Before using this information and the product it supports, be sure to read the general information
under Appendix B, “Product Warranties, License Information, and Notices” on page 121.
Second Edition (April 1997)
The following paragraph does not apply to the United Kingdom or any country where such provisions
are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied
warranties in certain transactions, therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time.
This publication was developed for products and services offered in the United States of America. IBM
may not offer the products, services, or features discussed in this document in other countries, and the
information is subject to change without notice. Consult your local IBM representative for information
on the products, services, and features available in your area.
Requests for technical information about IBM products should be made to your IBM reseller or IBM
marketing representative.
Copyright International Business Machines Corporation 1996, 1997. All rights reserved.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or
disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Electrical current from power, telephone, and communication
cables is hazardous. To avoid shock hazard, connect and
disconnect cables as shown below when installing, moving or
opening the covers of this product or attached devices. The
power cord must be used with a properly grounded outlet.
To Connect
Turn everything OFF.
To Disconnect
Turn everything OFF.
First, attach all cables to devices.
Attach signal cables to
receptacles.
Attach power cord to outlet.
Turn device ON.
12
In the U.K., by law, the telephone
cable must be connected after the
power cord.
1
First, remove power cord from
2
outlet.
Remove signal cables from
receptacles.
Remove all cables from devices.
In the U.K., by law, the power
cord must be disconnected after the
telephone line cable.
Copyright IBM Corp. 1996, 1997 v
Laser Compliance Statement
Some IBM Personal Computer models are equipped from the factory with a
CD-ROM drive. CD-ROM drives are also sold separately as options. The CD-ROM
drive is a laser product. The CD-ROM drive is certified in the U.S. to conform to
the requirements of the Department of Health and Human Services 21 Code of
Federal Regulations (DHHS 21 CFR) Subchapter J for Class 1 laser products.
Elsewhere, the drive is certified to conform to the requirements of the International
Electrotechnical Commission (IEC) 825 and CENELEC EN 60 825 for Class 1 laser
products.
When a CD-ROM drive is installed, note the following.
CAUTION:
Use of controls or adjustments or performance of procedures other than those
specified herein might result in hazardous radiation exposure.
Opening the CD-ROM drive could result in exposure to hazardous laser radiation.
There are no serviceable parts inside the CD-ROM drive. Do not open.
Some CD-ROM drives contain an embedded Class 3A or Class 3B laser diode. Note
the following.
DANGER
Laser radiation when open. Do not stare into the beam, do not view
directly with optical instruments, and avoid direct exposure to the beam.
viUsing Your Personal Computer
Lithium Battery Notice
CAUTION:
Danger of explosion if battery is incorrectly replaced.
When replacing the battery, use only IBM Part Number 33F8354 or an equivalent
type battery recommended by the manufacturer. The battery contains lithium
and can explode if not properly used, handled, or disposed of.
Do not:
Throw or immerse into water
Heat to more than 100°C (212°F)
Repair or disassemble
Dispose of the battery as required by local ordinances or regulations.
ATTENTION
Danger d'explosion en cas de remplacement incorrect de la batterie.
Remplacer uniquement par une batterie IBM de type 33F8354 ou d'un type
équivalent recommandé par le fabricant. La batterie contient du lithium et peut
exploser en cas de mauvaise utilisation, de mauvaise manipulation ou de mise au
rebut inappropriée.
Ne pas :
Lancer ou plonger dans l'eau
Chauffer à plus de 100°C (212°F)
Réparer ou désassembler
Mettre au rebut les batteries usagées conformément aux règlements locaux.
Safety Informationvii
viiiUsing Your Personal Computer
About This Book
This book will help you become familiar with your IBM Personal Computer and its
many features. It describes how to configure, operate, and maintain your computer.
In the unlikely event you experience problems, you will also find helpful
troubleshooting information, as well as instructions for obtaining service in this
book.
The book is organized as follows:
Chapter 1, "Your IBM Personal Computer," contains an overview of the features
of your computer.
Chapter 2, "Arranging Your Workspace," contains information about setting up
your work area to optimize use of your computer. Safety considerations are
also discussed.
Chapter 3, "Operating Your Computer," contains instructions for the day-to-day
operation of your computer, such as starting and shutting down your computer,
using a diskette or CD-ROM drive, and using system management features.
Chapter 4, "Taking Care of Your Computer," contains information about the
proper handling and care of your computer.
Chapter 5, "Using the Configuration/Setup Utility Program," contains
information about configuration procedures.
Chapter 6, "Solving Problems," contains information that will help you identify
and correct problems that might arise as you use your computer.
Chapter 7, "Getting Help, Service, and Information," contains a description of
the wide variety of resources available from IBM to assist you in the use of your
computer. This chapter also describes how to obtain additional information
about IBM products.
Appendix A, "Computer Records," contains forms for recording information
about your computer, which can be helpful if you decide to install any
additional options, or if you ever need to have your computer serviced.
Appendix B, "Product Warranties, License Information, and Notices," contains a
copy of the warranty and license agreement for your computer, as well as legal
notices and trademark information.
Copyright IBM Corp. 1996, 1997 ix
Related Publications
The following publications, together with this book, contain information about your
computer.
Setting Up Your Personal Computer
This publication contains instructions to help you set up your computer.
Installing Options in Your Personal Computer
This publication contains instructions for adding memory, adapters, drives, and
other options to your computer.
Understanding Your Personal Computer
This online publication (provided only with computers that have preinstalled
software) includes general information about using personal computers and
in-depth information about the specific features of your computer. To purchase
a printed copy of this publication, refer to “Ordering Publications” on page 115.
About Your Software
This publication (provided only with computers that have preinstalled software)
contains information about the preinstalled software package.
Your Ready-to-Configure CD
This publication contains information about the Ready-to-Configure CD that
comes with your computer. The publication also contains instructions for
starting the CD.
The following publications contain more information about your computer. Both
publications can be found on the Internet at http://www.pc.ibm.com/cdt or can be
ordered from IBM. To purchase a copy, refer to “Ordering Publications” on
page 115.
Hardware Maintenance Manual
This publication contains information for trained service technicians.
Technical Information Manual
This publication contains information for individuals who want to know more
about the technical aspects of their computer.
xUsing Your Personal Computer
Identifying Your Computer
In most instances, the best way to identify your computer is by the model/type
number. The model/type number indicates the various features of the computer,
such as the type of microprocessor or whether the computer is a desktop or
minitower. You can find this number on the small label on the front of your
computer. An example of a model/type number is 6282-54A.
Throughout this book, however, your computer is identified by the number of drive
bays offered with these models. If your computer has three drive bays, it is referred
to as the 3-bay design. If your computer has four drive bays, it is referred as the
4-bay design. These naming conventions are used only where it is appropriate.
Instructions without these naming conventions apply to all computer models.
3-Bay Design
With the cover on, bay 2 in the 3-bay design is not visible. This bay is intended for
a hard disk drive, which does not have accessible media such as a CD-ROM drive
or diskette drive. The 3-bay design has two expansion slots for adapters, as shown
in the rear view below.
Bay 1
About This Bookxi
Bay 3
Expansion Slots
Bay 2
Front View
Rear View
4-Bay Design
With the cover on, bay 4 in the 4-bay design is not visible. This bay is intended for
a hard disk drive, which does not have accessible media such as a CD-ROM drive
or diskette drive. The 4-bay design has four expansion slots for adapters, as shown
in the rear view below.
Bay 3
Bay 4
Bay 1
Bay 2
Front View
Expansion Slots
Rear View
xiiUsing Your Personal Computer
Chapter 1. Your IBM Personal Computer
Thank you for selecting an IBM Personal Computer. Your computer incorporates
many of the latest advances in personal computer technology and is easy to expand
and upgrade as your needs change.
Note: Your computer might differ from the one shown above.
Copyright IBM Corp. 1996, 1997 1
What Your IBM Personal Computer Offers
This section describes the major features of your computer.
Microprocessor
At the core of your computer is an Intel Pentium microprocessor or an Intel
Pentium microprocessor with MMX technology. With its advanced performance
features, the microprocessor supplies the speed and power you need to take
advantage of complex programs. In addition, the microprocessor with MMX
technology improves the performance of multimedia and communications
applications by accelerating calculations commonly performed for audio, video,
speech synthesis and recognition, 2D and 3D graphics, and data communications.
1
Your computer supports microprocessor speeds of 100 MHz to 200 MHz
, and the
system board is designed for microprocessor upgrades as they become available.
System Memory
Your computer comes standard with either extended data out (EDO) dynamic
random access memory (DRAM) or synchronous dynamic random access memory
(SDRAM). Both EDO and SDRAM memory use advanced technology to increase
system performance.
L2 Cache
On the system board is 256 KB of level 2 (L2) cache, which helps speed the
exchange of information between the microprocessor and system memory.
Graphics Support
Your computer comes with a graphics subsystem integrated on the system board.
The high-performance graphics are powered by the Cirrus Logic CL-GD5446 64-bit
VisualMedia accelerator, which provides video playback. Also, your computer
supports a maximum of 2 MB of video memory installed on the system board.
Some computers come with the maximum amount of video memory preinstalled. If
your computer comes with 1 MB of video memory, an optional 1 MB upgrade is
available.
1
MHz denotes internal clock speed of the microprocessor only; other factors might also affect
application performance.
2Using Your Personal Computer
Integrated Ethernet Subsystem
Some models have an integrated 10Base-T, Ethernet controller and an RJ-45
connector that provide a high-performance network connection. The integrated
Ethernet is a Plug and Play device that has built-in support for Wake on LAN and a
viewable MAC (media access control) address for your computer. (See “System
Management Settings” on page 64 for more information.) Device drivers for the
Ethernet subsystem are provided on the Ready-to-Configure CD that comes with your
computer. If your computer has IBM-preinstalled software, the device drivers are
already installed on the hard disk drive. For instructions on connecting a network
cable to your computer, refer to Setting Up Your Personal Computer.
System Management Features
Your computer has features that make it possible for a network administrator to
manage and control it remotely over a network. These features are:
Enablement for LANClient Control Manager software
Capable of using remote program load (RPL) and dynamic host configuration
protocol (DHCP)
Enablement for Wake on LAN
Primary startup sequence and automatic power on startup sequence
Enablement for POST/BIOS updates over a network
Desktop Management Interface (DMI) BIOS and DMI software
For information on these features, refer to “Using System Management Features” on
page 32 and “System Management Settings” on page 64.
Audio Support
In some models, an audio adapter is preinstalled. The audio adapter is Sound
Blaster compatible and provides a musical instrument digital interface (MIDI) for
connecting optional game controls or electronic musical devices. Also, three ports
are provided for connecting powered speakers, an audio input device such as a
portable CD-ROM, and a microphone.
ISA Bus
Your computer has an industry standard architecture (ISA) bus, which is one of the
most widely used and successful input/output (I/O) buses available. The ISA bus
is popular because so many adapters and devices have been designed and marketed
for it.
Chapter 1. Your IBM Personal Computer3
PCI Bus
Your computer also has a peripheral component interconnect (PCI) bus. PCI is an
advanced bus standard designed to keep up with performance improvements of
microprocessor buses and advanced peripheral devices. The PCI bus adds to the
capability of the ISA bus, speeding up the exchange of information among the
microprocessor and peripheral devices within your computer system.
Expansion with Adapters
By installing adapters, you can expand the capabilities of your computer and take
advantage of a variety of peripheral devices and applications. Your computer uses
a riser card for connecting adapters to the ISA bus or PCI bus.
High-Capacity Hard Disk Drives
Your computer comes with a hard disk drive that has an enhanced integrated drive
electronics (EIDE) interface. The hard disk drive is a SMART (self-monitoring,
analysis and reporting technology) drive capable of predicting potential problems.
When used with the proper software applications, the SMART hard disk drive
protects data and improves reliability.
CD-ROM Drive
In some models, a CD-ROM drive is preinstalled. A CD-ROM (compact disc
read-only memory) drive plays back or reads information from a CD providing
quick access to large amounts of information. A compact disc can store more than
650 MB of data, such as the large files needed for audio, full-motion video, and
animated graphics.
Parallel Port
Your computer has one parallel port. The parallel port is most often used to
communicate with a parallel printer, but it can also be used with other parallel
devices.
The parallel port can operate in several different modes. The default mode for your
computer is standard parallel port (SPP). However, your computer also supports
the extended capabilities port/enhanced parallel port (ECP/EPP) modes. For more
information, see “Changing Parallel Port Settings” on page 51.
4Using Your Personal Computer
Serial Ports
Your computer has two standard, 16550-UART serial ports that can be used to
connect devices such as modems and printers.
Universal Serial Bus Ports
The Universal Serial Bus (USB) interface is based on a new technology that adds
more diversity and capabilities to personal computers. Two USB connectors are
provided so you can take advantage of new USB devices as they become available.
The USB interface incorporates Plug and Play technology which allows you to
install devices that configure automatically. Also, you can install and remove
devices without having to shut off your computer. In addition, an option called a
hub enables you to plug in more than one device at a time. A hub converts a single
USB connector into multiple ports where USB devices can be attached.
Note: Your computer does not support a keyboard or mouse attached to the USB
port.
Ease-of-Use Features
Using the computer is easier with features such as Plug and Play technology,
diagnostic programs, and system management features.
Support for Plug and Play technology is built into the system board of your
computer. This allows you to add Plug and Play adapters that are self-configuring,
provided that the requested resources are not already in use. In most cases, Plug
and Play technology eliminates having to manually configure a device by setting
switches or jumpers or by setting ISA legacy resources.
