Before using this information and the product it supports, be sure to read the general information
under Appendix B, “Product Warranties, License Information, and Notices” on page 113.
Second Edition (January 1998)
The following paragraph does not apply to the United Kingdom or any country where such provisions
are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED,
INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied
warranties in certain transactions, therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically
made to the information herein; these changes will be incorporated in new editions of the publication.
IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this
publication at any time.
This publication was developed for products and services offered in the United States of America. IBM
may not offer the products, services, or features discussed in this document in other countries, and the
information is subject to change without notice. Consult your local IBM representative for information
on the products, services, and features available in your area.
Requests for technical information about IBM products should be made to your IBM reseller or IBM
marketing representative.
Copyright International Business Machines Corporation 1998. All rights reserved.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or
disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Electrical current from power, telephone, and communication
cables is hazardous. To avoid shock hazard, connect and
disconnect cables as shown below when installing, moving or
opening the covers of this product or attached devices. The
power cord must be used with a properly grounded outlet.
To Connect
Turn everything OFF.
To Disconnect
Turn everything OFF.
First, attach all cables to devices.
Attach signal cables to
receptacles.
Attach power cord to outlet.
Turn device ON.
12
In the U.K., by law, the telephone
cable must be connected after the
power cord.
1
First, remove power cord from
2
outlet.
Remove signal cables from
receptacles.
Remove all cables from devices.
In the U.K., by law, the power
cord must be disconnected after the
telephone line cable.
Copyright IBM Corp. 1998 vii
Laser Compliance Statement
Some IBM Personal Computer models are equipped from the factory with a
CD-ROM drive. CD-ROM drives are also sold separately as options. The CD-ROM
drive is a laser product. The CD-ROM drive is certified in the U.S. to conform to
the requirements of the Department of Health and Human Services 21 Code of
Federal Regulations (DHHS 21 CFR) Subchapter J for Class 1 laser products.
Elsewhere, the drive is certified to conform to the requirements of the International
Electrotechnical Commission (IEC) 825 and CENELEC EN 60 825 for Class 1 laser
products.
When a CD-ROM drive is installed, note the following.
CAUTION:
Use of controls or adjustments or performance of procedures other than those
specified herein might result in hazardous radiation exposure.
Opening the CD-ROM drive could result in exposure to hazardous laser radiation.
There are no serviceable parts inside the CD-ROM drive. Do not open.
Some CD-ROM drives contain an embedded Class 3A or Class 3B laser diode. Note
the following.
DANGER
Laser radiation when open. Do not stare into the beam, do not view
directly with optical instruments, and avoid direct exposure to the beam.
viiiUsing Your Personal Computer
Lithium Battery Notice
CAUTION:
Danger of explosion if battery is incorrectly replaced.
When replacing the battery, use only IBM Part Number 33F8354 or an equivalent
type battery recommended by the manufacturer. The battery contains lithium
and can explode if not properly used, handled, or disposed of.
Do not:
Throw or immerse into water
Heat to more than 100°C (212°F)
Repair or disassemble
Dispose of the battery as required by local ordinances or regulations.
ATTENTION
Danger d'explosion en cas de remplacement incorrect de la batterie.
Remplacer uniquement par une batterie IBM de type 33F8354 ou d'un type
équivalent recommandé par le fabricant. La batterie contient du lithium et peut
exploser en cas de mauvaise utilisation, de mauvaise manipulation ou de mise au
rebut inappropriée.
Ne pas :
Lancer ou plonger dans l'eau
Chauffer à plus de 100°C (212°F)
Réparer ou désassembler
Mettre au rebut les batteries usagées conformément aux règlements locaux.
Safety Informationix
xUsing Your Personal Computer
About This Book
This book will help you become familiar with your IBM Personal Computer and its
many features. It describes how to configure, operate, and maintain your PC. In
the unlikely event you experience problems, you will also find helpful
troubleshooting information, as well as instructions for obtaining service.
The book is organized as follows:
Chapter 1, "Your IBM Personal Computer," contains an overview of the features
of your PC.
Chapter 2, "Arranging Your Workspace," contains information about setting up
your work area to optimize use of your computer. Safety considerations are
also discussed.
Chapter 3, "Operating Your Computer," contains instructions for the day-to-day
use of your computer. Startup and shutdown procedures, as well as
information on using audio, video, system-management, and security features
are included in this chapter.
Chapter 4, "Configuring Your Computer," contains instructions for using the
Configuration/Setup Utility Program.
Chapter 5, "Taking Care of Your Computer," contains information about the
proper handling and care of your PC.
Chapter 6, "Solving Problems," contains information that will help you identify
and correct problems that might arise as you use your computer.
Chapter 7, "Getting Help, Service, and Information," contains a description of
the wide variety of resources available from IBM to assist you in the use of your
PC. This chapter also describes how to obtain additional information about IBM
products.
Appendix A, "Computer Records," contains forms for recording information
about your PC, which can be helpful if you decide to install any additional
options, or if you ever need to have your PC serviced.
Appendix B, "Product Warranties, License Information, and Notices," contains
warranty and license information for your computer, as well as legal notices and
trademark information.
Copyright IBM Corp. 1998 xi
Related Publications
The following publications, together with this book, contain information about your
computer.
Setting Up Your Personal Computer
This publication contains instructions to help you set up your computer.
Installing Options in Your Personal Computer
This publication contains instructions for adding memory, adapters, drives, and
other options to your computer.
Understanding Your Personal Computer
This online publication (provided only with computers that have
IBM-preinstalled software) includes general information about using personal
computers and in-depth information about the specific features of your PC.
About Your Software
This publication (provided only with computers that have IBM-preinstalled
software) contains information about the preinstalled software package.
Your Ready-to-Configure Utility Program CD
This publication contains information about the Ready-to-Configure Utility
Program CD for your computer. The publication also contains instructions for
starting the CD.
The following publications contain more information about your computer.
Hardware Maintenance Manual
This separately purchased publication contains information for trained service
technicians. To obtain a copy, refer to “Ordering Publications” on page 108. It
is also available on the World Wide Web at
http://www.us.pc.ibm.com/cdt/hmm.html.
Technical Information Manual
This publication is available on the World Wide Web only at
http://www.us.pc.ibm.com/support/desktop_support.html. It contains more
information about the technical aspects of your computer.
xiiUsing Your Personal Computer
Chapter 1. Your IBM Personal Computer
Thank you for selecting an IBM Personal Computer. Your PC incorporates many of
the latest advances in personal computer technology and is easy to expand and
upgrade as your needs change. With its enhanced video and system-management
capabilities, your computer is particularly suited for your corporate intranet
environment.
1
1
An intranet is a private network that conforms to the same protocols as the Internet, but is contained
within an organization. The intranet contains one or more servers that provide services to the
workstations on the private network. Some intranets are also connected to the Internet.
Copyright IBM Corp. 1998
1
Identifying Your Computer
In most instances, the best way to identify your computer is by the machine
type/model number. The model/type number indicates the various features of the
computer, such as the type of microprocessor or the number of bays. You can find
this number on the small label on the front of your computer. An example of a
machine type/model number is 6282-54A.
You also need to know whether the computer is a desktop or tower. The desktop
model can be set on its side in a floor stand, but the orientation of the drives will be
vertical in that position, rather than horizontal. Towers and desktops used in their
normal orientations have horizontal drive bays.
Throughout this book, your computer is identified as either a desktop model or a
tower model. These naming conventions are used only where it is appropriate.
Instructions without these naming conventions apply to both computer models.
Desktop Model
The desktop model comes with four bays and four expansion slots. This computer
has a hard disk drive in bay 3 and a diskette drive in bay 4. If your computer has a
CD-ROM drive, it is installed in bay 1. Bay two can accept a hard disk drive which
does not have accessible media.
2Using Your Personal Computer
Tower Model
The tower model comes with six bays and six expansion slots. This computer has a
hard disk drive in bay 6 and a diskette drive in bay 4. If your computer has a
CD-ROM drive, it is installed in bay 1. Bays two, three and five can accept hard
disk drives which do not have accessible media.
Chapter 1. Your IBM Personal Computer3
What Your IBM Personal Computer Offers
This section describes many of the features of your computer.
Microprocessor
At the core of your PC is an Intel Pentium II processor. With its advanced
performance features, this MMX microprocessor supplies the speed and power you
need to take advantage of even the most complex programs. In addition, the
microprocessor incorporates new multimedia extensions into the Intel architecture,
which improves the performance of multimedia and communications applications
by accelerating calculations commonly performed for audio, video, speech synthesis
and recognition, 2D and 3D graphics, and data communications.
System Memory
Your computer comes standard with non-parity or ECC (error correcting code)
SDRAM (synchronous dynamic random access memory).
L2 Cache
L2 cache memory, which helps speed the exchange of information between the
microprocessor and system memory, is integrated on the Pentium II processor in
most models.
ISA Bus
Your PC has an ISA (industry standard architecture) bus, which is one of the most
widely used and successful I/O (input/output) buses available. The ISA bus is
popular because so many adapters and devices have been designed and marketed
for it.
PCI Bus
Your computer also has a PCI (peripheral component interconnect) bus. PCI is one
of the advanced I/O bus standards recently developed by the computer industry to
keep up with performance improvements of microprocessor buses and advanced
peripheral devices. The PCI bus adds to the capability of the ISA bus, speeding up
the exchange of information among the microprocessor and peripheral devices
within your computer system. This improves the overall performance of your
computer, including the hard disk drive.
4Using Your Personal Computer
AGP Bus
Your computer also has an integrated AGP Cirrus 5465 3-D SVGA (super video
graphics array) bus. AGP is a state-of-the-art enhanced performance video bus for
the integrated video controller, which provides a PC-like interface with performance
extensions added specifically for video functions.
Expansion with Adapters
By installing optional adapters, you can expand the capabilities of your computer
and take advantage of a variety of peripheral devices and applications. Your
computer has a riser card for connecting adapters to the ISA or PCI bus. Examples
of adapters that can be added to your computer include graphics, SCSI (small
computer system interface), and NIC (network interface controller) adapters.
High-Capacity Hard Disk Drives
Some PC models come with a hard disk drive that has an enhanced integrated drive
electronics (EIDE) bus-master interface. The EIDE drive plugs into one of two EIDE
connectors located on the riser card in your computer. You can connect an
additional hard disk drive to the ribbon cable already attached to the riser card, or
you can purchase another cable and connect up to two hard disk drives or other
IDE or EIDE devices to the second connector on the riser card.
Notes:
1. In the desktop model, a maximum of three internal IDE or EIDE devices can be
installed—limited by the number of available bays.
2. For models with an IBM factory-installed CD-ROM, two ribbon cables (for
connecting IDE or EIDE devices) are shipped with your computer.
CD-ROM Drive
A CD-ROM drive is installed in some PC models. CD-ROM (compact disc
read-only memory) technology offers quick access to enormous amounts of
information. A compact disc can store more than 650 MB of data, such as the large
files needed for audio, still and full-motion video, and still and animated graphics.
A CD-ROM drive can play back or read from a CD, but it cannot write information
on it.
ECP/EPP Parallel Port
Your PC has one 25-pin parallel port. The parallel port is most often used to
communicate with a parallel printer, but it can also be used with other parallel
Chapter 1. Your IBM Personal Computer5
devices. To minimize electromagnetic interference (EMI), use braid-shielded cables
with metal ends when connecting a device to this port.
The parallel port can operate in several different modes. The default mode for your
computer is SPP (standard parallel port). However, your computer also supports
the ECP/EPP (extended capabilities port/enhanced parallel port) mode. ECP/EPP
has two advantages over SPP. When your computer is in ECP/EPP mode, you can
print documents faster than when the computer is in SPP mode, and you can attach
devices other than printers, such as communication and storage devices, to the
parallel port. You can set modes of operation for the parallel port using the
Configuration/Setup Utility Program.
Serial Ports
Your computer has two standard 9-pin, 16550-UART serial ports that can be used to
communicate with devices such as modems, plotters, and printers. To minimize
electromagnetic interference (EMI), use braid-shielded cables with metal ends when
connecting devices to these ports.
Universal Serial Bus Ports
The universal serial bus (USB) interface is a new, emerging technology being
developed to add more diversity and capabilities to personal computers. IBM has
provided two, 4-pin USB connectors in your computer as a standard feature so you
can be ready to take advantage of new USB devices as they become available.
