Erasing Lost or Forgotten Passwords
To erase a lost or forgotten power-on or administrator password, you must remove the computer cover and move the CMOS-clear jumper (also referred to as the
password jumper) on the system board. See Installing Options in Your Personal Computer for instructions on removing the computer cover and moving jumpers.
Refer to the system board label inside the computer cover for the location of the CMOS-clear (password) jumper.
Important
If you move the CMOS-clear jumper, the Configuration/Setup Utility program will load the default settings. You will need to reconfigure the computer. Use the Configuration/Setup Utility program to reconfigure the computer and to set a new password.
If your model has integrated Ethernet support, note that erasing the computer configuration erases special factory settings for the primary startup sequence. For more information on these settings, see “Network-Enabled Startup Sequence” on page 66.
60 Using Your Personal Computer
Using Advanced Power Management Features
Your computer comes with built-in energy-saving capabilities. You can view and change energy-saving settings using the Advanced Power Management menu in the Configuration/Setup Utility program. This section describes the Advanced Power Management features in your computer and provides instructions for using these features.
Important
If a device, such as a monitor, does not have power-management capabilities, it can be damaged when exposed to a reduced-power state. Before you make energy-saving selections for your monitor, check the documentation that comes with your monitor to see if it supports Display Power Management Signaling (DPMS).
Automatic Hardware Power Management Features
With Automatic Hardware Power Management, you can have the computer, microprocessor, and monitor (if the monitor supports DPMS) go into reduced-power states if they are inactive for a certain length of time.
There are three levels of power management. For each level, you can specify the amount of time that the computer must be inactive before the power management options you select begin to take effect. For Level 1, you can select 5 minutes to 4 hours; for Level 2, you can select 10 minutes to 5 hours; and for Level 3, you can select 15 minutes to 6 hours. At each level, you can define the amount of energy savings by specifying values for the following options.
System Power: With this option, you can select On if you want the computer
to remain on, or Off if you want the computer to shut down.
Processor Speed: With this option, you can set your microprocessor to run at 1,
10, 25, or 50 percent of its internal clock speed, or you can disable the microprocessor entirely. Any computer activity returns the microprocessor to full speed.
Chapter 5. Using the Configuration/Setup Utility Program 61
Display: With this option, you can disable the monitor entirely, or select one of
the following reduced-power states:
Standby: In this mode, the screen is blanked, but the screen image is
restored immediately when any activity is detected.
Suspend: In this mode, the monitor uses less power than in Standby mode.
The screen is blanked, but the screen image is restored within a few seconds after any activity is detected.
Off: In this mode, the monitor power is turned off. To restore power to
the monitor, you must press the monitor power switch.
Hard Disk Drive: With this option, you can enable the hard disk drive to “spin
down” (shut down the drive motor) after about 20 minutes of inactivity on the drive. When you attempt to read from or write to the hard disk, the spindle starts back up within a few seconds.
Setting Automatic Hardware Power Management Features: To set
Automatic Hardware Power Management features, complete the following steps.
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select Advanced Power Management from the Configuration/Setup Utility program menu.
3. Be sure APM BIOS Mode is set to Enabled. If it is not, press Left Arrow () or Right Arrow () to change the setting.
4. Select Automatic Hardware Power Management.
5. Set Automatic Hardware Power Management to Enabled.
6. Select values for the three levels of power management (system power, processor speed, and display), as necessary.
7. Set Hard Disk to Enabled or Disabled.
8. Press Esc twice to return to the Configuration/Setup Utility program menu.
9. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
10. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
62 Using Your Personal Computer
Automatic Power On Features
The Automatic Power On features within the Advanced Power Management menu allow you to enable and disable features that turn your computer on automatically.
Serial Port/Modem Ring Detect: Set this feature to Enabled to allow your
system to power on when a ring is detected on an internal modem or on a modem connected to a serial port.
Wake Up on Alarm: With this feature, you can specify a date and time at
which the computer will be turned on automatically. This can be either a single event or a daily event.
Wake on LAN: If your computer has a properly configured Ethernet LAN
connection and you have network-management software, you can use the IBM-developed Wake on LAN feature. When you set Wake on LAN to Enabled, your computer will turn on when it receives a specific signal from another computer over the LAN. For more information, see “Wake on LAN” on page 69.
Setting Automatic Power On Features: To set Automatic Power On features,
complete the following steps.