If you have a problem with your computer, a diagnostic program called
QAPlus/PRO helps determine if a hardware component is causing the problem.
QAPlus/PRO and other operating system-specific diagnostic programs are included
on the Ready-to-Configure CD that comes with your computer.
Note: Create the QAPlus/PRO diskette as soon as possible, so that you will be
ready to diagnose a problem if one should occur.
If your computer is properly connected to a network, you can take advantage of
advanced system management features, such as Wake on LAN, RPL, and DHCP.
For more information, see “Using System Management Features” on page 32.
Chapter 1. Your IBM Personal Computer5
Ergonomic Features
Your computer has ergonomic features which make it more comfortable to use. The
power switch and indicator lights are located on the front panel for easy access and
visibility. Also, you can easily change monitor settings to reduce or eliminate flicker
and jitter, or you can adjust the angle of the keyboard to make typing more
comfortable.
IBM-Preinstalled Software
IBM-preinstalled software is provided with some computer models. This software
includes an operating system, device drivers to support built-in features, and other
support programs. Detailed information about this software is included in AboutYour Software, which is included with the preinstallation package.
Supported Operating Systems
Your computer is designed to use a variety of operating systems in order to meet
your particular needs. Computer models with IBM-preinstalled software use one of
the following operating systems:
Windows NT 4.0
Windows 95
The following operating systems are also supported by your computer:
IBM PC DOS
IBM DOS 7.0
Windows 3.1, 3.11
Windows NT 3.51
MS DOS 6.0, 6.2, 6.3
OS/2 2.11, 3.0
OS/2 Warp
OS/2 Warp Connect 3.0, 4.0
OS/2 LAN Server 2.0
OS/2 LAN Server 3.0
Windows for WorkGroups 3.11
Novell Netware 3.12
Novell Netware 4.1
SCO OpenServer
Solaris 2.5
DEC PathWorks 5.1
Note: For a complete listing of operating systems certified for use with your
computer, see http://www.pc.ibm.com/cdt/index.html for the online
compatibility report.
6Using Your Personal Computer
Advanced Power Management
Energy conservation is an important concern. Your computer has Advanced Power
Management (APM) features that allow you to set different levels of energy
conservation for specific components of your computer. You can view and change
APM settings using the Configuration/Setup Utility program.
Asset Security Features
Important
For the latest information on IBM Personal Computer Asset Security features,
refer to the following Internet page: http://www.pc.ibm.com/asset.
IBM provides a variety of computer security features for your computer. These
security features help protect both your hardware and software. The following
features are available:
Power-on and administrator password protection
Startup-sequence control
Hard disk drive and diskette drive access control
Enablement for updating the POST/BIOS over the network
Cover lock (standard on most 4-bay models)
U-bolt and security cabling (optional)
Registration, tracking, and recovery
Operating system security
Password Protection: Password protection is available to help you secure your
computer. A power-on password protects your computer by locking the keyboard
and mouse. The are three modes to choose from when using a power-on password.
Also, you can use an administrator password to protect the configuration settings of
your computer. For more information, see “Using Passwords” on page 53.
Startup-Sequence Control: You can control the primary startup sequence and
automatic power on startup sequence of your computer. For more information see
“Default Settings for the Startup Sequence” on page 68 and “Automatic Power On
Startup Sequence” on page 69.
Hard Disk Drive and Diskette Drive Access Control: You can control access
to the hard disk and diskette drives of your computer. To access the settings for
these features, enter the Configuration/Setup Utility program and select System
Security. For more information on using the Configuration/Setup Utility program,
see Chapter 5, “Using the Configuration/Setup Utility Program” on page 39.
Chapter 1. Your IBM Personal Computer7
Updating the POST/BIOS Over the Network: If your computer is properly
configured, you can update the POST/BIOS settings over the network. For more
information, see “Update POST/BIOS from Network” on page 69.
Cover Lock and U-Bolt Cabling: You can use the cover lock, which is standard
on most 4-bay models, to secure the outside cover. The cover-lock keys are unique
to your computer, and locksmiths are not authorized to duplicate them. If the keys
are lost, you must order replacements from the key manufacturer. The key serial
number and the address of the manufacturer are on a tag attached to the keys.
You can also use an optional U-bolt that enables you to secure your computer with
a cable and lock.
Registration, Tracking, and Recovery: Registration of your computer and its
serialized components is offered online via the Internet. You simply select the
registration provider, fill out the online registration form, and then send the
completed form to the provider through E-mail. The provider will send you
confirmation and a sticker to apply to your computer. Your provider will offer
online update registration service for five years.
Operating System Security: Some operating systems provide security features
such as a keyboard and mouse lock-up feature. Refer to the operating system
documentation for more information.
Service and Support
You can obtain assistance for using your computer, as well as service, from a
number of sources. Help is available by phone, fax, and modem. For detailed
information, see Chapter 7, “Getting Help, Service, and Information” on page 109.
8Using Your Personal Computer
Expandability
You can easily expand the capabilities of your computer by adding system memory,
video memory, drives, or adapters.
Drive Bays: The 3-bay design has three drive bays, and the 4-bay design has four
drive bays. The following illustrations show the locations of diskette, CD-ROM and
hard disk drives. Unoccupied drive bays can be used for installing additional
devices.
3.5-inch Diskette Drive
3.5-inch Hard
Disk Drive
3-Bay Design
3.5-inch Diskette Drive
3.5-inch Hard Disk Drive
4-Bay Design
5.25-inch Drive Bay
for Optional Drive
CD-ROM Drive
(some models only)
5.25-inch Drive Bay
for Optional Drive
Chapter 1. Your IBM Personal Computer9
Expansion Slots: The 3-bay design has two expansion slots, and the 4-bay design
has four expansion slots. The following illustrations show the locations of
expansion slots by model. Any unoccupied slots can be used for installing optional
adapters.
Expansion Slots
3-Bay Design
10Using Your Personal Computer
Expansion Slots
4-Bay Design
External Connectors
The location of the external connectors for I/O devices varies by model. Models
with an integrated Ethernet subsystem have an RJ-45 connector. Also, if an audio
adapter is installed, connectors appear above the I/O panel in an expansion slot.
Ethernet
Note: Your computer might not have all the connectors shown.
Chapter 1. Your IBM Personal Computer11
Serial
B
A
Serial
Mouse
Keyboard
Line Out
Game/MIDIMicrophone
(Audio Adapter)
12
USBParallel
Line In
Monitor
Features at a Glance
The following information summarizes the features that are available for both the
3-bay design and the 4-bay design. For a list of features specific to your computer,
refer to the System Summary screen in the Configuration/Setup Utility program.
For more information, see “Viewing the System Summary” on page 45.
Mechanical Designs
3-Bay Design: Three drive bays, two
expansion slots
4-Bay Design: Four drive bays, four
expansion slots
Microprocessor
Intel Pentium microprocessor or Intel Pentium
microprocessor with MMX technology
System board supports speeds from 100 MHz
to 200 MHz
Upgrades supported
Memory
Maximum addressable: 128 MB
Two 168-pin DIMM sockets, 3.3 V
SDRAM or EDO DRAM modules
Riser card with ISA/PCI expansion slots
Plug and Play support
Input/Output Features
ECP/EPP parallel port
Two 16550-UART serial ports
Two universal serial bus (USB) ports
Monitor port
Mouse (PS/2) port (mouse included)
Keyboard port (keyboard included)
Ethernet port (optional feature)
Power
3-Bay Design: 85 W, 115/230 V ac, 50/60 Hz
4-Bay Design: 145 W, 115/230 V ac, 50/60 Hz
Built-in overload and surge protection
Advanced power management
Wake on LAN enabled
Asset Security Features
Security features are provided for both the
software and hardware of your computer.
For more information, see “Asset Security
Features” on page 7.
System Management
Enabled for LANClient Control Manager
software
Wake on LAN support
Wake Up on Alarm
Update POST/BIOS from the network
DMI BIOS and DMI software
IBM-Preinstalled Software
Preinstalled in some models are an operating
system, device drivers to support built-in
features, and other support programs. See
About Your Software for a detailed description
of the preinstalled package.
For information on supported operating
systems, see “Supported Operating Systems”
on page 6, or online at
http://www.pc.ibm.com/cdt/index.html.
12Using Your Personal Computer
System Specifications
The size, weight, and heat output specifications vary be model. The other system
specifications apply to both the 3-bay design and the 4-bay design.
Size
3-Bay Design
– Depth: 400 mm (15.8 in.)
– Height: 95 mm (3.7 in.)
– Width: 369 mm (14.5 in.)
4-Bay Design
– Depth: 420 mm (16.5 in.)
– Height: 110 mm (4.3 in.)
– Width: 440 mm (17.3 in.)
Weight
3-Bay Design
– Minimum configuration as shipped: 6.80 kg (15 lb)
– Maximum configuration: 8.16 kg (18 lb)
2
4-Bay Design
– Minimum configuration as shipped: 9.07 kg (20 lb)
– Maximum configuration: 11.3 kg (25 lb)
2
Maximum configuration weight depends on actual optional features installed. Figures shown are for a
system fully populated with typical optional features.
2
Chapter 1. Your IBM Personal Computer
13
Heat Output
3-Bay Design
– Approximate heat output in British thermal units (Btu) per hour:
- Minimum configuration: 110 Btu (35 watts)
- Maximum configuration: 273 Btu (80 watts)
3
4
4-Bay Design
– Approximate heat output in British thermal units (Btu) per hour:
- Minimum configuration: 120 Btu (35 watts)
- Maximum configuration: 685 Btu (200 watts)
3
4
Heat output varies depending on the number and type of optional features installed
and the power-management optional features in use.
Environment
Air temperature:
– System on: 10° to 32°C (50° to 95°F)
– System off: 10° to 43°C (50° to 110°F)
Humidity:
– System on: 8% to 80%
– System off: 8% to 80%
Maximum altitude: 2134 m (7000 ft)
3
Minimum wattage for base models will comply with EnergyStar requirements.
4
Maximum heat specifications are based on the maximum capacity of the system power supply, 85
watts for the 3-bay design and 145 watts for the 4-bay design.
14Using Your Personal Computer
Electrical Input
5
Sine-wave input (50 to 60 Hz) is required
Input voltage for the 3-bay design:
– Low range:
- Minimum: 100 V ac at 3 A
- Maximum: 127 V ac at 3 A
- Voltage switch setting: 115 or 115 V
– High range:
- Minimum: 200 V ac at 1.5 A
- Maximum: 240 V ac at 1.5 A
- Voltage switch setting: 230 or 230 V
– Input kilovolt-amperes (kVA) (approximately):
- Minimum configuration as shipped: 0.08 kVA
- Maximum configuration: 0.30 kVA
Input voltage for the 4-bay design:
– Low range:
- Minimum: 100 V ac at 5 A
- Maximum: 127 V ac at 5 A
- Voltage switch setting: 115 or 115 V
– High range:
- Minimum: 200 V ac at 3 A
- Maximum: 240 V ac at 3 A
- Voltage switch setting: 230 or 230 V
– Input kilovolt-amperes (kVA) (approximately):
- Minimum configuration as shipped: 0.08 kVA
- Maximum configuration: 0.30 kVA
Power consumption varies depending on the number and type of optional features
installed and the power-management optional features in use.
5
Maximum power specifications are based on the maximum capacity of the system power supply, 85
watts for the 3-bay design and 145 watts for the 4-bay design.
Chapter 1. Your IBM Personal Computer
15
Airflow
Approximately 0.56 cubic meters per minute (20 cubic feet per minute)
Acoustical Noise-Emission Values
Average sound-pressure levels:
– At operator position:
- 38 dBA idle
- 43 dBA operating
– At bystander position–1 meter (3.3 ft):
- 33 dBA idle
- 37 dBA operating
Declared (upper limit) sound power levels:
– 4.8 bels idle
– 5.1 bels operating
These levels were measured in controlled acoustical environments according to
procedures specified by the American National Standards Institute (ANSI) S12.10
and ISO 7779, and are reported in accordance with ISO 9296.
Actual sound-pressure levels in your location might exceed the average values
stated because of room reflections and other nearby noise sources. The declared
sound power levels indicate an upper limit, below which a large number of
computers will operate.
16Using Your Personal Computer
Chapter 2. Arranging Your Workspace
To get the most from your computer, arrange both the equipment you use and your
work area to suit your needs and the kind of work you do. Your comfort is of
foremost importance, but light sources, air circulation, and the location of electrical
outlets also can affect the way you arrange your workspace.
Comfort
Although no single working position is ideal for everyone, here are a few guidelines
to help you find a position that suits you best.
Sitting in the same position for a long time causes fatigue. A good chair can make a
big difference. The backrest and seat should adjust independently and provide
good support. The seat should have a curved front to relieve pressure on the
thighs. Adjust the seat so that your thighs are parallel to the floor and your feet are
either flat on the floor or on a footrest.
When using the keyboard, keep your forearms parallel to the floor and your wrists
in a neutral, comfortable position. Try to keep a light touch on the keyboard and
your hands and fingers relaxed. You can change the angle of the keyboard for
maximum comfort by adjusting the position of the keyboard feet.
Adjust the monitor so the top of the screen is at, or slightly below, eye level. Place
the monitor at a comfortable viewing distance, usually 51 to 61 cm (20 to 24 in.),
and position it so you can view it without having to twist your body.