Using this new technology, you will be able to plug many different types of
optional, USB-compatible devices into the USB ports on your computer. Because
USB incorporates Plug and Play technology, you can install and remove devices
easily without turning off your computer or opening the cover. Once installed, the
devices configure automatically.
In addition, an option called a hub can be connected to a USB port on your
computer, which enables you to plug in more than one device at a time. A hub
converts a single USB connector into multiple ports where USB devices can be
attached.
For more information, see the USB Web site (http://www.usb.org). For USB
drivers, see the Microsoft Web site (http://www.microsoft.com/support).
6Using Your Personal Computer
Integrated Video Graphics Controller
The system board of your computer contains a high-performance, high-resolution,
integrated AGP Cirrus 5465 3-D SVGA (super video graphics array) controller with
2 MB RAMBUS video memory.
Audio Adapter (Optional)
The stereo audio adapter card available for your computer provides all the digital
audio and analog mixing functions required for recording and playing high-quality
sound on your PC. The controller supports Sound Blaster Pro, Adlib, and Microsoft
Windows Sound System applications.
Ethernet Adapter (Optional)
The Ethernet adapter card available for your computer has an Intel 10/100 Mbit,
PCI Ethernet controller and an RJ-45 connector that provide a high-performance
network connection.
Token Ring Adapter (Optional)
The token ring adapter card available for your computer is a PCI controller which
has a 32-bit busmaster and either an RJ45 or a nine-pin D-shell connector, which
provides a high-performance network connection. Token ring device drivers are
provided on the Ready-to-Configure Utility Program CD for your computer. If your
computer has IBM-preinstalled software, the device drivers are already installed on
the hard disk. For instructions on connecting a network cable to your PC, refer to
Setting Up Your Personal Computer.
System-Management Features
If you have a token ring adapter or an Ethernet adapter preinstalled, your computer
has features that make it possible for a network administrator to manage and
control your computer remotely over a network from a management console. These
features are:
Enablement for LANClient Control Manager software
RPL (Remote Program Load) and DHCP (Dynamic Host Configuration Protocol)
Enablement for integrated Wake on LAN
Automatic Power-On Startup Sequence
Enablement for POST/BIOS updates over a network with an optional NIC
adapter
DMI (Desktop Management Interface) BIOS and DMI software
Chapter 1. Your IBM Personal Computer7
For information on these features, refer to “Using System-Management Features” on
page 32.
IBM-Preinstalled Software
IBM-preinstalled software is provided with some PC models. This software
includes an operating system, device drivers to support built-in features, and other
support programs. Detailed information about this software is included in AboutYour Software, which is included with the preinstallation package.
Operating-System Support
Your computer is designed to use a variety of operating systems in order to meet
your particular needs. See page 19 for a list of operating systems that you can use
with your PC.
Ease-of-Use Features
Your computer has many features that make it easy to work with, including a
state-of-the-art system board, Plug and Play technology, and easy-to-use diagnostic
programs.
The system board in your computer makes upgrading and servicing your PC easier.
Cable connections for standard devices are located on the riser card. This
arrangement helps to eliminate cable tangle and clutter on the system board, allows
shorter cables, and makes it easier to remove the system board or to upgrade
peripherals. In addition, the system board is on a sliding mechanism so that you
can slide the system board in and out of the computer frame.
Support for Plug and Play technology is built into the system board of your PC.
This feature makes adding options easier. When you add an adapter that is Plug
and Play-compatible, the adapter is configured automatically. In most cases, no
switches or jumpers have to be set on the adapter.
If you have a problem with your PC, IBM provides an easy-to-use diagnostic
program (PC Doctor) that you can run to help determine if a hardware component
is causing the problem. You can create a startable PC Doctor diskette for your
computer from the download or the Ready-to-Configure Utility Program CD. In
addition, operating system-specific diagnostic programs (and PC Doctor) are
included on the Ready-to-Configure Utility Program CD for your computer.
8Using Your Personal Computer
Ergonomic Features
Your PC has ergonomic features that make it more comfortable to use. The power
switch and indicator lights are located for easy access and visibility. In addition,
you can easily change monitor settings to reduce or eliminate flicker and jitter, and
you can adjust the angle of the keyboard to make typing more comfortable.
Advanced Power Management
Energy conservation is an important concern. Your computer has Advanced Power
Management (APM) and Advanced Configuration and Power Interface (ACPI)
features that allow you to set different levels of energy conservation for specific
components of your computer. You can view and change APM and ACPI settings
using the Configuration/Setup Utility Program or the Windows 95 control panel.
Asset Security Features
Your PC has the following security features that help protect both your hardware
and software:
Power-on and administrator password protection
Startup-sequence control
Hard disk drive and diskette drive access control
I/O port control
Asset information protection
Enablement for updating the POST/BIOS over the network
Cover lock (in some models)
U-bolt and security cabling (optional)
Operating system security
Diskette write protection
Service and Support
You can obtain assistance for using your computer, as well as service, from a
number of sources. Help is available on the World Wide Web and by phone, fax,
and modem. For detailed information, see Chapter 7, “Getting Help, Service, and
Information” on page 101.
Expandability
You can easily expand the capabilities of your computer by adding memory, drives,
or adapters.
Chapter 1. Your IBM Personal Computer9
Desktop Model Drive Bays: Your computer has four drive bays. Unoccupied
drive bays can be used for installing additional devices such as hard disk and
CD-ROM drives.
The following illustration shows the drive bays in your computer.
5.25-Inch CD-ROM
Drive (Standard
3.5-Inch
Diskette Drive
in some models)
5.25-Inch Bay
for Optional Drive
3.5-Inch Bay
10Using Your Personal Computer
Tower Model Drive Bays: Your computer has six drive bays. Unoccupied drive
bays can be used for installing additional devices such as hard disk and CD-ROM
drives. The following illustration shows the drive bays in your computer.
5.25-Inch CD-ROM
Drive (Standard
in some models)
5.25-Inch Bay
for Optional Drive
3.5-Inch Bay
Socket7
Socket7
3.5-Inch Bay
for Optional Drive
3.5-Inch
Diskette Drive
Desktop Model Expansion Slots: Your computer has four expansion slots.
One or more of these slots might be occupied, depending on the model of your PC.
Unoccupied slots can be used for installing adapters. The following illustration
shows the locations of the expansion slots.
Chapter 1. Your IBM Personal Computer11
Expansion Slots
Tower Model Expansion Slots: Your computer has six expansion slots. One or
more of these slots might be occupied, depending on the model of your PC.
Unoccupied slots can be used for installing adapters. The following illustration
shows the locations of the expansion slots.
Expansion
Slots
12Using Your Personal Computer
Desktop Model Connectivity
The following illustration shows the location of the external connectors on the rear
of your computer.
USB 1
USB 2
Chapter 1. Your IBM Personal Computer13
1
2
Mouse
Keyboard
Serial 2
21
Serial 1
Parallel
Monitor
Tower Model Connectivity
The following illustration shows the location of the external connectors on the rear
of your computer.
USB 1
USB 2
Mouse
Keyboard
Serial 2
Serial 1
Monitor
1
2
21
Parallel
14Using Your Personal Computer
Keyboard Extender
Your computer comes with an aesthetic keyboard extender. To attach it, align the
extender with the bottom edge of the keyboard and snap them together, as shown
below.
Chapter 1. Your IBM Personal Computer15
Features at a Glance
The following information covers a variety of PC models. Some of the features
listed apply to specific models only. For a listing of features for your specific
model, refer to the System Summary screen in the Configuration/Setup Utility
Program. For instructions on gaining access to the Configuration/Setup Utility
Program and the System Summary screen, refer to “Viewing the System Summary”
on page 44.
Microprocessor
Intel Pentium II processor with MMX technology
Memory
Installed: SDRAM, non-parity or ECC (error correcting code) DIMMs
Maximum addressable: 256 MB (use only industry-standard, gold lead, 3.3 V,
unbuffered, DRAM DIMMs)
Two 168-pin DIMM sockets
Flash memory for system programs
Level 2 Cache
Integrated in Intel Pentium II processor
Diskette Drives
Installed: One 3.5-inch, 1.44 MB
Internal Hard Disk Drives
Standard: One EIDE
PCI EIDE bus-master
Maximum IDE or EIDE devices: Four total
16Using Your Personal Computer
CD-ROM Drive
One IDE CD-ROM drive (standard in some models)
Input/Output Features
One 25-pin, ECP/EPP parallel port
Two 9-pin, serial ports
Two 4-pin, USB ports
Mouse port
Keyboard port (Windows 95-compatible)
One 15-pin, DDC2B-compliant monitor port
Audio adapter that supports Adlib, and Microsoft Windows Sound System
applications
Network Adapter (optional)
IBM 10/100 Mbit, PCI Ethernet adapter with Wake on LAN
IBM PCI Token Ring adapter with Wake on LAN
System Management
Enablement for LANClient Control Manager software
RPL (Remote Program Load) and DHCP (Dynamic Host Configuration Protocol)
Enablement for integrated Wake on LAN
Automatic Power-On Startup Sequence
Enablement for POST/BIOS updates over a network
DMI (Desktop Management Interface) BIOS and DMI software
Chapter 1. Your IBM Personal Computer17
Expansion, Desktop Model
Four drive bays total—unoccupied bays can be used for installing additional
internal devices, such as a second hard disk drive.
Four expansion slots total (one ISA, two PCI, and one shared
ISA/PCI)—unoccupied slots can be used for installing optional adapters.
PCI/ISA Plug and Play adapter support.
Expansion, Tower Model
Six drive bays total—unoccupied bays can be used for installing additional
internal devices, such as a second hard disk drive.
Six expansion slots total (three ISA and three PCI) unoccupied slots can be used
for installing optional adapters.
PCI/ISA Plug and Play adapter support.
Power
Desktop model has 145 W, 115/230 V ac, 50/60 Hz
Tower model has 200 W, 115/230 V ac, 50/60 Hz
Built-in overload and surge protection
Advanced Power Management (APM)
Advanced Computer Configuration Power Interface (ACPI)
Asset Security
Power-on and administrator passwords
Startup sequence control
Update POST/BIOS over network
Startup without keyboard, diskette drive, or mouse
Hard disk drive and diskette drive access control
I/O port control to disable input and output functions of the serial and parallel
ports and their attached devices
Diskette write protection (prevents the diskette drive from writing to diskettes)
Cover keylock (on some models)
Software-readable hardware identification data
System bolt-down support
18Using Your Personal Computer
Operating Systems (Supported)
IBM OS/2 Warp Version 4.0
Microsoft Windows 95
Microsoft Windows NT Workstation Version 4.0
Operating Systems (Tested for Compatability)
2
IBM OS/2 Warp Version 3.0 with DOS and Windows application support
IBM OS/2 Warp Connect Version 3.0 with DOS and Windows application
support
IBM PC DOS Version 7.0
MS DOS Version 6.22
Microsoft Windows for Workgroups Version 3.11
Microsoft Windows NT Version 3.51
IBM-Preinstalled Software
Preinstalled in some PC models are an operating system, device drivers to support
built-in features, and other support programs. See About Your Software for a
detailed description of the preinstallation package.
2
IBM has identified the operating systems listed here as the ones it has tested or intends to test for
compatibility. It is possible, however, that IBM's testing may not be complete for some of these
operating systems at the time this publication goes to press. Also, additional operating systems might
be identified by IBM as compatible with your computer following the publication of this booklet.
Corrections and additions to the list are available in IBM's online compatibility report, which can be
found on the World Wide Web (http://www.us.pc.ibm.com/cdt/). For additional information, see
Chapter 7, “Getting Help, Service, and Information” on page 101.
Chapter 1. Your IBM Personal Computer
19
Desktop Model System Specifications
Size
Depth: 450 mm (17.7 in.)
Height: 128 mm (5.0 in.)
Width: 450 mm (17.7 in.)
Weight
Minimum configuration as shipped: 9.9 kg (22 lb)
Maximum configuration: 11.3 kg (25 lb)
Environment
Air temperature:
– System on: 10° to 32°C (50° to 90°F)
– System off: 10° to 43°C (50° to 110°F)
Humidity:
– System on: 8% to 80%
– System off: 8% to 80%
Maximum altitude: 2134 m (7000 ft)
Heat Output
Approximate heat output in British thermal units (Btu) per hour:
Power consumption and heat output vary depending on the number and type of
optional features installed and the power-management optional features in use.