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select Advanced Power Management from the Configuration/Setup Utility program menu.
3. Select Automatic Power On.
4. Select the menu item for which you want to view or change settings. Use Left Arrow () or Right Arrow () to toggle between selections.
5. Press Esc twice to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the instructions on the screen.
Chapter 5. Using the Configuration/Setup Utility Program 63
System Management Settings
This section, which describes how to configure the network interface in your computer, is intended primarily for network administrators. For further information on the system management capabilities of your computer, refer to “Using System Management Features” on page 32.
The Configuration/Setup Utility program includes settings that can be enabled and disabled to configure the network interface in your computer. These settings are:
Ethernet support
Remote program load (RPL) and dynamic host configuration protocol (DHCP)Automatic power on startup sequenceWake on LANUpdate POST/BIOS from network
If you have an integrated Ethernet subsystem, you can also view the media access control (MAC) address for your computer in the Configuration/Setup Utility program. To access the MAC address, select Devices and I/O Ports from the Configuration/Setup Utility program menu, and then select Ethernet Setup. You can view but not change the MAC address setting.
Instructions for accessing the other system management settings in the Configuration/Setup Utility program follow.
Ethernet Support
This setting is used to enable or disable the integrated Ethernet controller in your computer. The setting is enabled by default.
If you do not use the integrated Ethernet, disable the Ethernet Support setting. By doing this, you free up system resources that can be used for optional adapters.
To access the Ethernet Support setting, select Devices and I/O Ports and then
Ethernet Setup from the Configuration/Setup Utility program menu. Note: The serial number for the system board integrated Ethernet is 10000000. You
might need this information if you install optional network adapters.
64 Using Your Personal Computer
RPL and DHCP
Remote program load (RPL) enables your computer to start directly from a server over a LAN that has been configured for RPL. Network-management software, such as LANClient Control Manager, is required to take advantage of RPL.
Dynamic host configuration protocol (DHCP) makes it possible for a DHCP server
10
on your intranet
to assign an internet protocol (IP) address to your computer so that a boot image can be remotely loaded. DHCP can be used by network-management software such as Intel LANDesk Configuration Manager.
Models with an integrated Ethernet subsystem are enabled to use RPL and DHCP as selected through the Configuration/Setup Utility program. A model without the integrated Ethernet can also use these features, but only if it is equipped with an optional network adapter that has built-in read-only memory (ROM) support for RPL or DHCP. See the documentation that comes with the optional adapter for more information.
If you install an optional network adapter with those models that have integrated Ethernet, disable Ethernet Support if you want to use the RPL or DHCP features of the optional adapter. See “Ethernet Support” on page 64 for information on disabling the integrated Ethernet subsystem.
To enable or disable RPL or DHCP, complete the following steps:
1. Start the Configuration/Setup Utility program (see “Starting the Configuration/Setup Utility Program” on page 39).
2. Select Devices and I/O Ports from the Configuration/Setup Utility program menu, and then select Ethernet Setup.
3. Set Ethernet Support to Enabled.
4. Under Network Boot, use the arrow keys to select RPL or DHCP. (Select Disabled if you do not want to start an operating system from the network.)
5. Press Esc until you return to the Configuration/Setup Utility program menu.
6. Select Start Options, and then select Startup Sequence. You must include the Network setting somewhere in your startup sequence.
10
An intranet is a network within an organization that provides services similar to those provided by the
Internet, but that is not necessarily connected to the Internet.
Chapter 5. Using the Configuration/Setup Utility Program
65
7. Refer to “Exiting from the Configuration/Setup Utility Program” on page 43 for instructions on saving your settings and exiting from the Configuration/Setup Utility program.
Note: When you are using the RPL and DHCP features, you might encounter error
messages specific to the integrated Ethernet subsystem. If this happens, record the error message and report the problem to your network administrator. Also, information about these error messages is documented in “Error Messages Specific to the Integrated Ethernet” on page 107.
Network-Enabled Startup Sequence: If your computer is equipped with the
integrated Ethernet subsystem, the settings for the primary startup sequence have been factory-changed to support network-management software, such as LANClient Control Manager. If your computer is properly configured, you can use these settings to perform a remote program load each time your computer is started.
Note: These factory settings are not the default settings for your computer. If the
default settings are ever restored, the factory settings will be erased. (For the default settings, see “Default Settings for the Startup Sequence” on page 68.) If the default settings are loaded, you can always change these settings back to the values shown in the table below.