Copyright IBM Corp. 1996, 1997 17
Lower
Back
Support
Seat
Height
Viewing Distance
Glare and Lighting
Position the monitor to minimize glare and reflections from overhead lights,
windows, and other light sources. Place the monitor at right angles to windows
and other light sources, when possible. Reduce overhead lighting, if necessary, by
turning off lights or using lower wattage bulbs. If you install the monitor near a
window, use curtains or blinds to block the sunlight. You might have to adjust the
Brightness and Contrast controls on the monitor as the room lighting changes
throughout the day.
Where it is impossible to avoid reflections or to adjust the lighting, an antiglare
filter placed over the screen might be helpful. However, these filters might affect
the clarity of the image on the screen; try them only after you have exhausted other
methods of reducing glare.
Dust buildup compounds problems associated with glare. Remember to clean your
monitor screen periodically using a soft cloth moistened with a nonabrasive liquid
glass cleaner.
Air Circulation
Your computer and monitor produce heat. The computer has a fan that pulls in
fresh air and forces out hot air. The monitor lets hot air escape through vents.
Blocking the air vents can cause overheating, which might result in a malfunction or
damage. Place the computer and monitor so that nothing blocks the air vents;
usually, 51 mm (2 in.) of air space is sufficient. Also, make sure the vented air is
not blowing on someone else.
Electrical Outlets and Cable Lengths
The location of electrical outlets and the length of power cords and cables that
connect to the monitor, printer, and other devices might determine the final
placement of your computer.
When arranging your workspace:
Avoid the use of extension cords. When possible, plug the computer power
cord directly into an electrical outlet.
Keep power cords and cables neatly routed away from walkways and other
areas where they might get kicked accidentally.
For more information about power cords, see “Power Cord Notice” on page 131.
18Using Your Personal Computer
Chapter 3. Operating Your Computer
This chapter provides information to help you in the day-to-day use of your
computer.
Recognizing Controls and Status Indicators
Look at the front of your computer. The buttons are controls that allow you to
perform a specific function, such as powering on the computer. The lights are
status indicators that tell you when a certain function is in use, such as the diskette
drive.
Note: If your computer has a preinstalled CD-ROM drive, controls and status
indicators are available. For more information, see “Using a CD-ROM
Drive” on page 29.
The following illustrations show the controls and status indicators for both models.
Diskette Drive Light
Diskette
Eject Button
Power Switch
Hard Disk
Drive Light
LAN Activity Light
3-Bay Design
Power-On
Light
Copyright IBM Corp. 1996, 1997 19
Diskette Drive Light
Power Switch
Power-On
Light
Diskette
Eject Button
Hard Disk
Drive Light
LAN Activity Light
4-Bay Design
The following list explains the controls and status indicators located on the front of
your computer.
Diskette-Drive Light: When this light is on, it indicates that the diskette drive
heads are being positioned or that your computer is reading from or writing to
a diskette. Do not eject a diskette when the light is on.
Diskette Eject Button: Push this button to release a diskette from the drive.
Power Switch: Press this switch to turn your computer on or off. Do not turn
off your computer if the in-use light for the hard disk drive or diskette drive is
on.
Power-On Light: This status indicator lights when you turn on your computer.
Hard-Disk Drive Light: When this light is on, it indicates that the hard disk
drive heads are being positioned or that your computer is reading from or
writing to the hard disk.
LAN Activity Light: This light indicates network activity.
20Using Your Personal Computer
Starting Your Computer
Note: If your computer is configured correctly, it can be started remotely over a
network. For more information, see “Wake on LAN” on page 69.
1. Turn on all devices connected to the computer.
2. Press and release the power switch on your computer. This starts the computer,
and the following actions occur:
a. The IBM logo appears centered on the screen.
b. The power-on self-test (POST) is performed. You can recognize this by
looking for the increasing number in the upper-left corner of the screen.
This number is the amount of memory being tested by POST. When the
number stops, the memory is tested and POST is complete.
If POST detects a problem, you hear multiple beeps (or no beep) and an
error message appears on the screen. Write down any error code numbers
and descriptions, and see “Solving POST Problems” on page 74 and “POST
Error Message Charts” on page 77 for more information. (If you do not
hear a beep during POST, refer to “Troubleshooting Charts” on page 96.
You might need to have your computer serviced.)
c. The computer allows you to enter the Configuration/Setup Utility program
(by pressing F1) or run a fast POST (by pressing Esc). These options are
shown in the lower-left corner of the screen.
3. If the computer is not password protected, you hear a beep, and the first screen
of the operating system or application program appears.
If the computer is password protected, a prompt is displayed for entering either
the power-on or administrator password. If both a power-on and an
administrator password have been set, you must type either password at the
password prompt. (Refer to “Using Passwords” on page 53 for instructions on
setting and using passwords.) Type your password at the prompt and press
Enter. The first screen of the operating system or application program appears.
6
Models with integrated Ethernet have special factory settings that affect the primary startup sequence.
If your model comes with integrated Ethernet, the computer tries to perform a remote program load
(RPL) of the operating system. If RPL is unsuccessful, several messages might appear and then your
computer loads the operating system from the hard disk drive. For more information on these factory
settings, see “Network-Enabled Startup Sequence” on page 66. For information on the messages that
might appear, see “Error Messages Specific to the Integrated Ethernet” on page 107.
Chapter 3. Operating Your Computer
6
21
Shutting Down Your Computer
When you are ready to turn off your computer, follow the shutdown procedures for
your operating system to prevent the loss of unsaved data or damage to your
software programs. See your operating system documentation for instructions.
In some operating systems, you can set up the computer to automatically turn off
after the operating system has shut down. If you have not selected this setting, you
must manually turn off the computer by pressing and releasing the power switch.
Important
If you plan to restart your computer, do not use Ctrl+Alt+Del while the
operating system is running. Instead, follow the shutdown procedure for your
operating system, turn off the computer by pressing and releasing the power
switch, wait a few seconds until all the status-indicator lights are off, and then
follow the procedures in “Starting Your Computer” on page 21.
22Using Your Personal Computer
Using a Mouse
A mouse is a device that you use to point to and select objects on the monitor screen.
The mouse that comes with your computer attaches with a cable to the mouse port
on the back of the computer. For information on connecting the mouse, see SettingUp Your Personal Computer.
Note: Optional mouse devices might connect to the computer through a serial port.
A mouse device cannot be connected through the USB port.
With a mouse, you can move the pointer on the screen. If you have never used a
mouse before, it might feel a bit awkward at first. However, with a little practice,
the mouse movements will seem natural.
To set up the mouse, place the mouse beside the keyboard on a flat surface or mousepad. A mouse pad is a flat, smooth foam-rubber pad available at most computer
stores. The mouse has a ball on the bottom, so working on a flat, smooth surface is
important. Most operating systems allow you to configure the mouse buttons for
either right-hand or left-hand operation. When a two-button mouse is configured
for right-handed user, the left button is used for most tasks. When a two-button
mouse is configured for a left-handed user, the right button is used for most tasks.
For more information, see your operating system documentation.
To use the mouse, slide it from side to side and forward and backward over a flat
surface. When you see an item that you want to select on the screen, simply move
the pointer to that item (this is called pointing), and press and release either the left
or right button on the mouse (this is called clicking).
To learn how to use the mouse with the software in your computer, see the
documentation accompanying the software. Some programs support only one
mouse button, others support two, and some support three. Despite the differences,
some terms are fairly standard throughout the industry.
PointMove the mouse so the pointer is on the object you want.
ClickPress and release the mouse button once.
Double-click Rapidly press and release the mouse button twice.
DragPoint to an object, press the mouse button, and hold it down as you
move the mouse to relocate the object.
DropAfter dragging an object to a new location, release the mouse button.
Chapter 3. Operating Your Computer23
Using a Diskette Drive
You can use 3.5-inch diskettes in the diskette drive of your computer. If you want
to use 5.25-inch diskettes, you must install a 5.25-inch diskette drive. (Refer to
Installing Options in Your Personal Computer for instructions on installing optional
diskette drives.)
The information that follows will help you identify and use 3.5-inch diskettes.
Identifying Diskettes
The labeling on 3.5-inch diskettes is not consistent among manufacturers. Some
diskettes are labeled with the letters DD or HD to identify the diskette type; other
diskettes might not be labeled. However, the appearance of the lower-right corner
of a 3.5-inch diskette always can be used to identify the diskette type, as shown in
the following illustrations.
DD
No Window
3.5 Diskette
2.0 MB capacity
1 MB Double Density (DD)
HD
Window
2 MB High Density (HD)
24Using Your Personal Computer
Handling and Storing Diskettes
Inside the protective diskette case is a flexible disk with a magnetic-sensitive
coating. This disk can be damaged by heat, dust, a magnetic field, or even a
fingerprint. Use the following guidelines when handling and storing diskettes.
Data is stored on the magnetic surface of the diskette. On 3.5-inch diskettes,
this surface is protected by a plastic cover. If the cover is damaged, do not use
the diskette. A damaged diskette might damage the diskette drive.
A protective slide on the top of a 3.5-inch diskette covers part of the magnetic
surface. The diskette drive moves this slide to read data from or write data to
the diskette. Do not move this slide, because fingerprints and dust can cause
loss of data.
Top
Protective Slide
3.5 Diskette
2.0 MB capacity
Diskette Label
Never touch the magnetic disk itself.
Keep diskettes away from magnets or devices that create a strong magnetic
field, such as electric motors and generators. Diskettes are sensitive to magnets
found in television sets, telephones, stereo speakers, and other such items. A
magnetic field can erase the data on your diskettes. Do not set diskettes on the
monitor or use magnets to attach notes to your computer.
Do not store diskettes at high temperatures, low temperatures, or in direct
sunlight. Temperatures ranging from 4° to 53°C (39° to 127°F) are acceptable for
3.5-inch diskettes. Keep diskettes away from heat. The plastic outer covering
might warp, damaging the diskette.
Chapter 3. Operating Your Computer25
Labeling Diskettes
Before using a diskette, label it so that you can identify the data stored on it. Labels
usually come in the package with the diskettes. Diskette labels can become a
problem if you do not apply them correctly. Loose edges or an excessive buildup of
labels can prevent the diskette from being inserted or ejected.
To prevent this problem, take the following precautions:
Remove an old label before you apply a new one.
Apply labels carefully to ensure that all edges are secure.
Apply labels only to the front of diskettes. Do not place a label where it
interferes with the protective slide or covers an opening in the protective
diskette case.
Inserting and Removing Diskettes
Important
Always make certain that the diskette drive is empty before inserting a diskette.
If the diskette eject button is flush with the front of the computer, a diskette can
be inserted. If the diskette eject button is not flush with the computer, a diskette
is already inserted.
To insert a 3.5-inch diskette, hold the diskette with the label facing up and insert the
end with the protective slide first. Push the diskette into the diskette drive until the
diskette clicks into place. The diskette eject button pops out.
To remove the diskette, press the eject button and slide the diskette out of the drive.
Do not remove the diskette while the in-use light is on.
Diskette-Drive
In-Use Light
26Using Your Personal Computer
Diskette
Eject Button
Write Protecting Diskettes
It is possible to accidentally format a diskette or unintentionally write data to it.
Important information can be written over or lost. For this reason, it is a good idea
to write protect important diskettes. You can read data from a write-protected
diskette, but you cannot erase or change the data.
Most 3.5-inch diskettes have a write-protect switch that can be used to prevent data
from being written to or erased from the diskette. If a 3.5-inch diskette does not
have a write-protect switch, it is permanently write protected.
The write-protect switch is located on the back of 3.5-inch diskettes.
Write-Protect
Switch
To allow writing to the diskette, slide the switch so the write-protect window is
covered.
To prevent writing to the diskette, slide the switch so the write-protect window
is open.
Formatting Diskettes
You can buy diskettes either formatted or unformatted. Formatted diskettes are
ready to use; unformatted diskettes must be formatted by your operating system
before you can use them. The format operation checks a diskette for defects and
prepares it for storing data. If data is already stored on the diskette, the format
operation writes over it, and the data is lost.
Chapter 3. Operating Your Computer27
The operating system FORMAT command specifies how to format a specific type of
diskette.
Important
Always format diskettes to their correct capacity. Failing to do so might cause
unreliable results. Differences such as magnetic coatings, the thickness of the
diskette material, and the recording technique used all affect the formatting
operation. Refer to your operating-system documentation for detailed
information on formatting diskettes.
The following table shows diskette types, their formatted capacities, and the drive
type that can be used with each diskette.
3. If you are using DOS, use FORMAT A: /F:720 to format a 1 MB diskette in a
1.44 MB drive.
Copying Diskettes
If you are using DOS, you can copy one or more files to or from a diskette using the
COPY command. Groups of files can be copied faster using the XCOPY command.
Both COPY and XCOPY can copy files to different types of diskettes. For
duplicating a diskette, use the DISKCOPY command. DISKCOPY requires that both
the source diskette (the diskette you copy from) and the target diskette (the diskette
you copy to) be the same type.
Refer to your operating-system documentation for more information on copying
diskettes.
28Using Your Personal Computer
Using a CD-ROM Drive
Some models have a preinstalled CD-ROM drive. CD-ROM (compact disc read-only
memory) technology offers quick access to enormous amounts of information. A
compact disc can store more than 650 MB of data, such as the large files needed for
audio, still and full-motion video, and still and animated graphics. A CD-ROM
drive can play back or read from a CD, but it cannot write information to it.
CD-ROM drives use industry-standard, 12 cm (4.75-inch) CDs.
Follow these guidelines when using a CD-ROM drive:
Do not place the drive where there is:
– High temperature
– High humidity
– Excessive dust
– Excessive vibration or sudden shock
– An inclined surface
– Direct sunlight
Do not insert any object other than a CD into the drive.
Before moving the computer, remove the CD from the drive.