Airflow
Approximately 0.56 cubic meters per minute (20 cubic feet per minute)
Acoustical Noise-Emission Values
Average sound-pressure levels:
– At operator position:
- 34 dBA idle
- 38 dBA operating
– At bystander position–1 meter (3.3 ft):
- 28 dBA idle
- 33 dBA operating
Declared (upper limit) sound power levels:
– 4.6 bels idle
– 4.9 bels operating
These levels were measured in controlled acoustical environments according to
procedures specified by the American National Standards Institute (ANSI) S12.10
and ISO 7779, and are reported in accordance with ISO 9296.
Actual sound-pressure levels in your location might exceed the average values
stated because of room reflections and other nearby noise sources. The declared
sound power levels indicate an upper limit, below which a large number of
computers will operate.
Chapter 1. Your IBM Personal Computer21
Tower Model System Specifications
Size
Depth: 445 mm (17.5 in.)
Height: 492 mm (19.4 in.)
Width: 200 mm (7.9 in.)
Weight
Minimum configuration as shipped: 15 kg (33 lb)
Maximum configuration: 17.3 kg (38 lb)
Environment
Air temperature:
– System on: 10° to 35°C (50° to 95°F)
– System off: 10° to 43°C (50° to 110°F)
Humidity:
– System on: 8% to 80%
– System off: 8% to 80%
Maximum altitude: 2134 m (7000 ft)
Heat Output
Approximate heat output in British thermal units (Btu) per hour:
Power consumption and heat output vary depending on the number and type of
optional features installed and the power-management optional features in use.
Airflow
Approximately 0.57 cubic meters per minute (20 cubic feet per minute)
Acoustical Noise-Emission Values
Average sound-pressure levels:
– At operator position:
- 34 dBA idle
- 36 dBA operating
– At bystander position–1 meter (3.3 ft):
- 29 dBA idle
- 32 dBA operating
Declared (upper limit) sound power levels:
– 4.6 bels idle
– 4.8 bels operating
These levels were measured in controlled acoustical environments according to
procedures specified by the American National Standards Institute (ANSI) S12.10
and ISO 7779, and are reported in accordance with ISO 9296.
Actual sound-pressure levels in your location might exceed the average values
stated because of room reflections and other nearby noise sources. The declared
sound power levels indicate an upper limit, below which a large number of
computers will operate.
Chapter 1. Your IBM Personal Computer23
24Using Your Personal Computer
Chapter 2. Arranging Your Workspace
To get the most from your computer, arrange both the equipment you use and your
work area to suit your needs and the kind of work you do. Your comfort is of
foremost importance, but light sources, air circulation, and the location of electrical
outlets also can affect the way you arrange your workspace.
Comfort
Although no single working position is ideal for everyone, here are a few guidelines
to help you find a position that suits you best.
Sitting in the same position for a long time causes fatigue. A good chair can make a
big difference. The backrest and seat should adjust independently and provide
good support. The seat should have a curved front to relieve pressure on the
thighs. Adjust the seat so that your thighs are parallel to the floor and your feet are
either flat on the floor or on a footrest.
When using the keyboard, keep your forearms parallel to the floor and your wrists
in a neutral, comfortable position. Try to keep a light touch on the keyboard and
your hands and fingers relaxed. You can change the angle of the keyboard for
maximum comfort by adjusting the position of the keyboard feet.
Adjust the monitor so the top of the screen is at, or slightly below, eye level. Place
the monitor at a comfortable viewing distance, usually 51 to 61 cm (20 to 24 in.),
and position it so you can view it without having to twist your body.
Copyright IBM Corp. 1998 25
Lower
Back
Support
Seat
Height
Viewing Distance
Glare and Lighting
Position the monitor to minimize glare and reflections from overhead lights,
windows, and other light sources. Place the monitor at right angles to windows
and other light sources, when possible. Reduce overhead lighting, if necessary, by
turning off lights or using lower wattage bulbs. If you install the monitor near a
window, use curtains or blinds to block the sunlight. You might have to adjust the
Brightness and Contrast controls on the monitor as the room lighting changes
throughout the day.
Where it is impossible to avoid reflections or to adjust the lighting, an antiglare
filter placed over the screen might be helpful. However, these filters might affect
the clarity of the image on the screen; try them only after you have exhausted other
methods of reducing glare.
Dust buildup compounds problems associated with glare. Remember to clean your
monitor screen periodically using a soft cloth moistened with a nonabrasive liquid
glass cleaner.
Air Circulation
Your computer and monitor produce heat. The computer has a fan that pulls in
fresh air and forces out hot air. The monitor lets hot air escape through vents.
Blocking the air vents can cause overheating, which might result in a malfunction or
damage. Place the computer and monitor so that nothing blocks the air vents;
usually, 51 mm (2 in.) of air space is sufficient. Also, make sure the vented air is
not blowing on someone else.
Electrical Outlets and Cable Lengths
The location of electrical outlets and the length of power cords and cables that
connect to the monitor, printer, and other devices might determine the final
placement of your computer.
When arranging your workspace:
Avoid the use of extension cords. When possible, plug the computer power
cord directly into an electrical outlet.
Keep power cords and cables neatly routed away from walkways and other
areas where they might get kicked accidentally.
For more information about power cords, see “Power Cord Notice” on page 123.
26Using Your Personal Computer
Chapter 3.Operating Your Personal Computer
This chapter provides information to help you in the day-to-day use of your
computer. It includes instructions for starting and shutting down your PC, as well
as information on using audio, video, system-management, and security features.
Using Controls and Status Indicators
The following operating controls and status indicators are located on the front of
your computer.
Power Switch: Press this switch to turn your computer on or off. Do not turn off
your computer if the in-use light for the hard disk drive or diskette drive is on.
Power-On Light: This status indicator lights when you turn on your computer.
Hard-Disk Drive Light: When this light is on, it indicates that the hard disk drive
heads are being positioned or that your computer is reading from or writing to the
hard disk.
Diskette-Drive Light: When this light is on, it indicates that the diskette drive heads
are being positioned or that your computer is reading from or writing to a diskette.
Diskette Eject Button: Push this button to release a diskette from the drive.
Client (Workstation) LAN Light: This feature is not used in these models. This light
will never be activated, even though a LAN adapter may be installed in the computer.
Power Switch
Power-On Light
Hard-Disk
Drive Light
Client
(Workstation)
LAN Light
Copyright IBM Corp. 1998 27
Diskette
Drive Light
Diskette
Eject Button
Power Switch
Power-On Light
Hard-Disk
Drive Light
Client (Workstation)
LAN Light
Diskette
Eject Button
Diskette
Socket7
Socket7
Drive Light
Starting Your Computer
What you see and hear when you start up your computer depends upon the
settings in the Start Options menu of the Configuration/Setup Utility Program.
The default settings are Power On Status [Disabled] and Power On Self Test
[Quick].
Note: There are other selections that might also change what is displayed.
The following briefly describes what you see in the default mode when you turn on
your computer:
The IBM logo appears
Press F1 for Configuration/Setup prompt appears
– If any errors were detected during POST, they are displayed.
If you have set a power-on password, a prompt appears on the screen. If you
have set both power-on and administrator passwords, you can type either
password at the password prompt. (Refer to “System Security” on page 45 for
instructions on setting and using passwords.) Type your password at the
prompt and press Enter.
The first screen of your operating system or application program appears.
If Power On Status is [Enabled], and POST finishes without detecting a problem,
you hear one beep. If POST detects a problem when you start your computer, you
hear multiple beeps or no beep. In most cases, an error code appears in the top-left
corner of the screen, and in some cases a description of the error is displayed beside
the code. (Note that the screen will sometimes display multiple error codes and
28Using Your Personal Computer
descriptions.) Write down all error code numbers and descriptions. For
information on what caused an error message to appear and what action to take,
refer to “Solving POST Error Message Problems” on page 66 and “POST Message
Charts” on page 69.
If Power On Self Test is [Enhanced], information about memory configuration and
test results are shown in the upper left corner. Prompts for running a fast POST or
accessing the Configuration/Setup Utility Program appear in the lower-left corner of
the screen.
Using a Mouse
A mouse is a device that you use to point to and select objects on the monitor screen.
It connects to your computer by a cable. Some mouse devices are designed for the
round mouse connector on the back of your PC; other mouse devices are designed
for the D-shaped serial connector. You can use either type of mouse, if the correct
software (device driver) is installed.
With a mouse, you can move the pointer on the monitor screen. If you have never
used a mouse before, it might feel a bit awkward at first. However, with a little
practice, the mouse movements will seem natural.
Place the mouse beside the keyboard on a flat surface or mouse pad. (A mouse pad
is a flat, smooth, foam-rubber pad available at most computer stores.) The mouse
has a ball on the bottom, so working on a flat, smooth surface is important. You
can use your right or left hand to control the mouse.
Notice that the mouse has two buttons on the top (some mice have more buttons).
Rest your hand comfortably on the mouse with your index finger on the left button
(if you are using your right hand). Some programs and operating systems provide
an option to set up the mouse for left-hand use. When a mouse is set up for
left-hand use, the button functions are reversed.
Use the left button to select and open objects with the mouse. Some programs also
use the right button. The use of the right mouse button varies.
To use the mouse, slide it from side to side and forward and backward on a flat
surface. The pointer on the monitor screen moves as you move the mouse. When
you see an item that you want to select on the screen, you simply move the pointer
to that item (this is called pointing). Then you press and release the left button on
the mouse (this is called clicking).
To learn how to use the mouse with the software in your computer, see the
documentation accompanying the software.
Chapter 3. Operating Your Personal Computer29
Some programs support only one mouse button, others support two, and some
support three. Despite the differences, some terms are fairly standard throughout
the industry.
PointMove the mouse so the pointer is on the object you want.
ClickPress and release the mouse button once.
Double-clickRapidly press and release the mouse button twice.
DragPoint to an object, press the mouse button, and hold it down as you
move the mouse to relocate the object.
DropAfter dragging an object to a new location, release the mouse button.
Shutting Down
When you are ready to turn off your computer, follow the shutdown procedure for
your operating system to prevent the loss of unsaved data or damage to your
software programs. See your operating-system documentation for instructions.
Using Video Features
Your computer has an integrated AGP Cirrus 5465 3-D SVGA (super video graphics
array) controller. SVGA is a video standard for displaying text and graphic images
on a monitor screen. Like other video standards, SVGA supports a variety of videomodes. Video modes are different combinations of resolution, refresh rate, and color
depth defined by a video standard for displaying text or graphics. (For further
information on video modes, refer to Understanding Your Personal Computer.)
SVGA provides higher-resolution graphics, faster refresh rates, and more colors than
previous video standards, such as video graphics array (VGA). At the same time,
SVGA supports all standard VGA modes.
To get the best possible image on your screen and to reduce flicker, you might need
to reset the resolution and refresh rate of your monitor. You can view and change
monitor settings through your operating system. Instructions for doing this are
included in a README file that is provided on the Ready-to-Configure UtilityProgram CD for your computer.
Refer to your operating-system documentation for further information on monitor
settings.
30Using Your Personal Computer
Attention
Before you change any monitor settings, be sure to review the information that
comes with your monitor. Using a resolution or refresh rate that is not
supported by your monitor might cause the screen to become unreadable and
damage the monitor. The information that comes with your monitor usually
includes the resolutions and refresh rates that the monitor supports. If you need
additional information, contact the manufacturer of the monitor.
To minimize screen flicker and jitter, set your monitor for the highest noninterlaced
refresh rate that the monitor supports. If your monitor complies with the VESA
Display Data Channel (DDC) standard, it is probably already set to the highest
refresh rate that the monitor and video controller can support. If you are not sure if
your monitor is DDC-compliant, refer to the documentation provided with the
monitor.
Video Device Drivers
To take full advantage of the video controller in your computer, some operating
systems and application programs require custom software, known as video device
drivers. These device drivers provide support for greater speed, higher resolution,
more available colors, and flicker-free images.
The video device drivers are provided on the Ready-to-ConfigureUtility Program CD
for your computer. Instructions for installing the device drivers are provided on the
Ready-to-Configure Utility Program CD in the README file that corresponds to your
operating system. IBM also maintains the latest versions of video device drivers for
all IBM-manufactured computers on the World Wide Web.