To view or change any of the startup sequence settings, select Start Options from the Configuration/Setup Utility program menu, and then select Startup Sequence. The primary startup sequence is the first group of startup devices that you see. The factory settings for these devices are listed below.
First Startup Device Diskette Drive 0 Second Startup Device Network (RPL) Third Startup Device Hard Disk Drive 0 Fourth Startup Device Disabled
As the above settings imply, once your computer is started (and there is no flash diskette loaded in the diskette drive), the computer tries to perform an RPL over a network. When this happens, the following message appears on the screen.
Press "Home" key to cancel RPL
If your computer is properly connected to a LAN, RPL will continue to run until it is successful or until you cancel it by pressing the Home key. If your computer is
11
Although RPL does not show up in this menu, this is the action (remote program load) that is taking
place when the second startup device is accessed. You can change this setting in the Ethernet Setup menu, under Network Boot. See “RPL and DHCP” on page 65 for more information.
66 Using Your Personal Computer
11
not connected to a LAN or if you cancel RPL, the computer accesses the third startup device, the hard disk drive, and attempts to load the operating system. Note that if you have enabled DHCP under Network Boot (in Ethernet Setup menu) instead of RPL, the following message also appears on the screen each time a network boot occurs.
Press "Spacebar" to Boot from Network
If your computer is properly connected to a LAN, you must press the spacebar to invoke DHCP. If the computer is not connected to LAN or if you cancel RPL by pressing the Home key, the computer bypasses DHCP and accesses the third startup device.
Important
If you do not plan to use the integrated Ethernet subsystem, disable it. For more information, see “Ethernet Support” on page 64. If you disable the integrated Ethernet, the RPL or DHCP message will not appear on the screen each time you start the computer.
If you see an error message associated with RPL or DHCP, refer to “Error Messages Specific to the Integrated Ethernet” on page 107 for more information.
Chapter 5. Using the Configuration/Setup Utility Program 67
Default Settings for the Startup Sequence: The default settings for the startup
sequence of your computer are shown below. Default settings differ between those computers that have integrated Ethernet and those computers that do not. To view or change any of the startup sequence settings, select Start Options from the Configuration/Setup Utility program menu, and then select Startup Sequence.
Note: If you decide to load the default settings, the values shown in
“Network-Enabled Startup Sequence” on page 66 will change.
The following are the default settings for those computers that do have an integrated Ethernet subsystem.
Menu Item Setting
Start Options Startup Sequence
First Startup Device Diskette Drive 0 Second Startup Device Hard Disk Drive 0 Third Startup Device Network (RPL) Fourth Startup Device Disabled
Automatic Power On Startup Sequence Enabled
First Startup Device Network Second Startup Device Hard Disk Drive 0 Third Startup Device Disabled Fourth Startup Device Disabled
The following are the default settings for those computers that do not have an integrated Ethernet subsystem.
Menu Item Setting
Start Options Startup Sequence
First Startup Device Diskette Drive 0 Second Startup Device Hard Disk Drive 0 Third Startup Device Disabled Fourth Startup Device Disabled
Automatic Power On Startup Sequence Enabled
First Startup Device Hard Disk Drive 0 Second Startup Device Disabled Third Startup Device Disabled Fourth Startup Device Disabled
68 Using Your Personal Computer
Automatic Power On Startup Sequence
When your computer is turned on remotely, the Automatic Power On Startup Sequence determines the order of the startup devices. The startup device is the device that will be used to load the operating system. The settings for the Automatic Power On Startup Sequence are used in conjunction with the automatic power on features in your computer, such as Serial Port/Modem Ring Detect, Wake on Alarm, and Wake on LAN.
To access the Automatic Power On Startup Sequence settings, select Start Options from the Configuration/Setup Utility program menu, and then select Startup
Sequence.
Wake on LAN
This setting is used to enable or disable the IBM-developed Wake on LAN feature, which makes it possible for your computer to be powered on remotely by a network administrator. Remote network-management software must be used to support Wake on LAN. Examples of such software are LANClient Control Manager and TME 10 NetFinity.
To access the Wake on LAN setting, select Advanced Power Management, and then select Automatic Power On from the Configuration/Setup Utility program menu.
Note: To use Wake on LAN with an optional network adapter, the adapter must
support Wake on LAN and be properly configured.