The following illustration shows the controls and status indicator for a preinstalled
CD-ROM drive.
Emergency Eject Hole
Indicator Light
Note: Your computer might differ from the one shown above.
Chapter 3. Operating Your Computer29
Tray
Eject/Load Button
Handling a CD
When handling a CD, follow these guidelines:
Hold the CD by its edges. Do not touch the surface.
To remove dust or fingerprints, wipe the CD from the center to the outside.
Wiping the CD in a circular direction might cause loss of data.
Do not write or stick paper on the CD.
Do not scratch or mark the CD.
Do not place or store the CD in direct sunlight.
Do not use benzene, thinners, or other cleaners to clean the CD.
Do not drop or bend the CD.
Loading a CD
To load a CD into the CD-ROM drive:
1. Press the Eject/Load button. The tray slides out of the drive. (Do not manually
force the tray open.)
2. Place the CD in the tray with the label facing up. If you have placed your
computer in a vertical position using the optional floor stand, extend the two
CD-retainer clips on the lower side of the CD-ROM drive tray to keep the CD in
position as you open and close the drive.
3. Close the tray by pressing the Eject/Load button, or by gently pushing the tray
forward. When the tray is closed, the indicator light on the front of the drive
will activate to indicate that the drive is in use.
4. To eject the CD, press the Eject/Load button. When the tray slides out,
carefully remove the CD.
5. Close the tray by pressing the Eject/Load button, or by gently pushing the tray
forward.
Note: If the tray does not slide out of the drive when you press the Eject/Load
button, insert the pointed end of a large paper clip into the emergency eject
hole located above and to the left of the CD-ROM indicator light.
If you have installed a CD-ROM drive yourself and need additional information
about the drive, refer to the documentation that comes with the CD-ROM drive.
30Using Your Personal Computer
Using Audio Features
If your computer comes with a preinstalled audio adapter, it is Sound Blaster
compatible and capable of playing and recording sounds.
The device drivers for the preinstalled audio adapter are preinstalled on the hard
disk drive. If you install this adapter as an option, use the device drivers on the
Ready-to-Configure CD.
If you connect an optional device to the audio adapter, follow the manufacturer's
instructions (device drivers might also be required). Contact the manufacturer for
information on the necessary device drivers.
The following ports are available on the audio adapter:
Game/MIDI (musical instrument digital interface) port for connecting a game
control or a musical device such as an electronic keyboard.
7
Line in port for connecting musical devices such as a portable CD-ROM or
stereo.
Line out port for connecting powered speakers. Your audio system requires a
set of speakers connected to the line output in order to hear audio from the
adapter. These speakers must be powered (with a built-in amplifier). In
general, any powered speakers designed for use with personal computers might
be used with your audio adapter. These speakers are available with a wide
range of features and power output.
Microphone in for connecting a microphone.
GAME/MIDIOUTLINE INMIC
7
An electronic device connected to the Game/MIDI port might require an optional adapter cable. For
more information, refer to the documentation that comes with the electronic device.
Chapter 3. Operating Your Computer
31
Using System Management Features
This section is intended primarily for network administrators. It describes features
of your computer that make it possible for a network administrator to remotely
manage and control your computer.
The BIOS (basic input output system) of your computer supports an interface called
Desktop Management Interface (DMI). DMI is a mechanism for gathering
information about the hardware and software in your computer to enable network
administrators to remotely monitor and control computers in a network
environment. DMI can be used to remotely track many types of information about
computers, including serial numbers, memory attributes, product-specific
characteristics of installed peripherals, and operating system configuration
information. This information can be accessed using a DMI browser. DMI
browsers are provided by all major operating systems and all major LAN
management packages, including TME 10 NetFinity, Intel LANDesk, and Microsoft
SMS.
The Wake on LAN feature can be used by a network administrator to turn on your
computer from a remote location. When Wake on LAN is used in conjunction with
network management software, such as LANClient Control Manager and TME 10
NetFinity (provided on the Ready-to-Configure CD that comes with your computer),
many types of functions, such as data transfers, software updates, and POST/BIOS
flashes can be performed remotely on your computer and other Wake on
LAN-enabled computers linked to your network. These functions can be done after
hours and on weekends, which saves time and increases productivity since users are
not interrupted during normal working hours. Refer to “Wake on LAN” on
page 69 for further information.
Other features such as remote program load (RPL) and dynamic host configuration
protocol (DHCP) also allow a network administrator to remotely control your
computer. If you use remote program load in conjunction with LANClient Control
Manager software, you can use a feature called Hybrid RPL. Using LANClient
Control Manager, you set up your computer by installing hybrid images (or files) on
the hard disk drive. Then, each time the computer starts from the network,
LANClient Control Manager recognizes your computer as a Hybrid RPL client and
a bootstrap program is downloaded to your computer. This bootstrap program is
small and helps prevent network congestion. Working off the hybrid images, the
bootstrap program initiates the startup process from the hard disk drive of your
computer. An advantage to Hybrid RPL is that the network load associated with
standard RPL is avoided. For more information on these two features, refer to “RPL
and DHCP” on page 65.
32Using Your Personal Computer
Updating the POST/BIOS
POST/BIOS is the basic layer of software built into every IBM computer. POST
(power-on self-test) is a set of tests and procedures that is performed every time you
turn on your computer. The BIOS (basic input output system) is a layer of software
that translates instructions from other layers of software into electrical signals that
the computer hardware can understand. Also included in the POST/BIOS is the
Configuration/Setup Utility program, which enables you to view and change the
configuration and setup of your computer.
In the past, the POST/BIOS was contained in a read-only memory (ROM) module
on the system board. If you wanted to update POST routines, BIOS instructions,
and the Configuration/Setup Utility program, you had to disassemble the computer
and replace modules, or you had to replace the system board. Now, a module
called electrically erasable programmable read-only memory (EEPROM, also referred to as
flash memory) has replaced the ROM module on the system board. You can easily
update POST information, the BIOS code, and the Configuration/Setup Utility
program in your computer from an update diskette. This procedure is often
referred to as flashing the POST/BIOS.
If your computer is properly connected to a network, you can update the
POST/BIOS over the network. For further information, refer to “Update
POST/BIOS from Network” on page 69.
As part of the continuing work to improve quality, IBM might make changes and
enhancements to the POST/BIOS. When updates are released, they are available via
download files on the World Wide Web (http://www.pc.ibm.com) or through the
PC Company Bulletin Board Service (see “Using Electronic Support Services” on
page 109). Instructions for using POST/BIOS updates will be available in a
README file included in the download files.
Chapter 3. Operating Your Computer33
34Using Your Personal Computer
Chapter 4. Taking Care of Your Computer
This chapter provides guidelines for the proper handling and care of your
computer.
Basics
Here are some basic points about keeping your computer functioning properly:
Keep your computer in a clean, dry environment. Make sure it rests on a flat,
sturdy surface.
Do not place items on top of the monitor or cover any of the vents in the
monitor or computer. These vents provide air flow to keep your computer from
overheating.
Keep food and drinks away from all parts of your computer. Food particles
and spills will make the keyboard and mouse sticky and unusable.
Do not get the power switches or other controls wet. Moisture can damage
these parts and cause an electrical hazard.
Always disconnect a power cord by grasping the plug, not the cord.
Cleaning Your Computer
It is a good practice to clean your computer periodically to protect the surfaces and
ensure trouble-free operation.
CAUTION:
Be sure to turn off the computer and monitor power switches before cleaning the
computer and monitor screen.
Computer and Keyboard
Use only mild cleaning solutions and a damp cloth to clean the painted surfaces of
the computer.
Monitor Screen
Do not use abrasive cleaners when cleaning the surface of the monitor screen. The
screen surface is easily scratched, so avoid touching it with pens, pencil points, and
erasers.
Copyright IBM Corp. 1996, 1997 35
To clean the screen surface, wipe it gently with a soft, dry cloth, or blow on the
screen to remove grit and other loose particles. Then use a soft cloth moistened
with a nonabrasive liquid glass cleaner.
Mouse
If the pointer on the screen does not move smoothly with the mouse, you might
need to clean the mouse.
1. Turn off the computer.
2. Disconnect the mouse cable from the computer.
3. Turn the mouse upside down. Unlock the retainer on the bottom of the mouse
by moving it in the direction indicated by the arrow on the retainer.
4. Turn the mouse right-side up, and the retainer and ball will drop out.
5. Wash the ball in warm, soapy water, and dry it well.
6. Using a damp cloth, wipe the outside of the mouse and the retainer. Be sure to
wipe the rollers inside the mouse and then let them dry.
7. Insert the ball and retainer. Lock the retainer by moving it in the opposite
direction of the arrow.
8. Reconnect the mouse cable to the computer.
36Using Your Personal Computer
Replacing the Battery
Your computer has a special type of memory that maintains the date, time, and the
settings for built-in features, such as serial- and parallel-port assignments
(configuration). A battery keeps this information active when you turn off the
computer.
The battery requires no charging or maintenance throughout its life; however, no
battery lasts forever. If the battery fails, the date, time, and configuration
information (including passwords) are lost. An error message is displayed when
you turn on the computer.
Refer to “Lithium Battery Notice” on page vii of this publication and InstallingOptions in Your Personal Computer for information about replacing the battery.
If you replace the original lithium battery with a heavy-metal battery or a battery
with heavy-metal components, be aware of the following environmental
consideration: batteries and accumulators that contain heavy metals must not be
disposed of with normal domestic waste. They will be taken back free of charge by
the manufacturer, distributor, or representative to be recycled or disposed of in a
proper manner. For further information on battery disposal, call IBM at
1-800-IBM-4333 (1-800-426-4333) in the U.S. For information outside of the U.S.,
contact your IBM reseller or marketing representative.
Chapter 4. Taking Care of Your Computer37
Moving Your Computer
CAUTION:
Do not move your computer while it is on. Always turn off the computer
before you move it.
Do not risk injury by moving or lifting the computer by yourself. Ask
another person to help you.
Normal shipping and handling can cause loss of data from a hard disk. If your
computer has a hard disk drive, take the following precautions:
1. Back up all files and data from the hard disk.
Operating systems can vary in the way they perform backup procedures. Some
operating systems save only data files, while others make copies of application
program files and data files. Refer to your operating system documentation for
information about software backup.
2. Remove all media (diskettes, compact discs, tapes, and so on) from the drives.
3. Turn off the computer and all attached devices. Your hard disk drive
automatically parks the read/write heads in a nondata area. This process
prevents damage to the hard disk.
4. Unplug the power cords from electrical outlets.
5. Note where you have attached your cables to the rear of the computer; then
remove them.
6. If you saved the original shipping cartons and packing materials, use them to
pack the units. If you are using different cartons, cushion the units to avoid any
damage.
38Using Your Personal Computer
Chapter 5. Using the Configuration/Setup Utility Program
This section discusses the Configuration/Setup Utility program that is provided
with your computer. The Configuration/Setup Utility program enables you to view
and change the configuration and setup of your computer, regardless of which
operating system you are using.
Important
Operating systems often provide a way of changing many of the same settings
found in the Configuration/Setup Utility program. If you do use the operating
system to make changes, be aware that these changes might conflict with or
override any similar settings in the Configuration/Setup Utility program.
Starting the Configuration/Setup Utility Program
1. Start the computer by following steps 1 and 2 on page 21.
2. When the Configuration/Setup Utility prompt appears in the lower-left corner
of the screen, quickly press F1. If you have not set an administrator password,
the Configuration/Setup Utility program menu appears.
If you have set an administrator password, a prompt appears on the screen.
Type the administrator password, and press Enter.
If the computer is protected by both an administrator and power-on password,
you can type either password at the prompt and press Enter. However, if you
need to change settings in the Configuration/Setup Utility program, you must
enter the administrator password. Entering the power-on password will only
enable you to view the System Summary and Product Data information of your
computer.
Copyright IBM Corp. 1996, 1997 39
After you start the Configuration/Setup Utility program, the following menu
appears.
Configuration/Setup Utility
Select Option:
System Summary
Product Data
Devices and I/O Ports
Start Options
Date and Time
System Security
Advanced Setup
ISA Legacy Resources
Advanced Power Management
Save Settings
Restore Settings
Load Default Settings
Exit Setup
The following is a list of the categories that appear in the preceding menu. After
each category are the actions you can take within each one.
System Summary
You can view information about the current options and features in your
computer. Included in the system summary is information about the
microprocessor, memory, video controller, and diskette and hard disk drives.
Product Data
You can view information about the machine type and model, flash EEPROM
revision level, system-board identifier, system serial number, and BIOS date.
Devices and I/O Ports
You can view and change settings for devices and I/O ports, including video,
IDE drive, serial port, parallel port, and Ethernet settings.
Start Options
You can view and change settings for device startup sequence, keyboard speed,
virus detection, various power-on options, and other features of your computer.
40Using Your Personal Computer
Date and Time
You can view and change the date and time of the internal clock in your
computer.
System Security
You can view and change settings that control access to the hard disk and
diskette drives. You can also set, change, and delete power-on and
administrator passwords.
Advanced Setup
You can view and change settings for advanced hardware features, including
ROM shadowing and microprocessor, memory, and PCI control. If the settings
in Advanced Setup are not configured correctly, your computer might
malfunction.
ISA Legacy Resources
You can view and change system resources (DMA, interrupt, memory, and I/O
port) used by ISA legacy adapters.
Advanced Power Management
You can view and change settings that affect the energy-saving features of your
computer, including the automatic power-on feature.