If your computer has IBM-preinstalled software, video device drivers have already
been installed on the hard disk in your PC. However, the device driver installation
instructions in the README file will be helpful if you ever need to reinstall the
device drivers; if you want to change video resolution, color depth, or monitor
settings; or if you need information on obtaining and installing updated device
drivers.
Video Controller
The video controller in your computer supports the use of AGP, which can speed
up the process of displaying video graphics. This feature for the video controller is
activated by the video device drivers when the video interrupt feature is set to
Enabled (the default) in the Configuration/Setup Utility program.
Chapter 3. Operating Your Personal Computer31
If you leave the bus master activated, the video device drivers and the video
controller operate at a faster speed. When the video controller needs information
from system memory, the video controller can become the bus master and fetch the
information directly from memory. This means the video controller will not have to
wait for the microprocessor to read the information and write it to video memory.
You can accomplish this by changing the video interrupt setting from Enabled to
Disabled, using the Configuration/Setup Utility program (described on page 39).
Using System-Management Features
This section is intended primarily for network administrators. It describes features
of your computer that make it possible for a network administrator to remotely
manage and control your PC when it is linked to a network.
The BIOS (basic input output system) of your computer supports an interface called
DMI (Desktop Management Interface). DMI is software used to gather information
about the hardware and software in your computer so that network administrators
can remotely monitor and control your PC. DMI can be used to remotely track
many types of information about networked PCs, including serial numbers, memory
attributes, product-specific characteristics of installed peripherals, and operating
system configuration information. This information can be accessed using a DMI
browser. DMI browsers are provided by all major operating systems and all major
LAN management packages (including TME 10 NetFinity, Intel LAN Desk, and
Microsoft SMS).
The Wake on LAN feature can be used by a network administrator to turn on your
PC from a management console. When Wake on LAN is used in conjunction with
network-management software, such as TME 10 NetFinity Version 4 (provided on
the Ready-to-Configure Utility Program CD for your computer), many types of
functions, such as data transfers, software updates, and POST and BIOS updates can
be performed remotely on your PC and other computers enabled for Wake on LAN
that are linked to your network. This updating can be done after hours and on
weekends, which saves time and increases productivity. Users are not interrupted
during normal working hours and LAN traffic is kept to a minimum.
Other features such as remote program load (RPL) and dynamic host configuration
protocol (DHCP) also allow a network administrator to remotely control your
computer. If you use remote program load in conjunction with LANClient Control
Manager software, you can use a feature called Hybrid RPL. Using LANClient
Control Manager, you set up your computer by installing hybrid images (or files) on
the hard disk drive. Then, each time the computer starts from the network,
LANClient Control Manager recognizes your computer as a Hybrid RPL client and
a bootstrap program is downloaded to your computer. This bootstrap program is
32Using Your Personal Computer
small and helps prevent network congestion. Working off the hybrid images, the
bootstrap program initiates the startup process from the hard disk drive of your
computer. An advantage to Hybrid RPL is that the network load associated with
standard RPL is avoided.
System Programs
System programs are the basic layer of software built into every IBM PC. They
include the power-on self test (POST), the basic input/output system (BIOS) code,
and the Configuration/Setup Utility program. POST is a set of tests and procedures
that is performed every time you turn on your PC. The BIOS is a layer of software
that translates instructions from other layers of software into instructions that the
computer hardware can understand. The Configuration/Setup Utility Program
enables you to view and change the configuration and setup of your computer.
In the past, the system programs were contained in a read-only memory (ROM)
module on the system board. If you wanted to update POST routines, BIOS
instructions, and the Configuration/Setup Utility Program, you had to disassemble
the computer and replace modules, or you had to replace the system board. Now,
the system programs are stored in an EEPROM (electrically erasable programmableread-only memory) module, which is also referred to as a flash memory. The contents
can be easily updated with an update (flash) diskette. The process of updating the
system programs EEPROM is often referred to as flashing the BIOS.
Updating the System BIOS
As part of the continuing work to improve quality, IBM might make changes and
enhancements to the system programs. When updates are released, they will be
available on the World Wide Web (http://www.pc.ibm.com/desktop/) or through
the PC Company Bulletin Board Service (see “Using Electronic Support Services” on
page 103) in files that can be downloaded onto a diskette. Updates on the Web site
or BBS will have the file name NZKTnnA.EXE, where nn is a release number.
Instructions for using the system programs updates will be available in a README
file included in the downloaded files. When updating system programs with a flash
diskette, note the following:
If you have set an administrator password, your computer will halt and request the
administrator password. The update process will not begin until you enter the
password. If you have set an administrator password, the system programs update
will run only if you first perform a cold startup (the computer is turned off and
then turned on).
Chapter 3. Operating Your Personal Computer33
If your computer is connected to a network, the system programs also can be
updated remotely, using network-management software, such as IBM LANClient
Control Manager.
Flash ROM Recovery Procedure
If power to your computer is interrupted while POST/BIOS is being updated, your
computer might not restart (reboot) correctly. If this happens, perform the
following procedure to recover:
1. Turn the computer off.
2. Remove the cover. Refer to Installing Options in Your Personal Computer for
safety information and cover removal procedures.
3. Locate the Recovery jumper on the system board. See the label inside your
computer for the location of the jumper.
4. Move the jumper from pins 1 and 2 to 2 and 3
5. Insert the POST/BIOS update (flash) diskette into drive A.
6. Turn the computer on and follow the instructions on the monitor for flashupdate.
7. After the update session completes, turn the computer off and remove the
diskette from drive A.
8. Move the jumper back to pins 1 and 2.
9. Install the cover and reconnect any cables that were disconnected.
10. Turn the computer on to restart the operating system.
34Using Your Personal Computer
Using a CD-ROM Drive
Some PC models have a preinstalled CD-ROM drive. CD-ROM (compact disc
read-only memory) technology offers quick access to enormous amounts of
information. A compact disc can store more than 650 MB of data, such as the large
files needed for audio, still and full-motion video, and still and animated graphics.
A CD-ROM drive can play back or read from a CD, but it cannot write information
to it. CD-ROM drives use industry-standard, 12 cm (4.75-inch) CDs.
Follow these guidelines when using a CD-ROM drive:
Do not place the drive where there is:
– High temperature
– High humidity
– Excessive dust
– Excessive vibration or sudden shock
– An inclined surface
– Direct sunlight
Do not insert any object other than a CD into the drive.
Before moving the computer, remove the CD from the drive.
Handling a CD
When handling a CD, follow these guidelines:
Hold the CD by its edges. Do not touch the surface.
To remove dust or fingerprints, wipe the CD from the center to the outside.
Wiping the CD in a circular direction might cause loss of data.
Do not write or stick paper on the CD.
Do not scratch or mark the CD.
Do not place or store the CD in direct sunlight.
Do not use benzene, thinners, or other cleaners to clean the CD.
Do not drop or bend the CD.
Chapter 3. Operating Your Personal Computer35
Loading a CD
To load a CD into the CD-ROM drive:
1. Press the Eject/Load button. The tray slides out of the drive. (Do not manually
force the tray open.)
2. Place the CD in the tray with the label facing up. If you have placed the
desktop model in a vertical position using an optional floor stand,
3
extend the
supports on the tray so that the CD does not slip off the tray when the
CD-ROM drive is operating.
There are several CD-ROM drives available for your computer. They are alike
except for the supports that hold the CD-ROM in place. If your CD-ROM drive
resembles the one shown below, you will need to install the support wire that is
included with your drive.
To install the support wire:
1. Press the Eject button to open the CD tray.
2. Locate the wire that is installed in the right edge of the tray.
3. Gently flex the wire until you can remove each end from its socket.
4. Locate the two holes near the edge of the tray. (One hole is in the notch on the
inner end of the tray, and the other is in a spring-tab at the outer end.)
5. Insert the wire into the inner hole first, then flex the wire until you can insert
the other end of it into the spring-tab. When the wire is inserted correctly, it is
3
If you place the desktop model in a vertical position, use a floor stand to prevent damage to the
computer due to overheating. Refer to Installing Options in Your Personal Computer for information on
purchasing and installing a floor stand.
36Using Your Personal Computer
parallel to the edge of the tray and approximately three-fourths of an inch in
from the outside edge. Because of the spring-tab, you can lift the support wire
when you insert a CD and let it hold the CD in place.
If your CD-ROM drive resembles the one shown below, you will only need to
extend the clips to secure the CD.
Clip
1. Close the tray by pressing the Eject/Load button, or by gently pushing the tray
forward. When the tray is closed, the indicator light on the front of the drive
will activate to indicate that the drive is in use.
2. To eject the CD, press the Eject/Load button. When the tray slides out,
carefully remove the CD. (If the clips or the support wire on the tray are
extended, retract them to remove the CD.)
3. Close the tray by pressing the Eject/Load button, or by gently pushing the tray
forward.
Note: If the tray does not slide out of the drive when you press the Eject/Load
button, insert the pointed end of a large paper clip into the emergency-eject
hole located above and to the left of the CD-ROM indicator light.
If you have installed a CD-ROM drive yourself and need additional information
about the drive, refer to the documentation that comes with the CD-ROM drive.
Chapter 3. Operating Your Personal Computer37
Using Security Features
A variety of computer security features are provided to help protect your computer
hardware and software. For additional information, see “Asset Security Features”
on page 9.
38Using Your Personal Computer
Chapter 4. Configuring Your Computer
The Configuration/Setup Utility Program is stored in the EEPROM (electrically
erasable programmable read-only memory) of your computer. You can use the
Configuration/Setup Utility Program to view and change the configuration and
setup of your computer, regardless of which operating system you are using.
However, the settings you select in your operating system might override any
similar settings in the Configuration/Setup Utility Program.
The following is a brief description of the categories that appear in the main menu
of the Configuration/Setup Utility Program
System Summary provides information about the current options and features
in your computer. Included in the system summary is information about the
microprocessor, memory, video controller, and diskette and hard disk drives.
Product Data contains information about the machine type and model, flash
EEPROM revision level, system-board identifier, system serial number, and
BIOS date.
Devices and I/O Ports allows you to view and change settings for devices and
I/O ports, including video, IDE drive, serial ports, audio ports, and parallel
port.
Start Options allows you to view and change settings for device startup
sequence, keyboard speed, virus detection, various power-on options, and other
features of your computer.
Date and Time allows you to view and change the date and time of the internal
clock in your computer.
System Security allows you to control access to the hard disk and diskette
drives. You can also set, change, and delete power-on and administrator
passwords.
Advanced Setup allows you to view and change settings for advanced
hardware features, including ROM shadowing and microprocessor, memory,
and PCI control. The settings in Advanced Setup must be configured correctly.
If they are not, your computer might malfunction.
ISA Legacy Resources allows you to indicate which system resources (DMA,
interrupt, memory, and I/O port) are used by ISA adapters that are not Plug
and Play.
Power Management allows you to view and change settings that affect the
energy-saving features of your computer, including the automatic power-on
feature and advanced configuration and power interface (ACPI).
Copyright IBM Corp. 1998 39
Important
In most cases, when you add or remove hardware from your computer or erase
passwords, the BIOS (basic input/output system) detects the changes and then
updates the configuration automatically. Although the computer changes the
configuration settings automatically, you must save these changes in the
Configuration/Setup Utility Program for the new configuration to take effect. If
you do not save the new settings, your operating system will not start. To save
the configuration after adding, removing hardware, or erasing passwords,
complete the following steps.
1. When you turn on the computer, an error message indicating that a
configuration change has occurred appears approximately 30 seconds after
the memory count numbers stop cycling in the top-left corner of the screen.
When the configuration error message disappears, the POST Startup Errors
screen appears, and you are prompted to Continue or Exit Setup. Select
Continue. (If you select Exit Setup, you will get another error message.)
2. The Configuration/Setup Utility Program menu appears with a right
arrowhead (5) next to the menu category in which the configuration change
has occurred. Select this menu item if you want to view the new
configuration settings, and then press Esc to return to the
Configuration/Setup Utility Program menu.
3. Select Save Settings from the Configuration/Setup Utility Program menu.
4. Press Esc to exit from the Configuration/Setup Utility Program and follow
the instructions on the screen.