Update POST/BIOS from Network
When this feature is enabled, the POST/BIOS in your computer can be updated remotely by a network administrator. If you have set an administrator password for your computer, it does not have to be entered by the network administrator. Network management software is required in order to take advantage of this feature.
To access this setting, select System Security from the Configuration/Setup Utility program menu, and then select POST/BIOS Update.
Chapter 5. Using the Configuration/Setup Utility Program 69
70 Using Your Personal Computer
Chapter 6. Solving Problems
Computer problems can be caused by hardware, software, or user error (for example, pressing the wrong key). Using the diagnostic aids discussed in this chapter, you might be able to solve such problems yourself or gather helpful information you can pass on to a service technician.
You can check the hardware by following the procedures in this chapter. You can also use the diagnostic programs provided with your computer (see “Diagnostic Programs” on page 104 for a description of these programs).
If the hardware checks out OK, and you have not made a user error, you might have a software problem. If you suspect that you have a software problem and your computer came with IBM-preinstalled software, refer to About Your Software and the operating system documentation that comes with your computer. If you have installed software applications yourself, consult the documentation that comes with the software.
Copyright IBM Corp. 1996, 1997 71
Error Messages
Error messages that appear on the screen might be text, numeric, or both. There are several types of error messages:
POST error messages
Messages that appear when POST finds problems with the hardware during startup or when a change in the hardware configuration is found. POST error messages are 3-, 4-, 5-, 8-, or 12-character alphanumeric messages and include brief explanations (except I999XXXX errors).
For more information about what caused an error message to appear and what action to take, refer to “Solving POST Problems” on page 74 and “POST Error Message Charts” on page 77.
Software-generated error messages
Messages that appear if a problem or conflict is detected by the application program, the operating system, or both. Error messages for operating-system and other software problems are generally text messages, but they also can be numeric messages. For information about these software error messages, refer to the information that comes with the operating system or application program, or both.
Diagnostic error messages
Messages that appear if a hardware problem is detected by a diagnostic test program. The messages present text information that can be used to identify a failing part.
Integrated Ethernet-specific error messages
Messages that appear if a problem arises with the integrated Ethernet and the RPL or DHCP environments. These messages are specific to the integrated Ethernet controller and software code of your computer.
72 Using Your Personal Computer
Power-On Self-Test
Each time you turn on your computer, it performs a series of tests that check the operation of the base computer. This series of tests is called the power-on self-test (POST).
POST does the following:
Checks basic system-board operationsChecks the memory operationCompares the current system configuration with that established by the
Configuration/Setup Utility program
Starts the video operationVerifies that the diskette drives are workingVerifies that the hard disk drive and the CD-ROM (if installed) are working
As POST starts, numbers showing the amount of memory being tested appear in the upper-left corner of the screen until the total amount of memory in the system is reached. Options for running a fast POST or accessing the Configuration/Setup Utility program appear in the lower-left corner of the screen.
Note: The amount of available memory shown might be somewhat less than
expected because of basic input/output system (BIOS) shadowing in random access memory (RAM).
If POST finishes without detecting any problems, you will hear one beep and the first screen of your operating system or application program appears (if you have not set a power-on password). If you have set a power-on password, a password prompt appears. You must enter your password before the first screen of your operating system or application program will appear. (For further information on using passwords, refer to “Using Passwords” on page 53.)
If POST detects a problem, you will hear multiple beeps or no beep. In most cases, an error code appears in the top left corner of the screen, and in some cases a description of the error is displayed beside the code. (Note that the screen will sometimes display multiple error codes and descriptions.) For more information about what caused an error message to appear and what action to take, refer to “Solving POST Problems” on page 74 and “POST Error Message Charts” on page 77.
If you do not hear a beep during POST, refer to “Troubleshooting Charts” on page 96. You might need to have your computer serviced.
Chapter 6. Solving Problems 73
Solving POST Problems
If you receive an error message during the power-on self-test (POST), completing the steps outlined in this section might enable you to resolve the problem.
Note
If you have just added, removed, or changed the location of a device and you receive an error message, follow the procedure on page 44. If this does not eliminate the error message, proceed with the following instructions.
1. Write down all error code numbers and descriptions that appear on the screen as you start your computer. (Note that a single problem can cause several error messages to appear. When you correct the cause of the first error message, the other error messages probably will not appear on the screen the next time you turn on your computer.)