Chapter 5. Using the Configuration/Setup Utility Program41
Viewing and Changing Settings in the Configuration/Setup Utility
Program
You must use the keyboard to navigate through the different menus of the
Configuration/Setup Utility program. Active keys for each menu are always
displayed at the bottom of each screen. The following table shows the functions of
the available keys.
KeysFunction
↑↓Use these arrow keys to move between menu items until the item you want is
highlighted.
←→Use these arrow keys to display and toggle between choices for a menu item.
EnterPress this key to select a highlighted menu item.
EscPress this key to exit from a menu after viewing or making changes to the
settings in the menu.
+Use this key in some menus to increase the numerical value of a setting.
−Use this key (the minus or hyphen key) in some menus to decrease the
numerical value of a setting.
0–9Use these number keys in some menus to change the numerical value of a
setting.
F1Press this key for help on a selected menu item.
F9Press this key if you changed a setting and you want to restore the setting
that was active before you made the change.
F10Press this key to return the setting of a selected menu item to a default value.
The Configuration/Setup Utility program uses the following symbols to assist you
with viewing and changing settings.
SymbolMeaning
An additional menu is available.
[ ]You can only change settings within these brackets.
5A change has been made or the Configuration/Setup Utility program detected
an error and attempted to correct it. Also, an additional menu might follow a
menu item with a beside it.
*A system resource conflict. Resolve this conflict before exiting from the
Configuration/Setup Utility program so that your computer will function
properly.
42Using Your Personal Computer
Exiting from the Configuration/Setup Utility Program
When you finish viewing or changing settings in the Configuration/Setup Utility
program, follow these steps to exit from the program:
1. Press Esc until you return to the Configuration/Setup Utility program menu.
2. Do one of the following:
a. To restore the settings before they were changed and saved, select Restore
Settings.
b. To load the default values for all settings, select Load Default Settings.
c. To save any changed settings (including restored settings or default
settings), select Save Settings. If you do not save settings here, you are
given the opportunity to do so in the Exit Setup menu.
3. Press Esc to enter the Exit Setup menu and follow the instructions on the screen.
8
8
If you are a network administrator using RPL or DHCP in conjunction with network-management
software, read “Network-Enabled Startup Sequence” on page 66 before loading the default settings.
Chapter 5. Using the Configuration/Setup Utility Program
43
Saving Settings After Installing an Option
In most cases, when you add or remove hardware from your computer, the BIOS
(basic input/output system) detects the changes and then updates the configuration
automatically. Although the computer changes the configuration settings
automatically, you must save these changes in the Configuration/Setup Utility
program for the new configuration to take effect. If you do not save the new
settings, your operating system will not start.
To save the configuration after adding or removing hardware, complete the
following steps.
1. When you turn on the computer, an error message indicating that a
configuration change has occurred appears approximately 30 seconds after the
memory count numbers stop cycling in the upper-left corner of the screen.
When the configuration error message disappears, the POST Startup Errors
screen appears, and you are prompted to Continue or Exit Setup. Select
Continue. (If you select Exit Setup, you will get another error message.)
2. The Configuration/Setup Utility program menu appears with a right arrowhead
(5) next to the menu category in which the configuration change has occurred.
Select this menu item if you want to view the new configuration settings, and
then press Esc to return to the Configuration/Setup Utility program menu.
3. Select Save Settings from the Configuration/Setup Utility program menu.
4. Press Esc to exit the Configuration/Setup Utility program, and follow the
instructions on the screen.
44Using Your Personal Computer
Viewing the System Summary
You can use the Configuration/Setup Utility program to view a summary of the
options and features in your computer. To view the system summary:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select System Summary from the Configuration/Setup Utility program menu.
The System Summary screen appears.
Depending on the model and configuration, your screen might appear slightly
different from the one shown here.
System Summary
ProcessorPentium
Processor Speed166 MHz
Math CoprocessorInternal
System Memory640 KB
Extended Memory31 MB
Video ControllerCirrus Logic GD-5446 SVGA
Cache Size256 KB
Cache StateEnabled
Shadow RAM384 KB
System ROMF000h - FFFFh
Memory TypeNon-parity
Diskette Drive A:1.44 MB, 3.5"
Diskette Drive B:Not Installed
Hard Disk Drive 01.2 GB
CD-ROM Drive 1Installed
Hard Disk Drive 2Not installed
Hard Disk Drive 3Not installed
Chapter 5. Using the Configuration/Setup Utility Program45
Setting the Date and Time
Your computer has an internal clock that maintains the date and time. A battery
keeps the clock active when you turn off the computer.
To set the date and time:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select Date and Time from the Configuration/Setup Utility program menu.
3. Type the date and time in the appropriate fields.
4. Press Esc to return to the Configuration/Setup Utility program menu.
5. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu and press Enter.
6. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Your operating system might also have a function for setting the date and time.
Refer to your operating system documentation for more information.
Changing Keyboard Speed
You can change the speed at which the keyboard responds when you hold down a
key. The normal typematic rate is 10 characters per second, but you can use the
Configuration/Setup Utility program to increase this rate to up to 30 characters per
second.
To change the keyboard speed:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select Start Options from the Configuration/Setup Utility program menu.
3. Set Keyboard Speed to Normal or Fast. Use Left Arrow (←) or Right Arrow
(→) to toggle between selections.
4. Press Esc to return to the Configuration/Setup Utility program menu.
5. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
6. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
46Using Your Personal Computer
Changing Monitor Settings
Your computer has a graphics controller. SVGA is a video standard for displaying
text and graphic images on a monitor screen. Like other video standards, SVGA
supports a variety of video modes. Video modes are different combinations of
resolution, refresh rate, and color defined by a video standard for displaying text or
graphics.
SVGA provides higher-resolution graphics, faster refresh rates, and more colors than
previous video standards, such as video graphics array (VGA). At the same time,
SVGA supports all standard VGA modes.
To get the best possible image on your screen and to reduce or eliminate flicker,
you might need to reset the resolution and refresh rate of your monitor. Refer to
your operating system documentation for further information on monitor settings.
Important
Before you change any monitor settings, be sure to review the information that
comes with your monitor. Using a resolution or refresh rate that is not
supported by your monitor might cause the screen to become unreadable and
damage the monitor. The information that comes with your monitor usually
includes the resolutions and refresh rates that the monitor supports. If you need
additional information, contact the manufacturer of the monitor.
To minimize screen flicker and jitter, set your monitor for the highest noninterlaced
refresh rate that the monitor supports. If your monitor complies with the VESA
Display Data Channel (DDC) standard, it is probably already set to the highest
refresh rate that the monitor and graphics controller can support. If you are not
sure if your monitor is DDC-compliant, refer to the documentation provided with
the monitor.
To change the monitor settings, select Devices and I/O Ports and then Video Setup
from the Configuration/Setup Utility program menu.
Chapter 5. Using the Configuration/Setup Utility Program47
The following modes are supported by your computer.
Resolution
(Pels)
640 x 4808/15/1660, 72, 75, 851
640 x 4803260, 72, 75, 852
800 x 6008/15/1660, 72, 75, 851
800 x 6003260, 72, 75, 852
1024 x 768843i, 60, 70, 72, 75, 851
1024 x 76815/1643i, 60, 70, 72, 752
1280 x 1024845i, 60, 72, 752
1600 x 1200849i2
Bits per
Pixel
Refresh Rates
(Hz)
Memory Required (MB)
Notes:
1. 43, 45, and 49 Hz are interlaced (i); all other refresh rates shown are
noninterlaced.
2. If 2 MB of memory is required for the video mode, an optional 1 MB of memory
must be installed in the system board.
Some application programs require video device drivers to use SVGA modes. If your
computer has IBM-preinstalled software, the video device drivers are included and
instructions are provided online. If your software is not preinstalled, the video
device drivers are on the Ready-to-Configure CD.
Some application programs provide their own video device drivers to take
advantage of SVGA modes. These device drivers are installed through a setup
program built into the application program. Setting up these applications to operate
in SVGA modes might be confusing because terminology for these modes is not
consistent throughout the industry. If you are uncertain about the terminology used
by your application program, refer to the documentation that comes with the
application for additional information.
48Using Your Personal Computer
Software Compatibility
The graphics controller can display application programs written for any of the
following video modes. Monochrome graphics adapter (MGA), color graphics
adapter (CGA), enhanced graphics adapter (EGA), multicolor graphics array
(MCGA), and video graphics array (VGA) are all video standards used with earlier
personal computers.
Video
Standard
MGA720 x 350—
CGA320 x 2004
EGA640 x 35016
MCGA320 x 200
VGA640 x 48016
Monitor
Resolution
640 x 480
Colors
(1 MB DRAM)
256
2
Chapter 5. Using the Configuration/Setup Utility Program49
Changing Serial Port Settings
If you add a serial adapter or use special hardware or software that causes a
configuration conflict, you might need to change the serial port settings. The serial
port can use any of the following settings:
The four available port addresses are (in hex): 3F8, 2F8, 3E8, 2E8.
The two recommended IRQ assignments are: IRQ 4 and IRQ 3. You can also use
IRQ 9, IRQ 10, IRQ 11, IRQ 14, and IRQ 15, but these settings might not work
with some operating systems and applications.
To change the serial port settings:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select Devices and I/O Ports from the Configuration/Setup Utility program
menu.
3. Select Serial Port Setup.
4. Use the arrow keys to select the settings for Serial Port A Address or SerialPort A IRQ.
5. Press Esc to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Note: For more information on the serial ports, see Understanding Your Personal
Computer.
50Using Your Personal Computer
Changing Parallel Port Settings
If you add a parallel adapter or use special hardware or software that causes a
configuration conflict, you might need to change the parallel port settings.
The parallel port can operate in several different modes. The default mode for your
computer is SPP (standard parallel port). However, your computer also supports
the ECP/EPP (extended capabilities port/enhanced parallel port) mode. ECP/EPP
has two advantages over SPP. When your computer is in ECP/EPP mode, you can
print documents faster than when the computer is in SPP mode, and you can attach
devices other than printers, such as communication and storage devices, to the
parallel port. You can set modes of operation for the parallel port using the
Configuration/Setup Utility program.
The parallel port can use any of the following settings:
The three available port addresses are (in hex): 3BC, 378, and 278.
The two available IRQ assignments are: IRQ 7 and IRQ 5.
To change the parallel port settings:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select Devices and I/O Ports from the Configuration/Setup Utility program
menu.
3. Select Parallel Port Setup.
4. Use the arrow keys to select the settings.
5. Press Esc to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Note: For more information on the parallel port, see Understanding Your Personal
Computer.
Chapter 5. Using the Configuration/Setup Utility Program51
Changing Plug and Play Control Features
If you are installing a Plug and Play adapter or other device and experience
problems, you might need to change certain settings in Plug and Play Control in the
Configuration/Setup Utility program.
Note: If you experience any error message related to Plug and Play adapters or
devices, see “POST Error Message Charts” on page 77 for complete
information on solving the problem.
A setting that might affect the way a Plug and Play adapter behaves is the Address
Decode setting. Most Plug and Play adapters use 16-bit address decoding (this is
the default setting for Address Decode.). Some Plug and Play adapters have not
fully implemented this addressing scheme. If you are experiencing problems with a
Plug and Play adapter, changing the address decoding to 10-bit might fix the
problem. Conversely, if you are experiencing an 1852 error message, changing the
address decode setting to 16-bit might fix the problem.
Another setting that affects any type of Plug and Play device is the Plug and Play
Operating System setting. If you install a Plug and Play adapter or device and
experience a 185x error messages, and your computer will be loading a Plug and
Play-compliant operating system, set this value to Yes.
Note: Check your operating system documentation to determine if it supports this
function.
The 185x error messages occur because the computer is unable to configure all
adapters and devices in the system due to conflicting resource assignments.
Selecting Yes allows the configuration of Plug and Play devices to be performed by
the operating system.
To change Plug and Play control settings, select Advanced Setup and then Plug and
Play Control. The next menu displays Address Decode and Plug and Play
Operating System.
52Using Your Personal Computer
Using Passwords
Two types of password protection are available to help you secure your computer
and the information you store in it. The power-on password feature deters
unauthorized persons from gaining access to the information stored in your
computer. The administrator password feature helps prevent unauthorized persons
from accessing the Configuration/Setup Utility program and changing the setup of
your computer. If you are responsible for maintaining the settings of several
computers, you might want to set an administrator password.
Other password security features might be available through your operating system
or network.
Power-On Password
You do not need a power-on password to use your computer, but setting this type
of password deters unauthorized persons from using your computer. When a
power-on password is set, you must type the password at the password prompt
that appears as the computer starts.
When you set the power-on password, you can choose one of three password
prompt modes:
OnIn On mode, you are prompted for the power-on password when you
turn on the computer. Until the correct password is entered, the
computer will not run the CONFIG.SYS or AUTOEXEC.BAT
instructions, the operating system will not start, and the keyboard will
remain locked. If you have a mouse connected to the mouse port, it also
will remain locked. If you have a mouse connected to a serial port, it
will be activated when the computer is started, regardless of whether a
password is set.
9
OffIn Off mode (also referred to as Unattended Start mode), you are not
prompted to enter your power-on password when you turn on the
computer. The computer will run the CONFIG.SYS and
AUTOEXEC.BAT instructions and start the operating system. However,
if you have a mouse connected to the mouse port, refer to the following
text box.
9
CONFIG.SYS and AUTOEXEC.BAT do not exist with some operating systems, such as Windows NT.
Chapter 5. Using the Configuration/Setup Utility Program
53
Important Information for Mouse Users
This information applies only to those who have a mouse connected
to the mouse port; a serial mouse is not affected by the Off mode.