Starting the Configuration/Setup Utility Program
To start the Configuration/Setup Utility Program
1. Turn on your computer. If your computer is already on when you start this
procedure, you must shut down the operating system, turn off the computer,
wait a few seconds until all in-use lights go off, and restart the computer. (Do
not use Ctrl+Alt+Del to restart the computer.)
2. When the Configuration/Setup Utility Program prompt appears in the lower left
corner of the screen during startup, press F1. (The Configuration/Setup Utility
Program prompt appears on the screen for only a few seconds. You must press
F1 quickly.)
3. If you have not set an administrator password, the Configuration/Setup Utility
Program menu appears on the screen. If you have set an administrator
40Using Your Personal Computer
password, the Configuration/Setup Utility Program menu will not appear until
you type your administrator password at the password prompt and press Enter.
If you have set both an administrator and a power-on password, you can type
either of the passwords at the password prompt. However, if you think you
might need to change any settings in the Configuration/Setup Utility Program,
you must type your administrator password at the password prompt. If you
type your power-on password, you will be able to view limited information in
the Configuration/Setup Utility Program, but you will not be able to change any
settings.
The menu you see on your computer might look slightly different from the menu
shown here, but it will operate the same way.
Configuration/Setup Utility
Select Option:
System Summary
Product Data
Devices and I/O Ports
Start Options
Date and Time
System Security
Advanced Setup
ISA Legacy Resources
Power Management
Save Settings
Restore Settings
Exit Setup
Viewing and Changing Settings in the Configuration/Setup Utility
Program
The Configuration/Setup Utility Program menu lists items that identify system
configuration topics. If a bullet () appears beside a menu item, then an additional
menu is available. If a right arrowhead (5) appears beside a menu item, then a
change to that item has been made or the Configuration/Setup Utility Program
detected an error and attempted to correct it. Also, an additional menu might
follow a menu item with a beside it. If an asterisk (*) appears next to a menu
item, it indicates a system resource conflict. Resolve this conflict before exiting from
Chapter 4. Configuring Your Computer41
Load Default Settings
the Configuration/Setup Utility Program so that your computer will function
properly. For information and instructions on resolving system resource conflicts,
refer to Installing Options in Your Personal Computer and the documentation that
comes with the hardware you want to install.
When working with the Configuration/Setup Utility Program menu, you must use
the keyboard. Refer to the following table for the keys used to accomplish various
tasks.
KeysFunction
↑↓Use these arrow keys to move between menu items until the item you
want is highlighted.
←→Use these arrow keys to display and toggle between choices for a menu
item.
EnterPress this key to select a highlighted menu item.
EscPress this key to exit from a menu after viewing or making changes to
the settings in the menu.
+Use this key in some menus to increase the numerical value of a setting.
−Use this key (the minus or hyphen key) in some menus to decrease the
numerical value of a setting.
0–9Use these number keys in some menus to change the numerical value of
a setting.
F1Press this key for help on a selected menu item.
F9Press this key if you changed and saved the setting of a selected menu
item and you want to restore the setting that was active before you
made the change.
F10Press this key to return the setting of a selected menu item to a default
value.
Note: Active keys are displayed at the bottom of each screen; not all of the above
keys are active with every menu.
In the Configuration/Setup Utility Program menus, the configuration information
you can change is enclosed in brackets like these [ ]. You cannot change
information that is not surrounded by brackets.
42Using Your Personal Computer
Exiting from the Configuration/Setup Utility Program
When you finish viewing or changing settings in the Configuration/Setup Utility
Program follow these steps to exit from the program:
1. Press Esc to return to the Configuration/Setup Utility Program menu.
(Depending on where you are in the program, you might have to press Esc
several times to get back to the Configuration/Setup Utility Program menu.)
2. Before you exit from the Configuration/Setup Utility Program menu, select SaveSettings if you want to save all settings as they currently appear. If you do not
complete this step, your settings will not be saved.
3. From the Configuration/Setup Utility Program menu, press Esc, and follow the
instructions on the screen.
Chapter 4. Configuring Your Computer43
Viewing the System Summary
You can use the Configuration/Setup Utility Program to view a summary of the
options and features in your computer. To view the system summary:
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select System Summary from the Configuration/Setup Utility Program menu.
The System Summary screen appears.
Depending on your model and configuration, your screen might appear slightly
different from the one shown here.
System Summary
ProcessorPentium II
Processor Speed233 MHz
Cache Size512 KB
Cache StateEnabled
System Memory32 MB
Memory TypeNon Parity
Video ControllerCirrus Logic GD-546x VGA
Diskette Drive A:1.44 MB, 3.5"
Diskette Drive B:Not Installed
IDE Hard Disk Drive 04224 MB
IDE Hard Disk Drive 1Not Installed
IDE Hard Disk Drive 2Not Installed
IDE Hard Disk Drive 3Not Installed
4
MHz only denotes the internal clock speed of the microprocessor, not application performance; many
factors affect application performance.
44Using Your Personal Computer
Setting the Date and Time
Your computer has an internal clock that maintains the date and time. A battery
keeps the clock active when the power is disconnected.
To set the date and time:
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select Date and Time from the Configuration/Setup Utility Program menu.
3. Type the date and time in the appropriate fields.
4. Press Esc to return to the Configuration/Setup Utility Program menu.
5. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu and press Enter.
6. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Your operating system might also have a function for setting the date and time.
Refer to your operating system documentation for more information.
System Security
Several security features are available to help you secure your computer and the
information you store in it.
Secure IDE Devices and Diskette Drives
This feature allows you to control when IDE devices and diskette drives are
accessible to system software.
Diskette Write Protect
This feature disables the ability to write to a diskette in the diskette drive.
POST/BIOS Update
This feature allows you to specify if update POST/BIOS from the network is
enabled or disabled.
Chapter 4. Configuring Your Computer45
Adapter ROM Security
If this is set to YES, the keyboard is locked during adapter ROM initialization. This
can be used in conjunction with an administrator password to prevent the use of
adapter ROM-based utilities.
Power-On and Administrator Passwords
Important
Keep a record of your administrator password in a secure place. If you lose or
forget the administrator password, you will not be able to access the
Configuration/Setup Utility program, and you will not be able to erase and reset
an administrator password. If you lose or forget your password, you must
remove the computer cover and move a jumper on the system board. (Refer to
“Erasing a Lost or Forgotten Administrator Password” on page 51 for further
information.)
These password features help prevent unauthorized persons from gaining access to
the information stored in your computer. Other password security features might
be available through your operating system or network.
Power-On Password
The power-on password feature deters unauthorized persons from gaining access to
the information stored in your computer. You do not need to set a power-on
password, but doing so allows you to control who can use your computer. When a
power-on password is set, you must type the password at a prompt that appears as
the computer starts.
When you set the power-on password, you can choose one of three password
prompt modes:
OnIn password prompt On mode, you are prompted for the power-on
password when you turn on the computer. Until the correct password is
entered, the computer's operating system will not start, and the keyboard
will remain locked. If you have a mouse connected to the mouse port, it
also will remain locked. If you have a mouse connected to a serial port,
it will be activated when the computer is started, regardless of whether a
password is set.
Note: If Update POST/BIOS from network is enabled, you cannot
select On. In this case you should select Dual. If it is set to On
46Using Your Personal Computer
when Update POST/BIOS from network is enabled, it will
automatically be reset to Dual.
OffIn password prompt Off mode (sometimes referred to as unattended
start mode), you are not prompted to enter your power-on password
when you turn on the computer. The computer will start the operating
system. However, if you have a mouse connected to the mouse port,
refer to the following text box.
Important Information for Mouse Users
This information applies only to those who have a mouse connected
to the mouse port; a serial mouse is not affected by the password
prompt Off mode.
The password prompt Off mode prevents the computer from
detecting that a mouse is attached. Because the mouse device driver
will not be loaded automatically through the CONFIG.SYS or
AUTOEXEC.BAT files in this mode, an error message that the mouse
port is disabled will appear and the computer will halt. To enable
the operating system to load without displaying the error message,
read the information below that applies to your operating system.
If you are using OS/2, do one of the following before enabling
password prompt Off mode:
Set the CONFIG.SYS file so the operating system does not stop on
a device-driver error. To do this, put the command
"PAUSEONERROR=NO" near the top of the CONFIG.SYS file.
or
Remove the mouse driver statement from the CONFIG.SYS file.
If you are using Windows NT or Windows 95, do the following:
When the computer is started and the mouse port disabled error
message appears, type either your power-on or administrator
password to enable the keyboard. Then use the keyboard to put
a check mark in the Do not display this message in the future
check box.
Once the operating system starts in password prompt Off mode, the
keyboard will remain locked. If you have a mouse connected to the
mouse port, it also will remain locked.
Although you are not prompted to type a password in this mode, you
can type either your power-on or administrator password anytime after
POST has completed, even after the operating system has loaded. If you
Chapter 4. Configuring Your Computer47
type a password, the keyboard will unlock, but the mouse connected to
the mouse port will remain disabled.
Password prompt Off mode is useful for network servers and other
computers that operate unattended. If a power failure occurs, the
computer will automatically restart and resume operating in this mode
when power is restored, without operator intervention.
DualIn the password prompt Dual mode, the startup behavior of the
computer depends on whether the computer is started from the
computer power switch or by an unattended method, such as a modem
or timer.
If you start the computer by using the power switch, the computer
operates the same as it does in password prompt On mode. Refer to
page 46 for further information.
If the computer is started by an unattended method, such as remotely
over a LAN, the computer operates the same as it does in password
prompt Off mode. Refer to page 47 for further information.
If both a power-on and administrator password are set, you can type either
password at the password prompt that appears as you start your computer. However,
if you want to change any settings in the Configuration/Setup Utility Program, you
must type your administrator password at the password prompt that appears whenyou try to access the Configuration/Setup Utility Program. If you type your power-on
password at this prompt, you will be able to view limited information in the
Configuration/Setup Utility Program, but you will not be able to change any
settings.
The password does not appear on the screen as you type it. If you type the wrong
password, you receive a screen message telling you so. If you type the wrong
password three times, you must turn off the computer and start again. When you
type the correct password, the keyboard and mouse will unlock, and the computer
will begin normal operation.
Setting and Changing a Power-On Password
Use the Configuration/Setup Utility Program to set or change a power-on
password. You can use any combination of up to seven characters (A–Z, a–z, and
0–9) for this password.
Attention: Keep a record of your power-on password in a secure place. When a
power-on password has been set, you cannot activate the keyboard and mouse
without first using the password.
48Using Your Personal Computer
To set or change a power-on password:
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Power-On Password.
4. Type your password and press Down Arrow (↓).
5. Type your password again.
6. At Password Prompt, select Off, On, or Dual. Press Left Arrow (←) or Right
Arrow (→) to toggle between selections.
Note: If Update POST/BIOS from network is enabled, you cannot select On.
In this case you should select Dual. If it is set to On when Update
POST/BIOS from network is enabled, it will automatically be reset to
Dual.
7. Select Change Power-On Password, and follow the instructions on the screen.
8. Press Esc twice to return to the Configuration/Setup Utility Program menu.
9. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
10. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Deleting a Power-On Password: Use the Configuration/Setup Utility Program
to delete a power-on password.
To delete a power-on password:
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Power-On Password.
4. Select Delete Power-On Password and follow the instructions on the screen.
5. Press Esc twice to return to the Configuration/Setup Utility Program menu.
6. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
7. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Chapter 4. Configuring Your Computer49
Administrator Password
Setting an administrator password deters unauthorized persons from changing
settings in the Configuration/Setup Utility Program. When an administrator
password is set, you can change settings in the Configuration/Setup Utility Program
only after typing the administrator password at the password prompt that appears
when you try to access the Configuration/Setup Utility Program.
If you are responsible for maintaining the settings of several computers, you might
want to set an administrator password.
When you set an administrator password, a password prompt appears each time
you try to access the Configuration/Setup Utility Program. The password does not
appear on the screen as you type it. If you type the wrong password, you receive a
screen message telling you so. If you type the wrong password three times, you
must turn off the computer and start again. When you type the correct password,
the Configuration/Setup Utility Program menu appears.
If both a power-on and administrator password are set, you can type either of the
passwords at the password prompt that appears as you start your computer. However,
if you want to change any settings in the Configuration/Setup Utility Program, you
must type your administrator password at the password prompt that appears whenyou try to access the Configuration/Setup Utility Program. If you type your power-on
password at this prompt, you will be able to view limited information in the
Configuration/Setup Utility Program, but you will not be able to change any
settings.