2. If you have set a power-on password, a password prompt appears. If you have set both power-on and administrator passwords, you can type either of the passwords at the password prompt. However, if you think you might need to change any settings in the Configuration/Setup Utility program, you must type your administrator password at the password prompt. If you type your power-on password, you will be able to view error codes and error code descriptions displayed on the POST Startup Errors screen, and you will also be able to view limited information in the Configuration/Setup Utility program. However, you will not be able to change any settings.
3. In the case of most errors, the Configuration/Setup Utility program starts automatically so that you can attempt to identify and correct the problem. When the Configuration/Setup Utility program starts, a screen labeled POST Startup Errors appears. (Note that the POST Startup Errors screen does not appear immediately. You must wait approximately one minute.) If the POST Startup Errors screen does not appear, proceed to step 6.
4. At the POST Startup Errors screen, select Continue if you want to access the Configuration/Setup Utility program menu. Select Exit Setup if you want to exit the Configuration/Setup Utility program. (See the Important text box in step 5 for information on exiting the Configuration/Setup Utility program without making any changes to current settings.) To select an item, press Up Arrow () or Down Arrow () to highlight the item, and then press Enter.
74 Using Your Personal Computer
5. If you selected Continue in step 4, the Configuration/Setup Utility program
menu appears on the screen. You will see a pointer next to any menu items that are malfunctioning or that have been changed since the last time you turned on your computer. If you did not knowingly make a change to a flagged menu item, there is likely a malfunction in that item. If you made a change, continue here. If you did not make a change, go to step 5e.
To use the Configuration/Setup Utility program, do the following:
a. Select the menu item that is flagged (or that you wish to view) by pressing
Up Arrow () or Down Arrow (), and then press Enter.
b. A new menu specific to the item that you selected appears. Press Left
Arrow () or Right Arrow () to toggle between choices for a menu item. (Note that each menu item has a Help screen. To view the Help screen, select the menu item, and then press F1.)
c. When you have finished viewing and changing settings, press Esc to return
to the Configuration/Setup Utility program menu.
d. Before you exit from the program, select Save Settings. When you exit
from the Configuration/Setup Utility program menu (see step 5e), your operating system will start automatically (unless there is an unresolved problem with the IDE hard disk drive).
Important
If you did not change any settings in the Configuration/Setup Utility program, note the following:
You will get an error message if you exit from the
Configuration/Setup Utility program without saving settings. Your operating system will not start, but the computer will automatically restart. When the computer restarts, you will get a POST error message, and then the Configuration/Setup Utility program will again start automatically.
You will not get an error message if you select save the settings and
exit the Configuration/Setup Utility program. Your system will save all settings as they currently appear in the Configuration/Setup Utility program and your operating system will start (unless there is an unresolved problem with an IDE device).
e. To exit from the Configuration/Setup Utility program, press Esc and follow
the instructions on the screen.
Chapter 6. Solving Problems 75
6. For more information about what caused an error message to appear and what action to take, refer to the following chart.
Problem Go to:
POST error code or message appears. “POST Error Message Charts” on page 77.
After more than one beep, application program or operating system appears.
Blank screen, unreadable screen, or other unusual response occurs.
“Diagnostic Programs” on page 104.
“Troubleshooting Charts” on page 96.
If you are unable to resolve a problem and need assistance, refer to Chapter 7, “Getting Help, Service, and Information” on page 109.
76 Using Your Personal Computer
POST Error Message Charts
The computer might display more than one error message. Often, the first error to occur causes subsequent errors. When using the POST message charts in this section, always begin by following the suggested action for the first error message that appears on your computer screen. Note that, in these charts, “X” can be any alphanumeric character.
Important
If you find it necessary to remove the computer cover, see Installing Options in Your Personal Computer.
POST Message Description
101 102
110 A memory parity failure occurred during testing of the system board.
114 An adapter read-only memory (ROM) error occurred.
121 A hardware error occurred.
A failure occurred during testing of the system board and microprocessor.
Action: Have the computer serviced.
Action: Run the diagnostic programs to verify that a problem exists in a
DIMM. (See “Diagnostic Programs” on page 104 for information about diagnostic programs provided with your computer.)
Refer to Installing Options in Your Personal Computer if you need to reconfigure the system memory to aid in identifying the defective DIMM.
If you cannot identify the defective DIMM in this way, have the computer serviced.