The Off mode prevents the computer from detecting that a mouse is
attached. Because the mouse device driver will not be loaded
automatically through the CONFIG.SYS or AUTOEXEC.BAT files in
this mode, an error message that the mouse port is disabled will
appear and the computer will halt. To enable the operating system to
load without displaying the error message, read the information
below that applies to your operating system.
If you are using OS/2, do one of the following before enabling the
Off mode:
Set the CONFIG.SYS file so the operating system does not stop on
a device-driver error. To do this, put the command
"PAUSEONERROR=NO" near the top of the CONFIG.SYS file.
or
Remove the mouse driver statement from the CONFIG.SYS file.
If you are using Windows 95, do the following:
When the computer is started and the mouse port disabled error
message appears, enter either your power-on or administrator
password to enable the keyboard. Then use the keyboard to put
a checkmark in the "Do not display this message in the future"
checkbox.
Once the operating system starts in the Off mode, the keyboard will
remain locked. If you have a mouse connected to the mouse port, it also
will remain locked.
Although you are not prompted to type a password in this mode, you
can type either your power-on or administrator password anytime after
POST has completed, even after the operating system has loaded. If you
type a password, the keyboard will unlock, but the mouse connected to
the mouse port will remain disabled.
The Off mode is useful for network servers and other computers that
operate unattended. If a power failure occurs, the computer will
automatically restart and resume operating in this mode when power is
restored, without operator intervention.
54Using Your Personal Computer
DualIn Dual mode, the startup behavior of the computer depends on whether
the computer is started from the computer power switch or by an
unattended method, such as a modem, timer, or Wake on LAN.
If you start the computer by using the power switch, the computer
operates the same as it does in the On mode. Refer to page 53 for
further information.
If the computer is started by an unattended method, such as remotely
over a LAN, the computer operates the same as it does in Off mode.
Refer to page 53 for further information.
Note: Even though the mouse and keyboard are not active, the system
can still be managed remotely by network management software,
such as TME 10 NetFinity or Intel LANDesk.
If both a power-on and administrator password are set, you can type either of the
passwords at the password prompt that appears as you start your computer.
However, if you want to change any settings in the Configuration/Setup Utility
program, you must type your administrator password at the password prompt that
appears when you try to access the Configuration/Setup Utility program. If you type
your power-on password at this prompt, you will be able to view limited
information in the Configuration/Setup Utility program, but you will not be able to
change any settings.
The password does not appear on the screen as you type it. If you type the wrong
password, you receive a screen message telling you so. If you type the wrong
password three times, you must turn off the computer and start again. When you
type the correct password, the keyboard and mouse will unlock, and the computer
will begin normal operation.
Chapter 5. Using the Configuration/Setup Utility Program55
Setting and Changing a Power-On Password: Use the Configuration/Setup
Utility program to set or change a power-on password. You can use any
combination of up to seven characters (A–Z, a–z, and 0–9) for this password.
Important
Keep a record of your power-on password in a secure place. When a power-on
password has been set, you cannot activate the keyboard and mouse without
first using the password. If you lose or forget your password, you cannot
change or delete it without removing the computer cover and moving a jumper
on the system board. Refer to “Erasing Lost or Forgotten Passwords” on
page 60 for further information.
To set or change a power-on password:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Power-on Password.
4. Type your password and press Down Arrow (↓).
5. Type your password again.
6. At Password Prompt, select On, Off, or Dual. Press Left Arrow (←) or Right
Arrow (→) to toggle between selections.
7. Select Change Power-on Password, and follow the instructions on the screen.
8. The System Security menu appears. Press Esc to return to the
Configuration/Setup Utility program menu.
9. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
10. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
56Using Your Personal Computer
Deleting a Power-On Password: Use the Configuration/Setup Utility program
to delete a power-on password.
To delete a power-on password:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Power-on Password.
4. Select Delete Power-on Password and follow the instructions on the screen.
5. The System Security screen appears. Press Esc to return to the
Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Chapter 5. Using the Configuration/Setup Utility Program57
Administrator Password
Setting an administrator password deters unauthorized persons from changing
settings in the Configuration/Setup Utility program. When an administrator
password is set, you can change settings in the Configuration/Setup Utility program
only after typing the administrator password at the password prompt that appears
when you try to access the Configuration/Setup Utility program.
If you are responsible for maintaining the settings of several computers, you might
want to set an administrator password.
When you set an administrator password, a password prompt appears each time
you try to access the Configuration/Setup Utility program. The password does not
appear on the screen as you type it. If you type the wrong password, you receive a
screen message telling you so. If you type the wrong password three times, you
must turn off the computer and start again. When you type the correct password,
the Configuration/Setup Utility program menu appears.
If both a power-on and administrator password are set, you can type either of the
passwords at the password prompt that appears as you start your computer. However,
if you want to change any settings in the Configuration/Setup Utility program, you
must type your administrator password at the password prompt that appears whenyou try to access the Configuration/Setup Utility program. If you type your power-on
password at this prompt, you will be able to view limited information in the
Configuration/Setup Utility program, but you will not be able to change any
settings.
58Using Your Personal Computer
Setting and Changing an Administrator Password: Use the
Configuration/Setup Utility program to set or change an administrator password.
You can use any combination of up to seven characters (A–Z, a–z, and 0–9) for the
password.
Important
Keep a record of your administrator password in a secure place. When an
administrator password has been set, you cannot access the Configuration/Setup
Utility program without first using the administrator password. If you lose or
forget your password, you cannot change or delete it without removing the
computer cover and moving a jumper on the system board. Refer to “Erasing
Lost or Forgotten Passwords” on page 60 for further information.
To set or change an administrator password:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Administrator Password.
4. Type your password and press Down Arrow (↓).
5. Type your password again.
6. At Power-On Password Changeable by User, select Yes or No. Press Left
Arrow (←) or Right Arrow (→) to toggle between selections. (If you select Yes,
the user will be able to change the power-on password if an administrator
password is set. If you select No, the user will not be able to change the
power-on password if an administrator password is set.)
7. Select Set or Change Administrator Password and follow the instructions on
the screen.
8. The Administrator Password menu appears. Press Esc twice to return to the
Configuration/Setup Utility program menu.
9. Before you exit from the Configuration/Setup Utility program, select SaveSettings from the Configuration/Setup Utility program menu.
10. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Chapter 5. Using the Configuration/Setup Utility Program59
Deleting an Administrator Password: Use the Configuration/Setup Utility
program to delete an administrator password.
To delete an administrator password:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select System Security from the Configuration/Setup Utility program menu.
3. Select Administrator Password.
4. Select Delete Administrator Password and follow the instructions on the screen.
5. The System Security screen appears. Press Esc to return to the
Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Erasing Lost or Forgotten Passwords
To erase a lost or forgotten power-on or administrator password, you must remove
the computer cover and move the CMOS-clear jumper (also referred to as the
password jumper) on the system board. See Installing Options in Your Personal
Computer for instructions on removing the computer cover and moving jumpers.
Refer to the system board label inside the computer cover for the location of the
CMOS-clear (password) jumper.
Important
If you move the CMOS-clear jumper, the Configuration/Setup Utility program
will load the default settings. You will need to reconfigure the computer. Use
the Configuration/Setup Utility program to reconfigure the computer and to set
a new password.
If your model has integrated Ethernet support, note that erasing the computer
configuration erases special factory settings for the primary startup sequence.
For more information on these settings, see “Network-Enabled Startup
Sequence” on page 66.
60Using Your Personal Computer
Using Advanced Power Management Features
Your computer comes with built-in energy-saving capabilities. You can view and
change energy-saving settings using the Advanced Power Management menu in the
Configuration/Setup Utility program. This section describes the Advanced Power
Management features in your computer and provides instructions for using these
features.
Important
If a device, such as a monitor, does not have power-management capabilities, it
can be damaged when exposed to a reduced-power state. Before you make
energy-saving selections for your monitor, check the documentation that comes
with your monitor to see if it supports Display Power Management Signaling
(DPMS).
Automatic Hardware Power Management Features
With Automatic Hardware Power Management, you can have the computer,
microprocessor, and monitor (if the monitor supports DPMS) go into reduced-power
states if they are inactive for a certain length of time.
There are three levels of power management. For each level, you can specify the
amount of time that the computer must be inactive before the power management
options you select begin to take effect. For Level 1, you can select 5 minutes to 4
hours; for Level 2, you can select 10 minutes to 5 hours; and for Level 3, you can
select 15 minutes to 6 hours. At each level, you can define the amount of energy
savings by specifying values for the following options.
System Power: With this option, you can select On if you want the computer
to remain on, or Off if you want the computer to shut down.
Processor Speed: With this option, you can set your microprocessor to run at 1,
10, 25, or 50 percent of its internal clock speed, or you can disable the
microprocessor entirely. Any computer activity returns the microprocessor to
full speed.
Chapter 5. Using the Configuration/Setup Utility Program61
Display: With this option, you can disable the monitor entirely, or select one of
the following reduced-power states:
– Standby: In this mode, the screen is blanked, but the screen image is
restored immediately when any activity is detected.
– Suspend: In this mode, the monitor uses less power than in Standby mode.
The screen is blanked, but the screen image is restored within a few seconds
after any activity is detected.
– Off: In this mode, the monitor power is turned off. To restore power to
the monitor, you must press the monitor power switch.
Hard Disk Drive: With this option, you can enable the hard disk drive to “spin
down” (shut down the drive motor) after about 20 minutes of inactivity on the
drive. When you attempt to read from or write to the hard disk, the spindle
starts back up within a few seconds.
Setting Automatic Hardware Power Management Features: To set
Automatic Hardware Power Management features, complete the following steps.
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select Advanced Power Management from the Configuration/Setup Utility
program menu.
3. Be sure APM BIOS Mode is set to Enabled. If it is not, press Left Arrow (←)
or Right Arrow (→) to change the setting.
4. Select Automatic Hardware Power Management.
5. Set Automatic Hardware Power Management to Enabled.
6. Select values for the three levels of power management (system power,
processor speed, and display), as necessary.
7. Set Hard Disk to Enabled or Disabled.
8. Press Esc twice to return to the Configuration/Setup Utility program menu.
9. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
10. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
62Using Your Personal Computer
Automatic Power On Features
The Automatic Power On features within the Advanced Power Management menu
allow you to enable and disable features that turn your computer on automatically.
Serial Port/Modem Ring Detect: Set this feature to Enabled to allow your
system to power on when a ring is detected on an internal modem or on a
modem connected to a serial port.
Wake Up on Alarm: With this feature, you can specify a date and time at
which the computer will be turned on automatically. This can be either a single
event or a daily event.
Wake on LAN: If your computer has a properly configured Ethernet LAN
connection and you have network-management software, you can use the
IBM-developed Wake on LAN feature. When you set Wake on LAN to
Enabled, your computer will turn on when it receives a specific signal from
another computer over the LAN. For more information, see “Wake on LAN” on
page 69.
Setting Automatic Power On Features: To set Automatic Power On features,
complete the following steps.
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select Advanced Power Management from the Configuration/Setup Utility
program menu.
3. Select Automatic Power On.
4. Select the menu item for which you want to view or change settings. Use Left
Arrow (←) or Right Arrow (→) to toggle between selections.
5. Press Esc twice to return to the Configuration/Setup Utility program menu.
6. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility program menu.
7. To exit from the Configuration/Setup Utility program, press Esc and follow the
instructions on the screen.
Chapter 5. Using the Configuration/Setup Utility Program63
System Management Settings
This section, which describes how to configure the network interface in your
computer, is intended primarily for network administrators. For further information
on the system management capabilities of your computer, refer to “Using System
Management Features” on page 32.
The Configuration/Setup Utility program includes settings that can be enabled and
disabled to configure the network interface in your computer. These settings are:
Ethernet support
Remote program load (RPL) and dynamic host configuration protocol (DHCP)
Automatic power on startup sequence
Wake on LAN
Update POST/BIOS from network
If you have an integrated Ethernet subsystem, you can also view the media access
control (MAC) address for your computer in the Configuration/Setup Utility
program. To access the MAC address, select Devices and I/O Ports from the
Configuration/Setup Utility program menu, and then select Ethernet Setup. You
can view but not change the MAC address setting.
Instructions for accessing the other system management settings in the
Configuration/Setup Utility program follow.
Ethernet Support
This setting is used to enable or disable the integrated Ethernet controller in your
computer. The setting is enabled by default.
If you do not use the integrated Ethernet, disable the Ethernet Support setting. By
doing this, you free up system resources that can be used for optional adapters.
To access the Ethernet Support setting, select Devices and I/O Ports and then
Ethernet Setup from the Configuration/Setup Utility program menu.
Note: The serial number for the system board integrated Ethernet is 10000000. You
might need this information if you install optional network adapters.
64Using Your Personal Computer
RPL and DHCP
Remote program load (RPL) enables your computer to start directly from a server
over a LAN that has been configured for RPL. Network-management software,
such as LANClient Control Manager, is required to take advantage of RPL.
Dynamic host configuration protocol (DHCP) makes it possible for a DHCP server
10
on your intranet
to assign an internet protocol (IP) address to your computer so
that a boot image can be remotely loaded. DHCP can be used by
network-management software such as Intel LANDesk Configuration Manager.
Models with an integrated Ethernet subsystem are enabled to use RPL and DHCP
as selected through the Configuration/Setup Utility program. A model without the
integrated Ethernet can also use these features, but only if it is equipped with an
optional network adapter that has built-in read-only memory (ROM) support for
RPL or DHCP. See the documentation that comes with the optional adapter for
more information.