Setting and Changing an Administrator Password: Use the
Configuration/Setup Utility Program to set or change an administrator password.
You can use any combination of up to seven characters (A–Z, a–z, and 0–9) for the
password.
To set or change an administrator password:
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Administrator Password.
4. Type your password and press Down Arrow (↓).
5. Type your password again.
6. At Power-On Password Changeable by User, select Yes or No. Press Left
Arrow (←) or Right Arrow (→) to toggle between selections. (If you select Yes
50Using Your Personal Computer
and an administrator password is set, the power-on password can be changed
without having to enter the administrator password. If you select No and an
administrator password is set, the power-on password cannot be changed unless
the administrator password is entered.)
7. Select Change Administrator Password and follow the instructions on the
screen.
8. Press Esc until you return to the Configuration/Setup Utility Program menu.
9. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
10. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Deleting an Administrator Password: Use the Configuration/Setup Utility
Program to delete an administrator password.
To delete an administrator password:
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Administrator Password.
4. Select Delete Administrator Password and follow the instructions on the screen.
5. Press Esc until you return to the Configuration/Setup Utility Program menu.
6. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
7. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Erasing a Lost or Forgotten Administrator Password: This section applies to
lost or forgotten administrator passwords.
If you have lost or forgotten your administrator password, you must remove the
computer cover and move the CMOS Clear jumper (also referred to as the password
jumper) on the system board in order to erase the password so that you can regain
access to the Configuration/Setup Utility program.
See Installing Options in Your Personal Computer for instructions on removing the
computer cover and moving jumpers. Refer to the system board label inside the
computer for the location of the CMOS Clear (password) jumper.
Chapter 4. Configuring Your Computer51
Important
If you move the CMOS Clear jumper, you will lose all setup data stored in the
computer, and you will need to reconfigure the computer. Use the
Configuration/Setup Utility Program to reconfigure the computer and to set a
new password.
52Using Your Personal Computer
Power Management
Your computer comes with built-in energy-saving capabilities. You can view and
change energy-saving settings using the Power Management menu in the
Configuration/Setup Utility Program. This section describes the Power
Management features in your computer and provides instructions for using these
features.
Attention: If a device, such as a monitor, does not have power-management
capabilities, it can be damaged when exposed to a reduced-power state. Before you
make energy-saving selections for your monitor, check the documentation that
comes with your monitor to see if it supports Display Power Management Signaling
(DPMS).
Power Management Features
With Power Management, the computer and monitor (if the monitor supports
DPMS) can be set to go into a reduced-power state if they are inactive for a
specified length of time.
Time to Low Power: With this option, you can specify the amount of time that
the computer must be inactive before Power Management options begin to take
affect. You can select from 5 minutes to 1 hour.
System Power: With this option, you can select On if you want the computer
to remain on, or Off if you want the computer to shut down.
Display: With this option, you can select one of the following reduced-power
states:
– Standby: In this mode, the screen is blanked, but the screen image is
restored immediately when any activity is detected.
– Suspend: In this mode, the monitor uses less power than in Standby mode.
The screen is blanked, but the screen image is restored within a few seconds
after any activity is detected.
– OFF: In this mode, the monitor power is turned off. To restore power to
the monitor, you must press the monitor power switch. On some monitors,
you might have to press the power switch twice.
If OFF is selected, you must specify the Time to Display 'off'. You can
select 5 minutes to 1 hour.
Note: Time to display off is the amount of time after the reduced-power
state before the display enters the off state.
Chapter 4. Configuring Your Computer53
– Disable: In this mode, the monitor is unaffected by the power management
settings.
IDE Drives: This selection enables you to specify if the IDE drives should be
enabled or disabled when power management options take affect.
Setting Power Management Features: To set Power Management features,
complete the following steps.
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select Power Management from the Configuration/Setup Utility Program menu.
3. Select APM.
4. Set APM BIOS Mode to Enabled.
5. Select values for power management (time to low power, system power,,
processor speed, display, and time to display off), as necessary.
6. Set IDE Drives to Enabled or Disabled.Note: SCSI drives are not affected by APM.
7. Press Esc twice to return to the Configuration/Setup Utility Program menu.
8. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
9. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Automatic Power-On Features
The Automatic Power-On features within the Power Management menu allow you
to enable and disable features that automatically turn your computer on. You must
also select the startup sequence you want to use for the type of power-on event
selected. If you select Automatic, make sure Automatic Power On StartupSequence in the Startup Sequence menu is set to enabled. Otherwise, the system will
use the Primary startup sequence.
Wake on LAN: If you have remote-network-management software and a NIC
card that supports the Wake on LAN, Tivoli, LCCM, or LCM, and you have a
management system that generates the LAN wakeup you can use the
IBM-developed Wake on LAN feature built into the NIC in your computer.
(You can also use the Wake on LAN feature if you have installed a properly
configured token-ring adapter that is enabled for Wake on LAN.) When you set
Wake on LAN to Enabled, your computer will turn on when it receives a
54Using Your Personal Computer
specific signal from another computer on your local area network (LAN).
Contact your network administrator if you have questions.
Serial Port Ring Detect: If your computer has an external modem connected to
a serial port and you want the computer to turn on automatically when a ring is
detected on the modem, set this feature to Enabled.
MODEM Ring Detect: If your computer has an internal modem and you want
the computer to turn on automatically when a ring is detected on the modem,
set this feature to Enabled. The modem must also support this feature. A cable
from the modem connects to a connector on the riser card.
Wake Up on Alarm: With this feature, you can specify a date and time at
which the computer will be turned on automatically. This can be either a single
event, a daily event, or a weekly event.
PCI Wake Up: If enabled, this setting allows your system to power on in
response to wake up requests from PCI devices that support this feature.
Setting Automatic Power-On Features: To set Automatic Power-On features,
complete the following steps.
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select Power Management from the Configuration/Setup Utility Program menu.
3. Select Automatic Power On.
4. Select the menu item for the feature you want to set. Use Left Arrow (←) or
Right Arrow (→) to select either Enabled or Disabled.
5. Select Startup Sequence for the feature. Use Left Arrow (←) or Right Arrow
(→) to select either Primary or Automatic.
6. Press Esc until you return to the Configuration/Setup Utility Program menu.
7. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
8. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Automatic Configuration and Power Interface (ACPI) BIOS Mode
This setting is used to enable or disable ACPI BIOS mode. When ACPI BIOS mode
is enabled, the operating system is allowed to control the power management
features of your computer and the settings for APM BIOS mode are ignored. Not
all operating systems support ACPI BIOS mode. Refer to your operating system
documentation to determine if ACPI is supported.
Chapter 4. Configuring Your Computer55
Setting ACPI BIOS Mode: The ACPI BIOS mode is set to Enabled by default.
To set ACPI BIOS mode, complete the following steps.
1. Start the Configuration/Setup Utility Program (see “Starting the
Configuration/Setup Utility Program” on page 40).
2. Select Power Management from the Configuration/Setup Utility Program menu.
3. Set ACPI BIOS Mode to Enabled or Disabled as desired using the Left Arrow
(←) or Right Arrow (→).
4. Press Esc to return to the Configuration/Setup Utility Program menu.
5. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
6. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
56Using Your Personal Computer
POST/BIOS Update over the Network
This setting is used to enable or disable the POST/BIOS update feature for systems
that are shipped with IBM network adapters. When the feature is enabled, the
system programs in your computer can be updated remotely from a network server.
If you have set an administrator password for your computer, it does not have to be
entered by the server. Consult your network administrator for information on
setting up your network server to perform POST and BIOS updates.
To access the POST/BIOS Update setting:
1. Start the Configuration/Setup Utility Program. (See “Starting the
Configuration/Setup Utility Program” on page 40.)
2. Select System Security.
3. Select POST/BIOS Update.
4. Select Update POST/BIOS from network.
5. To enable update POST/BIOS over the network, select Enabled. To disable,
select Disabled.
6. Press Esc until you return to the Configuration/Setup Utility Program menu.
7. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
8. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Chapter 4. Configuring Your Computer57
58Using Your Personal Computer
Chapter 5. Taking Care of Your Computer
This chapter provides guidelines for the proper handling and care of your
computer.
Basics
Here are some basic points about keeping your computer functioning properly:
Keep your computer in a clean, dry environment. Make sure it rests on a flat,
sturdy surface.
Do not place items on top of the monitor or cover any of the vents in the
monitor or computer. These vents provide air flow to keep your computer from
overheating.
Keep food and drinks away from all parts of your computer. Food particles
and spills might make the keyboard and mouse sticky and unusable.
Do not get the power switches or other controls wet. Moisture can damage
these parts and cause an electrical hazard.
Always disconnect a power cord by grasping the plug, not the cord.
Cleaning Your Computer
It is a good practice to clean your computer periodically to protect the surfaces and
ensure trouble-free operation.
CAUTION:
Be sure to turn off the computer and monitor power switches before cleaning the
computer and monitor screen.
Computer and Keyboard
Use only mild cleaning solutions and a damp cloth to clean the painted surfaces of
the computer.
Monitor Screen
Do not use abrasive cleaners when cleaning the surface of the monitor screen. The
screen surface is easily scratched, so avoid touching it with pens, pencil points, and
erasers.
Copyright IBM Corp. 1998 59
To clean the screen surface, wipe it gently with a soft, dry cloth, or blow on the
screen to remove grit and other loose particles. Then use a soft cloth moistened
with a nonabrasive liquid glass cleaner. In addition, an anti-static cleaner can be
used to slow the buildup of dust on the screen surface.
Mouse
If the pointer on the screen does not move smoothly with the mouse, you might
need to clean the mouse.
1. Turn off the computer.
2. Disconnect the mouse cable from the computer.
3. Turn the mouse upside down. Unlock the retainer on the bottom of the mouse
by moving it in the direction indicated by the arrow on the retainer.
4. Turn the mouse right-side up, and the retainer and ball will drop out.
5. Wash the ball in warm, soapy water, and dry it well.
6. Using a damp cloth, wipe the outside of the mouse and the retainer. Be sure to
wipe the rollers inside the mouse.
7. Insert the ball and retainer. Lock the retainer by moving it in the opposite
direction of the arrow.
8. Reconnect the mouse cable to the computer.
60Using Your Personal Computer
Replacing the Battery
Your computer has a special type of memory that maintains the date, time, and the
settings for built-in features, such as serial- and parallel-port assignments
(configuration). A battery keeps this information active when you turn off the
computer.
The battery requires no charging or maintenance throughout its life; however, no
battery lasts forever. If the battery fails, the date, time, and configuration
information (including passwords) are lost. An error message is displayed when
you turn on the computer.
Refer to “Lithium Battery Notice” on page ix of this publication and InstallingOptions in Your Personal Computer for information about replacing the battery.
If you replace the original lithium battery with a heavy-metal battery or a battery
with heavy-metal components, be aware of the following environmental
consideration. Batteries and accumulators that contain heavy metals must not be
disposed of with normal domestic waste. They will be taken back free of charge by
the manufacturer, distributor, or representative, to be recycled or disposed of in a
proper manner.
Moving Your Computer
Important
Do not move the computer while it is on. Sudden movements, such as bumps,
jerks, and drops, can cause the read/write head of the hard disk drive to bounce
against the surface of the disk itself. This can cause loss of data and a variety of
hard disk errors. Always turn off the computer before you move it. When the
computer is off, the read/write head automatically parks itself over a nondata
area of the hard disk. This process can help to prevent damage to the hard disk.
CAUTION:
Do not risk injury by moving or lifting the computer by yourself. Ask another
person to help you.
If your computer has a hard disk drive, take the following precautions:
1. Back up all files and data from the hard disk.
Operating systems can vary in the way they perform backup procedures. Some
operating systems save only data files, while others make copies of application
Chapter 5. Taking Care of Your Computer61
program files and data files. Refer to your operating-system documentation for
information about software backup.
2. Remove all media (diskettes, compact discs, tapes, and so on) from the drives.
3. Turn off the computer and all attached devices.
4. Unplug the power cords from electrical outlets.
5. Note where you have attached your cables to the rear of the computer; then
remove them.