Action: Remove all adapters that are not required for system startup and reinstall them one at a time, retesting after each is reinstalled. When an adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer serviced.
Action: Have the computer serviced.
Chapter 6. Solving Problems 77
POST Message Description
161 The battery on the system board is dead.
CAUTION: Danger of explosion if lithium battery is incorrectly replaced.
Replace the battery with the same or equivalent type recommended by the manufacturer. Dispose of batteries as required by local ordinances or regulations. (See “Lithium Battery Notice” on page vii and “Replacing the Battery” on page 37 for important information on battery use, disposal, and replacement.)
Action: The computer can be used until you replace the battery.
However, you will have to run the Configuration/Setup Utility program to set the time and date each time the computer is turned on until a new battery is installed. (For instructions on using the Configuration/Setup Utility program, see Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.)
162 A change in device configuration occurred. This message is displayed
under one or more of the following conditions:
A new device has been installed.A device has been moved to a different location or cable connection.A device has been removed or disconnected from a cable.A device is failing and is no longer recognized by the computer as
being installed.
An external device is not turned on.An invalid checksum is detected in CMOS memory (nonvolatile RAM).
Action:
1. Verify that all external devices are turned on. External devices must be turned on before the computer is turned on.
2. Verify that all devices are properly installed and securely connected.
3. If you added, removed, or changed the location of a device, you must save the new configuration in the Configuration/Setup Utility program. Refer to page 44 for further information and instructions on saving the configuration.
4. If you did not add, remove, or change the location of a device, a device is probably failing. Running the diagnostic programs might isolate the failing device. (See “Diagnostic Programs” on page 104 for information about diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer serviced.
78 Using Your Personal Computer
POST Message Description
163 The clock is not working correctly.
Action: Set the correct date and time. If the date and time are set correctly and saved and the 163 error message reappears, replace the battery.
If this does not correct the problem, have the computer serviced. Note: The computer can be used until it is serviced, but any application
programs that use the date and time will be affected.
164 A change in the memory configuration occurred. This error can be caused
by adding, removing, or incorrectly installing memory. Note: The computer can be used with decreased memory capacity until
the error is corrected.
Action:
1. If you added memory, see Installing Options in Your Personal Computer to verify that the new memory is correct for your computer and that it is installed correctly.
2. If you added or removed memory, you must save the new configuration in the Configuration/Setup Utility program. Refer to page 44 for further information and instructions on saving the configuration.
3. Running the diagnostic programs might isolate the location of the problem DIMM and provide additional information. (See “Diagnostic Programs” on page 104 for information about diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer serviced.
20X A failure occurred during testing of the memory. This error can be caused
by incorrectly installed memory, a failing DIMM, or a system-board failure.
Action:
1. If you have added memory, see Installing Options in Your Personal Computer and Chapter 5, “Using the Configuration/Setup Utility
Program” on page 39 of this booklet to verify that the new memory is correct for your computer, and that it is installed and configured correctly.
2. Run the diagnostic programs to verify the problem. (See “Diagnostic Programs” on page 104 for information about diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 79
POST Message Description
301 303
601 A failure occurred during testing of the diskette drive and diskette-drive
602 The computer is not able to start the diskette in the drive. The diskette
A failure occurred during testing of the keyboard and keyboard controller. These error messages also might be accompanied by continuous beeping.
Action:
Ensure that:
1. Nothing is resting on the keyboard and pressing a key.
2. No key is stuck.
3. The keyboard cable is securely attached to the keyboard connector on the computer. (For the location of the keyboard connector, refer to “External Connectors” on page 11.)
Note: If you have just connected a new mouse or other pointing device,
turn the computer off and disconnect that device. Wait at least 5 seconds, and then turn the computer on. If the error message goes away, replace the device. If the error message remains, have the keyboard and cable or the computer serviced.
controller. This error can be caused by a loose or incorrectly connected cable, a failing drive, or a failing system board.
Note: The computer can be used, but one or more diskette drives might
not work.
Action: Verify that all diskette drive cables are properly installed and securely connected.
Running the diagnostic programs might isolate the diskette drive that failed, but you must have your computer serviced. (See “Diagnostic Programs” on page 104 for information about diagnostic programs provided with your computer.)
might be damaged or formatted incorrectly. Action: Try another startable diskette that is formatted correctly and is in
good condition. (For information and instructions on formatting diskettes, refer to “Formatting Diskettes” on page 27 and your operating system documentation.)