If you install an optional network adapter with those models that have integrated
Ethernet, disable Ethernet Support if you want to use the RPL or DHCP features of
the optional adapter. See “Ethernet Support” on page 64 for information on
disabling the integrated Ethernet subsystem.
To enable or disable RPL or DHCP, complete the following steps:
1. Start the Configuration/Setup Utility program (see “Starting the
Configuration/Setup Utility Program” on page 39).
2. Select Devices and I/O Ports from the Configuration/Setup Utility program
menu, and then select Ethernet Setup.
3. Set Ethernet Support to Enabled.
4. Under Network Boot, use the arrow keys to select RPL or DHCP. (Select
Disabled if you do not want to start an operating system from the network.)
5. Press Esc until you return to the Configuration/Setup Utility program menu.
6. Select Start Options, and then select Startup Sequence. You must include the
Network setting somewhere in your startup sequence.
10
An intranet is a network within an organization that provides services similar to those provided by the
Internet, but that is not necessarily connected to the Internet.
Chapter 5. Using the Configuration/Setup Utility Program
65
7. Refer to “Exiting from the Configuration/Setup Utility Program” on page 43 for
instructions on saving your settings and exiting from the Configuration/Setup
Utility program.
Note: When you are using the RPL and DHCP features, you might encounter error
messages specific to the integrated Ethernet subsystem. If this happens,
record the error message and report the problem to your network
administrator. Also, information about these error messages is documented
in “Error Messages Specific to the Integrated Ethernet” on page 107.
Network-Enabled Startup Sequence: If your computer is equipped with the
integrated Ethernet subsystem, the settings for the primary startup sequence have
been factory-changed to support network-management software, such as LANClient
Control Manager. If your computer is properly configured, you can use these
settings to perform a remote program load each time your computer is started.
Note: These factory settings are not the default settings for your computer. If the
default settings are ever restored, the factory settings will be erased. (For the
default settings, see “Default Settings for the Startup Sequence” on page 68.)
If the default settings are loaded, you can always change these settings back
to the values shown in the table below.
To view or change any of the startup sequence settings, select Start Options from
the Configuration/Setup Utility program menu, and then select Startup Sequence.
The primary startup sequence is the first group of startup devices that you see. The
factory settings for these devices are listed below.
First Startup DeviceDiskette Drive 0
Second Startup DeviceNetwork (RPL)
Third Startup DeviceHard Disk Drive 0
Fourth Startup DeviceDisabled
As the above settings imply, once your computer is started (and there is no flash
diskette loaded in the diskette drive), the computer tries to perform an RPL over a
network. When this happens, the following message appears on the screen.
Press "Home" key to cancel RPL
If your computer is properly connected to a LAN, RPL will continue to run until it
is successful or until you cancel it by pressing the Home key. If your computer is
11
Although RPL does not show up in this menu, this is the action (remote program load) that is taking
place when the second startup device is accessed. You can change this setting in the Ethernet Setup
menu, under Network Boot. See “RPL and DHCP” on page 65 for more information.
66Using Your Personal Computer
11
not connected to a LAN or if you cancel RPL, the computer accesses the third
startup device, the hard disk drive, and attempts to load the operating system.
Note that if you have enabled DHCP under Network Boot (in Ethernet Setup
menu) instead of RPL, the following message also appears on the screen each time a
network boot occurs.
Press "Spacebar" to Boot from Network
If your computer is properly connected to a LAN, you must press the spacebar to
invoke DHCP. If the computer is not connected to LAN or if you cancel RPL by
pressing the Home key, the computer bypasses DHCP and accesses the third startup
device.
Important
If you do not plan to use the integrated Ethernet subsystem, disable it. For more
information, see “Ethernet Support” on page 64. If you disable the integrated
Ethernet, the RPL or DHCP message will not appear on the screen each time
you start the computer.
If you see an error message associated with RPL or DHCP, refer to “Error
Messages Specific to the Integrated Ethernet” on page 107 for more information.
Chapter 5. Using the Configuration/Setup Utility Program67
Default Settings for the Startup Sequence: The default settings for the startup
sequence of your computer are shown below. Default settings differ between those
computers that have integrated Ethernet and those computers that do not. To view
or change any of the startup sequence settings, select Start Options from the
Configuration/Setup Utility program menu, and then select Startup Sequence.
Note: If you decide to load the default settings, the values shown in
“Network-Enabled Startup Sequence” on page 66 will change.
The following are the default settings for those computers that do have an
integrated Ethernet subsystem.
Menu ItemSetting
Start Options
Startup Sequence
First Startup DeviceDiskette Drive 0
Second Startup DeviceHard Disk Drive 0
Third Startup DeviceNetwork (RPL)
Fourth Startup DeviceDisabled
Automatic Power On Startup SequenceEnabled
First Startup DeviceNetwork
Second Startup DeviceHard Disk Drive 0
Third Startup DeviceDisabled
Fourth Startup DeviceDisabled
The following are the default settings for those computers that do not have an
integrated Ethernet subsystem.
Menu ItemSetting
Start Options
Startup Sequence
First Startup DeviceDiskette Drive 0
Second Startup DeviceHard Disk Drive 0
Third Startup DeviceDisabled
Fourth Startup DeviceDisabled
Automatic Power On Startup SequenceEnabled
First Startup DeviceHard Disk Drive 0
Second Startup DeviceDisabled
Third Startup DeviceDisabled
Fourth Startup DeviceDisabled
68Using Your Personal Computer
Automatic Power On Startup Sequence
When your computer is turned on remotely, the Automatic Power On Startup
Sequence determines the order of the startup devices. The startup device is the
device that will be used to load the operating system. The settings for the
Automatic Power On Startup Sequence are used in conjunction with the automatic
power on features in your computer, such as Serial Port/Modem Ring Detect, Wake
on Alarm, and Wake on LAN.
To access the Automatic Power On Startup Sequence settings, select Start Options
from the Configuration/Setup Utility program menu, and then select Startup
Sequence.
Wake on LAN
This setting is used to enable or disable the IBM-developed Wake on LAN feature,
which makes it possible for your computer to be powered on remotely by a network
administrator. Remote network-management software must be used to support
Wake on LAN. Examples of such software are LANClient Control Manager and
TME 10 NetFinity.
To access the Wake on LAN setting, select Advanced Power Management, and then
select Automatic Power On from the Configuration/Setup Utility program menu.
Note: To use Wake on LAN with an optional network adapter, the adapter must
support Wake on LAN and be properly configured.
Update POST/BIOS from Network
When this feature is enabled, the POST/BIOS in your computer can be updated
remotely by a network administrator. If you have set an administrator password
for your computer, it does not have to be entered by the network administrator.
Network management software is required in order to take advantage of this
feature.
To access this setting, select System Security from the Configuration/Setup Utility
program menu, and then select POST/BIOS Update.
Chapter 5. Using the Configuration/Setup Utility Program69
70Using Your Personal Computer
Chapter 6. Solving Problems
Computer problems can be caused by hardware, software, or user error (for
example, pressing the wrong key). Using the diagnostic aids discussed in this
chapter, you might be able to solve such problems yourself or gather helpful
information you can pass on to a service technician.
You can check the hardware by following the procedures in this chapter. You can
also use the diagnostic programs provided with your computer (see “Diagnostic
Programs” on page 104 for a description of these programs).
If the hardware checks out OK, and you have not made a user error, you might
have a software problem. If you suspect that you have a software problem and
your computer came with IBM-preinstalled software, refer to About Your Software
and the operating system documentation that comes with your computer. If you
have installed software applications yourself, consult the documentation that comes
with the software.
Copyright IBM Corp. 1996, 1997 71
Error Messages
Error messages that appear on the screen might be text, numeric, or both. There are
several types of error messages:
POST error messages
Messages that appear when POST finds problems with the hardware during
startup or when a change in the hardware configuration is found. POST error
messages are 3-, 4-, 5-, 8-, or 12-character alphanumeric messages and include
brief explanations (except I999XXXX errors).
For more information about what caused an error message to appear and what
action to take, refer to “Solving POST Problems” on page 74 and “POST Error
Message Charts” on page 77.
Software-generated error messages
Messages that appear if a problem or conflict is detected by the application
program, the operating system, or both. Error messages for operating-system
and other software problems are generally text messages, but they also can be
numeric messages. For information about these software error messages, refer
to the information that comes with the operating system or application program,
or both.
Diagnostic error messages
Messages that appear if a hardware problem is detected by a diagnostic test
program. The messages present text information that can be used to identify a
failing part.
Integrated Ethernet-specific error messages
Messages that appear if a problem arises with the integrated Ethernet and the
RPL or DHCP environments. These messages are specific to the integrated
Ethernet controller and software code of your computer.
72Using Your Personal Computer
Power-On Self-Test
Each time you turn on your computer, it performs a series of tests that check the
operation of the base computer. This series of tests is called the power-on self-test(POST).
POST does the following:
Checks basic system-board operations
Checks the memory operation
Compares the current system configuration with that established by the
Configuration/Setup Utility program
Starts the video operation
Verifies that the diskette drives are working
Verifies that the hard disk drive and the CD-ROM (if installed) are working
As POST starts, numbers showing the amount of memory being tested appear in the
upper-left corner of the screen until the total amount of memory in the system is
reached. Options for running a fast POST or accessing the Configuration/Setup
Utility program appear in the lower-left corner of the screen.
Note: The amount of available memory shown might be somewhat less than
expected because of basic input/output system (BIOS) shadowing in random
access memory (RAM).
If POST finishes without detecting any problems, you will hear one beep and the
first screen of your operating system or application program appears (if you have
not set a power-on password). If you have set a power-on password, a password
prompt appears. You must enter your password before the first screen of your
operating system or application program will appear. (For further information on
using passwords, refer to “Using Passwords” on page 53.)
If POST detects a problem, you will hear multiple beeps or no beep. In most cases,
an error code appears in the top left corner of the screen, and in some cases a
description of the error is displayed beside the code. (Note that the screen will
sometimes display multiple error codes and descriptions.) For more information
about what caused an error message to appear and what action to take, refer to
“Solving POST Problems” on page 74 and “POST Error Message Charts” on
page 77.
If you do not hear a beep during POST, refer to “Troubleshooting Charts” on
page 96. You might need to have your computer serviced.
Chapter 6. Solving Problems73
Solving POST Problems
If you receive an error message during the power-on self-test (POST), completing
the steps outlined in this section might enable you to resolve the problem.
Note
If you have just added, removed, or changed the location of a device and you
receive an error message, follow the procedure on page 44. If this does not
eliminate the error message, proceed with the following instructions.
1. Write down all error code numbers and descriptions that appear on the screen
as you start your computer. (Note that a single problem can cause several error
messages to appear. When you correct the cause of the first error message, the
other error messages probably will not appear on the screen the next time you
turn on your computer.)
2. If you have set a power-on password, a password prompt appears. If you have
set both power-on and administrator passwords, you can type either of the
passwords at the password prompt. However, if you think you might need to
change any settings in the Configuration/Setup Utility program, you must type
your administrator password at the password prompt. If you type your
power-on password, you will be able to view error codes and error code
descriptions displayed on the POST Startup Errors screen, and you will also be
able to view limited information in the Configuration/Setup Utility program.
However, you will not be able to change any settings.
3. In the case of most errors, the Configuration/Setup Utility program starts
automatically so that you can attempt to identify and correct the problem.
When the Configuration/Setup Utility program starts, a screen labeled POST
Startup Errors appears. (Note that the POST Startup Errors screen does not
appear immediately. You must wait approximately one minute.) If the POST
Startup Errors screen does not appear, proceed to step 6.
4. At the POST Startup Errors screen, select Continue if you want to access the
Configuration/Setup Utility program menu. Select Exit Setup if you want to
exit the Configuration/Setup Utility program. (See the Important text box in
step 5 for information on exiting the Configuration/Setup Utility program
without making any changes to current settings.) To select an item, press Up
Arrow (↑) or Down Arrow (↓) to highlight the item, and then press Enter.
74Using Your Personal Computer
5. If you selected Continue in step 4, the Configuration/Setup Utility program
menu appears on the screen. You will see a pointer next to any menu items
that are malfunctioning or that have been changed since the last time you
turned on your computer. If you did not knowingly make a change to a
flagged menu item, there is likely a malfunction in that item. If you made a
change, continue here. If you did not make a change, go to step 5e.
To use the Configuration/Setup Utility program, do the following:
a. Select the menu item that is flagged (or that you wish to view) by pressing
Up Arrow (↑) or Down Arrow (↓), and then press Enter.
b. A new menu specific to the item that you selected appears. Press Left
Arrow (←) or Right Arrow (→) to toggle between choices for a menu item.
(Note that each menu item has a Help screen. To view the Help screen,
select the menu item, and then press F1.)
c. When you have finished viewing and changing settings, press Esc to return
to the Configuration/Setup Utility program menu.
d. Before you exit from the program, select Save Settings. When you exit
from the Configuration/Setup Utility program menu (see step 5e), your
operating system will start automatically (unless there is an unresolved
problem with the IDE hard disk drive).
Important
If you did not change any settings in the Configuration/Setup Utility
program, note the following:
You will get an error message if you exit from the
Configuration/Setup Utility program without saving settings. Your
operating system will not start, but the computer will automatically
restart. When the computer restarts, you will get a POST error
message, and then the Configuration/Setup Utility program will
again start automatically.
You will not get an error message if you select save the settings and
exit the Configuration/Setup Utility program. Your system will save
all settings as they currently appear in the Configuration/Setup
Utility program and your operating system will start (unless there is
an unresolved problem with an IDE device).
e. To exit from the Configuration/Setup Utility program, press Esc and follow
the instructions on the screen.