6. If you saved the original shipping cartons and packing materials, use them to
pack the units. If you are using different cartons, cushion the units to avoid any
damage.
62Using Your Personal Computer
Chapter 6. Solving Problems
This chapter presents an overview of diagnostic tools available to you. You can use
these tools to identify and correct problems that might come up as you use your
computer. This chapter also contains information about option diskettes and
terminate-and-stay-resident (TSR) programs.
Important
If you have just added new software or a new computer option and your
computer is not working, do the following before using the other information in
the chapter:
Remove the software or device you just added.
Run the diagnostic programs to determine if your computer is running
correctly. (See “Diagnostic Programs” on page 97 for information about
diagnostic programs provided with your computer.)
Reinstall the new software or new device.
Using Diagnostic Tools
Computer problems can be caused by hardware, software, or user error (for
example, pressing the wrong key). Using the diagnostic aids discussed in this
chapter, you might be able to solve such problems yourself or gather helpful
information you can pass on to a service technician.
You can check the hardware by following the procedures in this chapter. You can
also use the diagnostic programs provided with your computer (see “Diagnostic
Programs” on page 97 for a description of these programs).
If the hardware checks out OK, and you have not made a user error, you might
have a software problem. If you suspect that you have a software problem and
your computer came with IBM-preinstalled software, refer to About Your Software
and the operating-system documentation that comes with your computer. If you
have installed software applications yourself, consult the documentation that comes
with the software.
Copyright IBM Corp. 1998 63
The following tools are available to diagnose hardware-related problems:
Power-on self-test (POST)
Error messages
POST message charts
Troubleshooting charts
Diagnostic programs
Note: In addition to the preceding tools, if you have access to the World Wide
Web, you can also view or download the latest problem-solving tips from
the http://www.us.pc.ibm.com/desktop/ Web site.
Descriptions of the diagnostic tools follow.
Power-On Self-Test (POST)
Each time you turn on your computer, it performs a series of tests that check the
operation of the base computer. This series of tests is called the power-on self-test(POST).
Note
If your computer starts but does not boot when you press the power switch, do
the following:
Make sure all cables are securely connected to the correct locations.
Check to see if the voltage-selection switch is set to the correct position for
your country.
For additional information, see Setting Up Your Personal Computer.
POST does the following:
Checks basic system-board operations
Checks the memory operation
Compares the current system configuration with that established by the
Configuration/Setup Utility program
Starts the video operation
Verifies the presence of diskette drives, hard disk drives, and the CD-ROM
drive (if installed)
If Power On Self Test is [Enhanced], information about memory configuration and
test results are shown in the upper left corner. Options for running a quick POST
64Using Your Personal Computer
or accessing the Configuration/Setup Utility Program appear in the lower-left
corner of the screen. Quick mode is the default mode of operation.
Note: The amount of available memory shown might be somewhat less than
expected because of basic input/output system (BIOS) shadowing in random
access memory (RAM).
If POST finishes without detecting any problems, the first screen of your operating
system or application program appears (if you have not set a power-on password).
If you have set a power-on password, a password prompt appears. You must enter
your password before the first screen of your operating system or application
program will appear. (For further information on using passwords, refer to “System
Security” on page 45.)
If Power On Status is Enabled and POST detects a problem, you will hear multiple
beeps or no beep. In most cases, an error code appears in the top left corner of the
screen, and in some cases a description of the error is displayed beside the code.
(Note that the screen will sometimes display multiple error codes and descriptions.)
For more information about what caused an error message to appear and what
action to take, refer to “Solving POST Error Message Problems” on page 66 and
“POST Message Charts” on page 69.
If you hear no beep at all during POST, refer to “Troubleshooting Charts” on
page 87. You might need to have your computer serviced.
Error Messages
Error messages that appear on the screen might be text, numeric, or both. There are
several types of error messages:
POST error messages
Messages that appear when POST finds problems with the hardware during
startup or when a change in the hardware configuration is found. POST error
messages are 3-, 4-, 5-, 8-, or 12-character alphanumeric messages and include
brief explanations (except I999XXXX errors).
For more information about what caused an error message to appear and what
action to take, refer to “Solving POST Error Message Problems” on page 66 and
“POST Message Charts” on page 69.
Software-generated error messages
Messages that appear if a problem or conflict is detected by the application
program, the operating system, or both. Error messages for operating-system
and other software problems are generally text messages, but they also can be
Chapter 6. Solving Problems65
numeric messages. For information about these software error messages, refer
to the information that comes with the operating system or application program.
Diagnostic error messages
Messages that appear if a hardware problem is detected by a diagnostic test
program. The messages present text information that can be used to identify a
failing part.
Solving POST Error Message Problems: If you receive an error message
during the power-on-self-test (POST), completing the steps outlined in this section
might enable you to resolve the problem.
Note
If you have just added, removed, or changed the location of a device and you
receive an error message, follow the procedure described in the Important text
box on page 40. If the procedure on page 40 does not eliminate the error
message, then proceed with the following instructions.
1. Write down all error code numbers and descriptions that appear on the screen
as you start your computer. (Note that a single problem can cause several error
messages to appear. When you correct the cause of the first error message, the
other error messages probably will not appear on the screen the next time you
turn on your computer.)
2. If you have set a power-on password, a password prompt appears. If you have
set both power-on and administrator passwords, you can type either password
at the password prompt. However, if you think you might need to change any
settings in the Configuration/Setup Utility Program, type your administrator
password at the password prompt. If you type your power-on password, you
will be able to view error codes and error code descriptions displayed on the
POST Startup Errors screen, and you will also be able to view limited
information in the Configuration/Setup Utility Program. However, you will not
be able to change any settings.
3. In the case of most errors, the Configuration/Setup Utility Program starts
automatically so that you can attempt to identify and correct the problem.
When the Configuration/Setup Utility Program starts, a screen labeled POST
Startup Errors appears. (Note that the POST Startup Errors screen does not
appear immediately. You must wait approximately one minute.) If the POST
Startup Errors screen does not appear, proceed to step 6.
4. At the POST Startup Errors screen, select Continue if you want to access the
Configuration/Setup Utility Program menu. Select Exit Setup if you want to
exit the Configuration/Setup Utility Program. (See the following Important text
66Using Your Personal Computer
box for information on exiting the Configuration/Setup Utility Program without
making any changes to current settings.) To select an item, press Up Arrow (↑)
or Down Arrow (↓) to highlight the item, and then press Enter.
Important
If you exit from the Configuration/Setup Utility Program without selecting
Save Settings, your operating system will not start, but the computer will
automatically restart. When the computer restarts, you will get a POST error
message, and then the Configuration/Setup Utility Program will again start
automatically.
If you select Save Settings and then exit the Configuration/Setup Utility
Program, your system will save all settings as they currently appear in the
Configuration/Setup Utility Program and your operating system will start
(unless there is an unresolved problem with an IDE device).
5. If you selected Continue in step 4 on page 66, the Configuration/Setup Utility
Program menu appears on the screen. You will see a pointer next to any menu
items that are malfunctioning or that have been changed since the last time you
turned on your computer. If you did not knowingly make a change to a
flagged menu item, there is likely a malfunction in that item. If you made a
change, continue here. If you did not make a change, go to the Important text
box on page 67.
To use the Configuration/Setup Utility Program, do the following:
a. Select the menu item that is flagged (or that you wish to view) by pressing
Up Arrow (↑) or Down Arrow (↓), and then press Enter.
b. A new menu specific to the item that you selected appears. Press Left
Arrow (←) or Right Arrow (→) to toggle between choices for a menu item.
(Note that each menu item has a Help screen. To view the Help screen,
select the menu item, and then press F1.)
c. When you have finished viewing and changing settings, press Esc to return
to the Configuration/Setup Utility Program menu.
d. Before you exit from the program, select Save Settings.
e. To exit from the Configuration/Setup Utility Program, press Esc and follow
the instructions on the screen. When you exit from the Configuration/Setup
Utility Program menu, your new settings will be saved and your operating
system will start automatically (unless there is an unresolved problem with
an IDE device).
Chapter 6. Solving Problems67
6. For more information about what caused an error message to appear and what
action to take, refer to the following chart.
ProblemGo to:
POST error code or message appears.“POST Message Charts” on page 69.
After more than one beep, application
program or operating system appears.
Blank screen, unreadable screen, or other
unusual response occurs.
“Diagnostic Programs” on page 97.
“Troubleshooting Charts” on page 87.
If you are unable to resolve a problem and need assistance, refer to Chapter 7,
“Getting Help, Service, and Information” on page 101.
68Using Your Personal Computer
POST Message Charts
The computer might display more than one error message. Often, the first error to
occur causes subsequent errors. When using the POST message charts in this
section, always begin by following the suggested action for the first error message
that appears on your computer screen. Note that, in these charts, “X” can be any
alphanumeric character.
Important
If you find it necessary to remove the computer cover, first read "Removing the
Cover" in Installing Options in Your Personal Computer for important safety
information and instructions.
A failure occurred during testing of the system board and
microprocessor.
Action: Have the computer serviced.
Action: Remove all adapters that are not required for system
startup and reinstall them one at a time, retesting after each is
reinstalled. When an adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer
serviced.
Action: Have the computer serviced.
CAUTION:
Danger of explosion if lithium battery is incorrectly replaced.
Replace the battery with the same or equivalent type
recommended by the manufacturer. Dispose of batteries as
required by local ordinances or regulations. (See “Lithium
Battery Notice” on page ix and “Replacing the Battery” on
page 61 for important information on battery use, disposal, and
replacement.)
Action: Replace the battery.
Note: The computer can be used until you replace the battery.
Chapter 6. Solving Problems69
POST MessageDescription
162A change in device configuration occurred. This message is
displayed under one or more of the following conditions:
A new device has been installed.
A device has been moved to a different location or cable
connection.
A device has been removed or disconnected from a cable.
A device is failing and is no longer recognized by the
computer as being installed.
An external device is not turned on.
An invalid checksum is detected in CMOS memory
(nonvolatile RAM).
Action:
1. Verify that all external devices are turned on. External devices
must be turned on before the computer is turned on.
2. Verify that all devices are properly installed and securely
connected.
3. If you added, removed, or changed the location of a device,
you must save the new configuration in the
Configuration/Setup Utility Program. Refer to the Important
text box on page 40 for further information and instructions on
saving the configuration.
4. If you did not add, remove, or change the location of a device,
a device is probably failing. Running the diagnostic programs
might isolate the failing device. (See “Diagnostic Programs”
on page 97 for information about diagnostic programs
provided with your computer.)
If the problem cannot be isolated and corrected, have the computer
serviced.
163The clock is not working correctly.
Action: Set the correct date and time. If the date and time are set
correctly and saved and the 163 error message reappears, replace
the battery.
If this does not correct the problem, have the computer serviced.
Note: The computer can be used until it is serviced, but any
application programs that use the date and time will be
affected.
70Using Your Personal Computer
POST MessageDescription
164A change in the memory configuration occurred. This error can be
caused by adding, removing, or incorrectly installing memory.
Note: The computer can be used with decreased memory capacity
until the error is corrected.
Action:
1. If you added memory, see Installing Options in Your Personal
Computer and Chapter 4, “Configuring Your Computer” on
page 39 of this booklet to verify that the new memory is
correct for your computer, and that it is installed and
configured correctly.
2. If you added or removed memory, you must save the new
configuration in the Configuration/Setup Utility Program.
Refer to the Important text box on page 40 for further
information and instructions on saving the configuration.
3. Running the diagnostic programs might isolate the location of
the problem DIMM and provide additional information. (See
“Diagnostic Programs” on page 97 for information about
diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer
serviced.
167The microprocessor was updated and the correct system BIOS
update program was not found. This error can be caused when a
different microprocessor is installed.
Action: If you updated the microprocessor, refer to “Updating
the System BIOS” on page 33 and perform the BIOS flash update
procedure.
If the problem cannot be isolated and corrected, have the computer
serviced.
175The primary copy of secure data is damaged. This can occur if the
computer is turned off while the Configuration/Setup Utility
program is updating the administrator password or startup
sequence.
Action: POST will attempt to use the alternate copy of secure
data to correct the primary copy. If the operation is successful, the
administrator password and startup sequence will remain as they
were before the Configuration/Setup Utility program was invoked
and this error will not appear during the next power-on. If the
operation is not successful, other POST errors might appear and
the system board must be replaced.