If this does not correct the problem, have the computer serviced.
80 Using Your Personal Computer
POST Message Description
604 A failure occurred during the testing of a diskette drive.
Action:
1. Verify that the Configuration/Setup Utility program correctly reflects the type of diskette drive you have installed. (For instructions on using the Configuration/Setup Utility program, refer to Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.)
2. Run the diagnostic programs. (See “Diagnostic Programs” on page 104 for information about diagnostic programs provided with your computer.)
3. If the diagnostic programs detect a failure, replace the diskette drive.
If the problem cannot be isolated and corrected, have the computer serviced.
662 A diskette drive configuration error occurred.
Action:
1. Verify that the Configuration/Setup Utility program correctly reflects the number of diskette drives you have installed. (For instructions on using the Configuration/Setup Utility program, refer to Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.)
2. If you installed or removed a diskette drive, you must save the new configuration in the Configuration/Setup Utility program. Refer to page 44 for further information and instructions on saving the configuration.
If this does not correct the problem, have the computer serviced.
Chapter 6. Solving Problems 81
POST Message Description
1762 An IDE configuration error occurred. This could be caused by one of the
following:
A hard disk or other IDE drive (such as an IDE CD-ROM drive) was
added or removed, but the changes to the Configuration/Setup Utility program have not yet been saved. Refer to page 44 for further information and instructions on saving the configuration.
A hard disk or other IDE drive was added, but the master/subordinate
(slave) setting on the drive is improperly set.
The power or IDE cable is disconnected or not fully seated.A hard disk drive is failing.
Action: Verify that the Configuration/Setup Utility program correctly reflects the number of IDE drives installed (hard disk drives, CD-ROM drives, and so on). For more information, refer to Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.
If the information is correct, save the settings, exit from the Configuration/Setup Utility program, and restart the computer.
If the information is not correct, do the following.
1. Exit from the Configuration/Setup Utility program without saving the settings.
2. Verify that the power cable and IDE cable are fully seated into the drive connectors, and the IDE cable is fully seated into the connector on the system board.
3. If you just added a new drive, verify that the drive you added has the master-subordinate (slave) setting set correctly. If the new drive is the only drive attached to the IDE cable, it must be set as the master. If it is the second drive on the IDE cable, it must be set as the subordinate.
Note: If you installed two new drives on the same cable, ensure that
one is set as a master and one is set as a subordinate.
See the instructions that came with your new drive for the jumper locations and settings.
4. Restart the computer. If the 1762 error message appears again, verify that the IDE drive information in the Configuration/Setup Utility program is correct. If it is correct, save the information and restart the computer. If the information is still incorrect, you might have a failing drive. Have the computer serviced.
82 Using Your Personal Computer
POST Message Description
178X A failure occurred during testing of the hard disk drive or a primary or
secondary IDE device.
Action:
1. Run the diagnostic programs. (See “Diagnostic Programs” on page 104 for information about diagnostic programs provided with your computer.)
2. If the diagnostic programs detect a failure, replace the defective hard disk drive or primary or secondary IDE or EIDE device.
If the problem cannot be isolated and corrected, have the computer serviced.
1800 A PCI adapter has requested a hardware interrupt that is not available.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the Configuration/Setup Utility program. If the hardware interrupt settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer and Understanding Your Personal Computer. For information about required interrupt resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility program, see Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all hardware interrupts are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make an interrupt available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the hardware interrupt
used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make an interrupt available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 83
POST Message Description
1801 A PCI adapter has requested memory resources that are not available.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the Configuration/Setup Utility program. If the memory resource settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required memory resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility program, see Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all memory resources are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make memory available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory resources
used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make memory available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
84 Using Your Personal Computer
POST Message Description
1802 A PCI adapter has requested an I/O address that is not available, or the
PCI adapter might be defective.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the Configuration/Setup Utility program. If the I/O address settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required I/O resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility program, see Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all I/O addresses are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make an I/O address available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the I/O address used
by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make an I/O address available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 85
POST Message Description
1803 A PCI adapter has requested a memory address that is not available, or the
PCI adapter might be defective.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the Configuration/Setup Utility program. If the memory address settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required memory resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility program, see Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all memory addresses are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make a memory address available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory address
used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make a memory address available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
86 Using Your Personal Computer
Loading...