Chapter 6. Solving Problems75
6. For more information about what caused an error message to appear and what
action to take, refer to the following chart.
ProblemGo to:
POST error code or message appears.“POST Error Message Charts” on page 77.
After more than one beep, application
program or operating system appears.
Blank screen, unreadable screen, or other
unusual response occurs.
“Diagnostic Programs” on page 104.
“Troubleshooting Charts” on page 96.
If you are unable to resolve a problem and need assistance, refer to Chapter 7,
“Getting Help, Service, and Information” on page 109.
76Using Your Personal Computer
POST Error Message Charts
The computer might display more than one error message. Often, the first error to
occur causes subsequent errors. When using the POST message charts in this
section, always begin by following the suggested action for the first error message
that appears on your computer screen. Note that, in these charts, “X” can be any
alphanumeric character.
Important
If you find it necessary to remove the computer cover, see Installing Options in
Your Personal Computer.
POST MessageDescription
101
102
110A memory parity failure occurred during testing of the system board.
A failure occurred during testing of the system board and microprocessor.
Action: Have the computer serviced.
Action: Run the diagnostic programs to verify that a problem exists in a
DIMM. (See “Diagnostic Programs” on page 104 for information about
diagnostic programs provided with your computer.)
Refer to Installing Options in Your Personal Computer if you need to
reconfigure the system memory to aid in identifying the defective DIMM.
If you cannot identify the defective DIMM in this way, have the computer
serviced.
Action: Remove all adapters that are not required for system startup and
reinstall them one at a time, retesting after each is reinstalled. When an
adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer
serviced.
Action: Have the computer serviced.
Chapter 6. Solving Problems77
POST MessageDescription
161The battery on the system board is dead.
CAUTION:
Danger of explosion if lithium battery is incorrectly replaced.
Replace the battery with the same or equivalent type recommended by
the manufacturer. Dispose of batteries as required by local ordinances or
regulations. (See “Lithium Battery Notice” on page vii and “Replacing
the Battery” on page 37 for important information on battery use,
disposal, and replacement.)
Action: The computer can be used until you replace the battery.
However, you will have to run the Configuration/Setup Utility program to
set the time and date each time the computer is turned on until a new
battery is installed. (For instructions on using the Configuration/Setup
Utility program, see Chapter 5, “Using the Configuration/Setup Utility
Program” on page 39.)
162A change in device configuration occurred. This message is displayed
under one or more of the following conditions:
A new device has been installed.
A device has been moved to a different location or cable connection.
A device has been removed or disconnected from a cable.
A device is failing and is no longer recognized by the computer as
being installed.
An external device is not turned on.
An invalid checksum is detected in CMOS memory (nonvolatile RAM).
Action:
1. Verify that all external devices are turned on. External devices must be
turned on before the computer is turned on.
2. Verify that all devices are properly installed and securely connected.
3. If you added, removed, or changed the location of a device, you must
save the new configuration in the Configuration/Setup Utility program.
Refer to page 44 for further information and instructions on saving the
configuration.
4. If you did not add, remove, or change the location of a device, a device
is probably failing. Running the diagnostic programs might isolate the
failing device. (See “Diagnostic Programs” on page 104 for
information about diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer
serviced.
78Using Your Personal Computer
POST MessageDescription
163The clock is not working correctly.
Action: Set the correct date and time. If the date and time are set
correctly and saved and the 163 error message reappears, replace the
battery.
If this does not correct the problem, have the computer serviced.
Note: The computer can be used until it is serviced, but any application
programs that use the date and time will be affected.
164A change in the memory configuration occurred. This error can be caused
by adding, removing, or incorrectly installing memory.
Note: The computer can be used with decreased memory capacity until
the error is corrected.
Action:
1. If you added memory, see Installing Options in Your Personal Computer
to verify that the new memory is correct for your computer and that it
is installed correctly.
2. If you added or removed memory, you must save the new
configuration in the Configuration/Setup Utility program. Refer to
page 44 for further information and instructions on saving the
configuration.
3. Running the diagnostic programs might isolate the location of the
problem DIMM and provide additional information. (See “Diagnostic
Programs” on page 104 for information about diagnostic programs
provided with your computer.)
If the problem cannot be isolated and corrected, have the computer
serviced.
20XA failure occurred during testing of the memory. This error can be caused
by incorrectly installed memory, a failing DIMM, or a system-board failure.
Action:
1. If you have added memory, see Installing Options in Your Personal
Computer and Chapter 5, “Using the Configuration/Setup Utility
Program” on page 39 of this booklet to verify that the new memory is
correct for your computer, and that it is installed and configured
correctly.
2. Run the diagnostic programs to verify the problem. (See “Diagnostic
Programs” on page 104 for information about diagnostic programs
provided with your computer.)
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems79
POST MessageDescription
301
303
601A failure occurred during testing of the diskette drive and diskette-drive
602The computer is not able to start the diskette in the drive. The diskette
A failure occurred during testing of the keyboard and keyboard controller.
These error messages also might be accompanied by continuous beeping.
Action:
Ensure that:
1. Nothing is resting on the keyboard and pressing a key.
2. No key is stuck.
3. The keyboard cable is securely attached to the keyboard connector on
the computer. (For the location of the keyboard connector, refer to
“External Connectors” on page 11.)
Note: If you have just connected a new mouse or other pointing device,
turn the computer off and disconnect that device. Wait at least 5
seconds, and then turn the computer on. If the error message goes
away, replace the device. If the error message remains, have the
keyboard and cable or the computer serviced.
controller. This error can be caused by a loose or incorrectly connected
cable, a failing drive, or a failing system board.
Note: The computer can be used, but one or more diskette drives might
not work.
Action: Verify that all diskette drive cables are properly installed and
securely connected.
Running the diagnostic programs might isolate the diskette drive that
failed, but you must have your computer serviced. (See “Diagnostic
Programs” on page 104 for information about diagnostic programs
provided with your computer.)
might be damaged or formatted incorrectly.
Action: Try another startable diskette that is formatted correctly and is in
good condition. (For information and instructions on formatting diskettes,
refer to “Formatting Diskettes” on page 27 and your operating system
documentation.)
If this does not correct the problem, have the computer serviced.
80Using Your Personal Computer
POST MessageDescription
604A failure occurred during the testing of a diskette drive.
Action:
1. Verify that the Configuration/Setup Utility program correctly reflects
the type of diskette drive you have installed. (For instructions on
using the Configuration/Setup Utility program, refer to Chapter 5,
“Using the Configuration/Setup Utility Program” on page 39.)
2. Run the diagnostic programs. (See “Diagnostic Programs” on page 104
for information about diagnostic programs provided with your
computer.)
3. If the diagnostic programs detect a failure, replace the diskette drive.
If the problem cannot be isolated and corrected, have the computer
serviced.
662A diskette drive configuration error occurred.
Action:
1. Verify that the Configuration/Setup Utility program correctly reflects
the number of diskette drives you have installed. (For instructions on
using the Configuration/Setup Utility program, refer to Chapter 5,
“Using the Configuration/Setup Utility Program” on page 39.)
2. If you installed or removed a diskette drive, you must save the new
configuration in the Configuration/Setup Utility program. Refer to
page 44 for further information and instructions on saving the
configuration.
If this does not correct the problem, have the computer serviced.
Chapter 6. Solving Problems81
POST MessageDescription
1762An IDE configuration error occurred. This could be caused by one of the
following:
A hard disk or other IDE drive (such as an IDE CD-ROM drive) was
added or removed, but the changes to the Configuration/Setup Utility
program have not yet been saved. Refer to page 44 for further
information and instructions on saving the configuration.
A hard disk or other IDE drive was added, but the master/subordinate
(slave) setting on the drive is improperly set.
The power or IDE cable is disconnected or not fully seated.
A hard disk drive is failing.
Action: Verify that the Configuration/Setup Utility program correctly
reflects the number of IDE drives installed (hard disk drives, CD-ROM
drives, and so on). For more information, refer to Chapter 5, “Using the
Configuration/Setup Utility Program” on page 39.
If the information is correct, save the settings, exit from the
Configuration/Setup Utility program, and restart the computer.
If the information is not correct, do the following.
1. Exit from the Configuration/Setup Utility program without saving the
settings.
2. Verify that the power cable and IDE cable are fully seated into the
drive connectors, and the IDE cable is fully seated into the connector
on the system board.
3. If you just added a new drive, verify that the drive you added has the
master-subordinate (slave) setting set correctly. If the new drive is the
only drive attached to the IDE cable, it must be set as the master. If it
is the second drive on the IDE cable, it must be set as the subordinate.
Note: If you installed two new drives on the same cable, ensure that
one is set as a master and one is set as a subordinate.
See the instructions that came with your new drive for the jumper
locations and settings.
4. Restart the computer. If the 1762 error message appears again, verify
that the IDE drive information in the Configuration/Setup Utility
program is correct. If it is correct, save the information and restart the
computer. If the information is still incorrect, you might have a failing
drive. Have the computer serviced.
82Using Your Personal Computer
POST MessageDescription
178XA failure occurred during testing of the hard disk drive or a primary or
secondary IDE device.
Action:
1. Run the diagnostic programs. (See “Diagnostic Programs” on page 104
for information about diagnostic programs provided with your
computer.)
2. If the diagnostic programs detect a failure, replace the defective hard
disk drive or primary or secondary IDE or EIDE device.
If the problem cannot be isolated and corrected, have the computer
serviced.
1800A PCI adapter has requested a hardware interrupt that is not available.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the
Configuration/Setup Utility program. If the hardware interrupt
settings are not correct, change and save the settings. Setting the
resources used by ISA legacy adapters to Not available enables the
Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy
(non-Plug and Play) adapters, refer to Installing Options in Your PersonalComputer and Understanding Your Personal Computer. For information
about required interrupt resource settings for ISA legacy adapters, refer
to the documentation that comes with these adapters. For instructions
on using the Configuration/Setup Utility program, see Chapter 5,
“Using the Configuration/Setup Utility Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly.
For information about switch settings, refer to the documentation that
comes with the ISA legacy adapters.
3. If all hardware interrupts are being used by ISA legacy adapters, you
might need to remove an ISA legacy adapter to make an interrupt
available to the PCI adapter you want to install. For instructions on
removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the hardware interrupt
used by the removed adapter to Available before installing
another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might
need to remove one of these adapters to make an interrupt available to
the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems83
POST MessageDescription
1801A PCI adapter has requested memory resources that are not available.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the
Configuration/Setup Utility program. If the memory resource settings
are not correct, change and save the settings. Setting the resources
used by ISA legacy adapters to Not available enables the Plug and
Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy
(non-Plug and Play) adapters, refer to Installing Options in Your PersonalComputer. For information about required memory resource settings
for ISA legacy adapters, refer to the documentation that comes with
these adapters. For instructions on using the Configuration/Setup
Utility program, see Chapter 5, “Using the Configuration/Setup Utility
Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly.
For information about switch settings, refer to the documentation that
comes with the ISA legacy adapters.
3. If all memory resources are being used by ISA legacy adapters, you
might need to remove an ISA legacy adapter to make memory
available to the PCI adapter you want to install. For instructions on
removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory resources
used by the removed adapter to Available before installing
another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might
need to remove one of these adapters to make memory available to the
PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer
serviced.
84Using Your Personal Computer
POST MessageDescription
1802A PCI adapter has requested an I/O address that is not available, or the
PCI adapter might be defective.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the
Configuration/Setup Utility program. If the I/O address settings are
not correct, change and save the settings. Setting the resources used by
ISA legacy adapters to Not available enables the Plug and Play
function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy
(non-Plug and Play) adapters, refer to Installing Options in Your PersonalComputer. For information about required I/O resource settings for ISA
legacy adapters, refer to the documentation that comes with these
adapters. For instructions on using the Configuration/Setup Utility
program, see Chapter 5, “Using the Configuration/Setup Utility
Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly.
For information about switch settings, refer to the documentation that
comes with the ISA legacy adapters.
3. If all I/O addresses are being used by ISA legacy adapters, you might
need to remove an ISA legacy adapter to make an I/O address
available to the PCI adapter you want to install. For instructions on
removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the I/O address used
by the removed adapter to Available before installing another
adapter.
4. If you have other PCI or Plug and Play adapters installed, you might
need to remove one of these adapters to make an I/O address available
to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems85
POST MessageDescription
1803A PCI adapter has requested a memory address that is not available, or the
PCI adapter might be defective.
Action:
1. Make sure that all ISA legacy adapters are set correctly in the
Configuration/Setup Utility program. If the memory address settings
are not correct, change and save the settings. Setting the resources
used by ISA legacy adapters to Not available enables the Plug and
Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy
(non-Plug and Play) adapters, refer to Installing Options in Your PersonalComputer. For information about required memory resource settings
for ISA legacy adapters, refer to the documentation that comes with
these adapters. For instructions on using the Configuration/Setup
Utility program, see Chapter 5, “Using the Configuration/Setup Utility
Program” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly.
For information about switch settings, refer to the documentation that
comes with the ISA legacy adapters.
3. If all memory addresses are being used by ISA legacy adapters, you
might need to remove an ISA legacy adapter to make a memory
address available to the PCI adapter you want to install. For
instructions on removing adapters, see Installing Options in YourPersonal Computer.
Note: If you remove an ISA legacy adapter, set the memory address
used by the removed adapter to Available before installing
another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might
need to remove one of these adapters to make a memory address
available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer
serviced.
86Using Your Personal Computer
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.