Chapter 6. Solving Problems71
POST MessageDescription
176The computer was tampered with. This indicates that the cover
has been removed and the chassis-intrusion detector has not been
cleared by entering the administrator password. Note that
chassis-intrusion can be detected only if the chassis-intrusion
detector feature is activated, which occurs when enhanced security
is enabled and an administrator password is set.
Action: To reset the chassis-intrusion detector, you must enter the
administrator password.
186Security hardware control logic error. The security data could
either not be read or written and the administrator password and
startup sequence are not reliable.
Action: If your computer is in enhanced security mode, the
startup process will not continue. The system board must be
replaced.
187A problem occurred with the administrator password and startup
(boot) sequence.
Action: If enhanced security is not enabled, use the
Configuration/Setup Utility program to:
1. Clear the startup sequence (Start Options, Startup sequence).
2. Clear the administrator password. For instructions, see
“Deleting an Administrator Password” on page 51.
3. Reload the default settings (Load Default Settings).
4. Reset an administrator password. For instructions, see “Setting
and Changing an Administrator Password” on page 50.
For instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
190The computer chassis-intrusion detector was cleared.
72Using Your Personal Computer
POST MessageDescription
20XA failure occurred during testing of the memory. This error can be
caused by incorrectly installed memory, a failing DIMM, or a
system-board failure.
Action:
1. If you have added memory, see Installing Options in Your
Personal Computer and Chapter 4, “Configuring Your
Computer” on page 39 of this booklet to verify that the new
memory is correct for your computer, and that it is installed
and configured correctly.
2. Run the diagnostic programs to verify the problem. (See
“Diagnostic Programs” on page 97 for information about
diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer
serviced.
301
303
A failure occurred during testing of the keyboard and keyboard
controller. These error messages also might be accompanied by
continuous beeping.
Action:
Ensure that:
1. Nothing is resting on the keyboard and pressing a key.
2. No key is stuck.
3. The keyboard cable is securely attached to the keyboard
connector on the computer. (For the location of the keyboard
connector, refer to “Desktop Model Connectivity” on page 13.)
Note: If you have just connected a new mouse or other pointing
device, turn off the computer and disconnect that device.
Wait at least 5 seconds, and then turn on the computer. If
the error message goes away, replace the device. If the
error message remains, have the keyboard and cable or the
computer serviced.
Chapter 6. Solving Problems73
POST MessageDescription
601A failure occurred during testing of the diskette drive and
diskette-drive controller. This error can be caused by a loose or
incorrectly connected cable, a failing drive, or a failing system
board.
Note: The computer can be used, but one or more diskette drives
might not work.
Action: Verify that all diskette drive cables are properly installed
and securely connected.
Running the diagnostic programs might isolate the diskette drive
that failed, but you must have your computer serviced. (See
“Diagnostic Programs” on page 97 for information about
diagnostic programs provided with your computer.)
602The computer is not able to start the diskette in the drive. The
diskette might be damaged or formatted incorrectly.
Action: Try another startable diskette that is formatted correctly
and is in good condition. (For information and instructions on
formatting diskettes, refer to Understanding Your Personal Computer
and your operating-system documentation.)
If this does not correct the problem, have the computer serviced.
604A failure occurred during the testing of a diskette drive.
Action:
1. Verify that the Configuration/Setup Utility Program correctly
reflects the type of diskette drive you have installed. (For
instructions on using the Configuration/Setup Utility Program,
refer to Chapter 4, “Configuring Your Computer” on page 39.)
2. Run the diagnostic programs. (See “Diagnostic Programs” on
page 97 for information about diagnostic programs provided
with your computer.)
3. If the diagnostic programs detect a failure, replace the diskette
drive.
If the problem cannot be isolated and corrected, have the computer
serviced.
74Using Your Personal Computer
POST MessageDescription
662A diskette drive configuration error occurred.
Action:
1. Verify that the Configuration/Setup Utility Program correctly
reflects the number of diskette drives you have installed. (For
instructions on using the Configuration/Setup Utility Program,
refer to Chapter 4, “Configuring Your Computer” on page 39.)
2. If you installed or removed a diskette drive, you must save the
new configuration in the Configuration/Setup Utility Program.
Refer to the Important text box on page 40 for further
information and instructions on saving the configuration.
If this does not correct the problem, have the computer serviced.
1762A hard disk configuration error occurred.
Action:
1. Verify that the Configuration/Setup Utility Program correctly
reflects the number of hard disk drives you have installed.
(For instructions on using the Configuration/Setup Utility
Program, refer to Chapter 4, “Configuring Your Computer” on
page 39.)
2. If you added or removed a hard disk drive, you must save the
new configuration in the Configuration/Setup Utility Program.
Refer to the Important text box on page 40 for further
information and instructions on saving the configuration.
If the problem cannot be isolated and corrected, have the computer
serviced.
178XA failure occurred during testing of the hard disk drive or a
primary or secondary IDE device.
Action:
1. Run the diagnostic programs. (See “Diagnostic Programs” on
page 97 for information about diagnostic programs provided
with your computer.)
2. If the diagnostic programs detect a failure, replace the
defective hard disk drive or primary or secondary IDE or EIDE
device.
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems75
POST MessageDescription
1800A PCI adapter has requested a hardware interrupt that is not
available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the hardware
interrupt settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required
interrupt resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all hardware interrupts are being used by ISA legacy
adapters, you might need to remove an ISA legacy adapter to
make an interrupt available to the PCI adapter you want to
install. For instructions on removing adapters, see InstallingOptions in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the hardware
interrupt used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make an
interrupt available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer
serviced.
76Using Your Personal Computer
POST MessageDescription
1801A PCI adapter has requested memory resources that are not
available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the memory
resource settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required
memory resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all memory resources are being used by ISA legacy adapters,
you might need to remove an ISA legacy adapter to make
memory available to the PCI adapter you want to install. For
instructions on removing adapters, see Installing Options inYour Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
resources used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make memory
available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems77
POST MessageDescription
1802A PCI adapter has requested an I/O address that is not available,
or the PCI adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the I/O
address settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required I/O
resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all I/O addresses are being used by ISA legacy adapters,
you might need to remove an ISA legacy adapter to make an
I/O address available to the PCI adapter you want to install.
For instructions on removing adapters, see Installing Options inYour Personal Computer.
Note: If you remove an ISA legacy adapter, set the I/O
address used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make an I/O
address available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer
serviced.
78Using Your Personal Computer
POST MessageDescription
1803
1804
A PCI adapter has requested a memory address that is not
available, or the PCI adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the memory
address settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required
memory resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all memory addresses are being used by ISA legacy
adapters, you might need to remove an ISA legacy adapter to
make a memory address available to the PCI adapter you want
to install. For instructions on removing adapters, see InstallingOptions in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
address used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make a
memory address available to the PCI adapter you want to
install.
If the problem cannot be isolated and corrected, have the computer
serviced.
Action: Remove all of the PCI adapters that are not required for
system startup and reinstall them one at a time, retesting after each
is reinstalled. When an adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems79
POST MessageDescription
1850A Plug and Play adapter has requested a hardware interrupt that
is not available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the hardware
interrupt settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required
interrupt resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all hardware interrupts are being used by ISA legacy
adapters, you might need to remove an ISA legacy adapter to
make an interrupt available to the Plug and Play adapter you
want to install. For instructions on removing adapters, see
Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the hardware
interrupt used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make an
interrupt available to the Plug and Play adapter you want to
install.
5. If your system will be loading a Plug and Play operating
system, ensure that Plug and Play Operating System is set to
Yes.
6. Ensure that the address decode value for the adapter is
properly set.
If the problem cannot be isolated and corrected, have the computer
serviced.
80Using Your Personal Computer
POST MessageDescription
1851A Plug and Play adapter has requested memory resources that are
not available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the memory
resource settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required
memory resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all memory resources are being used by ISA legacy adapters,
you might need to remove an ISA legacy adapter to make
memory available to the Plug and Play adapter you want to
install. For instructions on removing adapters, see InstallingOptions in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
resources used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make memory
available to the Plug and Play adapter you want to install.
5. If your system will be loading a Plug and Play operating
system, ensure that Plug and Play Operating System is set to
Yes.
6. Ensure that the address decode value for the adapter is
properly set.
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems81
POST MessageDescription
1852A Plug and Play adapter has requested an I/O address that is not
available, or the Plug and Play adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the I/O
address settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required I/O
resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all I/O addresses are being used by ISA legacy adapters,
you might need to remove an ISA legacy adapter to make an
I/O address available to the Plug and Play adapter you want
to install. For instructions on removing adapters, see InstallingOptions in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the I/O
address used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make an I/O
address available to the Plug and Play adapter you want to
install.
5. If your system will be loading a Plug and Play operating
system, ensure that Plug and Play Operating System is set to
Yes.
6. Ensure that the address decode value for the adapter is
properly set.
If the problem cannot be isolated and corrected, have the computer
serviced.
82Using Your Personal Computer
POST MessageDescription
1853
1854
A Plug and Play adapter has requested a memory address that is
not available, or the Plug and Play adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the memory
address settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required
memory resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all memory addresses are being used by ISA legacy
adapters, you might need to remove an ISA legacy adapter to
make a memory address available to the Plug and Play
adapter you want to install. For instructions on removing
adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make a
memory address available to the Plug and Play adapter you
want to install.
5. If your system will be loading a Plug and Play operating
system, ensure that Plug and Play Operating System is set to
Yes.
6. Ensure that the address decode value for the adapter is
properly set.
If the problem cannot be isolated and corrected, have the computer
serviced.
address used by the removed adapter to Available
before installing another adapter.
Chapter 6. Solving Problems83
POST MessageDescription
1855A Plug and Play adapter read-only memory (ROM) error occurred.
Action: Remove all of the Plug and Play adapters that are not
required for system startup and reinstall them one at a time,
retesting after each is reinstalled. When an adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer
serviced.
84Using Your Personal Computer
POST MessageDescription
1856A Plug and Play adapter has requested a DMA address that is not
available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct
in the Configuration/Setup Utility Program. If the DMA
address settings are not correct, change and save the settings.
Setting the resources used by ISA legacy adapters to Notavailable enables the Plug and Play function to configure
around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and
legacy (non-Plug and Play) adapters, refer to Installing Optionsin Your Personal Computer. For information about required
DMA resource settings for ISA legacy adapters, refer to the
documentation that comes with these adapters. For
instructions on using the Configuration/Setup Utility Program,
see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set
correctly. For information about switch settings, refer to the
documentation that comes with the ISA legacy adapters.
3. If all DMA addresses are being used by ISA legacy adapters,
you might need to remove an ISA legacy adapter to make a
DMA address available to the Plug and Play adapter you want
to install. For instructions on removing adapters, see InstallingOptions in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the DMA
address used by the removed adapter to Available
before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you
might need to remove one of these adapters to make a DMA
address available to the Plug and Play adapter you want to
install.
5. If your system will be loading a Plug and Play operating
system, ensure that Plug and Play Operating System is set to
Yes.
6. Ensure that the address decode value for the adapter is
properly set.
If the problem cannot be isolated and corrected, have the computer
serviced.
Chapter 6. Solving Problems85
POST MessageDescription
1962A startup sequence error occurred.
Action:
1. Make sure the settings for startup options are correct in the
Configuration/Setup Utility Program. If the settings are not
correct, change and save them. For instructions, see
Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure the primary IDE (or, if applicable, SCSI) cable is
properly installed and securely connected.
3. Make sure all adapters are installed correctly. For instructions
on adding adapters, see Installing Options in Your PersonalComputer.
If the problem cannot be isolated and corrected, have the computer
serviced.
2462A video configuration error occurred.
Action:
1. Make sure the monitor signal cable is securely attached to the
monitor connector. (For the location of the monitor connector,
refer to “Desktop Model Connectivity” on page 13.)
2. If you just added or removed video memory, you must save
the new configuration in the Configuration/Setup Utility
Program. Refer to the Important text box on page 40 for
further information and instructions on saving the
configuration.
If the problem cannot be isolated and corrected, have the computer
serviced.
I9990301A hard disk failure occurred.
Action: Have the computer serviced.
Other NumbersThe computer POST found an error.
Action: Follow the instructions on the screen.
86Using Your Personal Computer
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.