IBM PC 300GL, PC 300GL Type 6561, PC 300GL Type 6591 Using Manual

Personal Computer
Using Your Personal Computer
PC 300GL Type 6561 and Type 6591
Personal Computer
Using Your Personal Computer
PC 300GL Type 6561 and Type 6591
IBM
Before using this information and the product it supports, be sure to read the general information under Appendix B, “Product Warranties, License Information, and Notices” on page 113.
Second Edition (January 1998)
The following paragraph does not apply to the United Kingdom or any country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES
THIS PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you.
This publication could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time.
This publication was developed for products and services offered in the United States of America. IBM may not offer the products, services, or features discussed in this document in other countries, and the information is subject to change without notice. Consult your local IBM representative for information on the products, services, and features available in your area.
Requests for technical information about IBM products should be made to your IBM reseller or IBM marketing representative.
Copyright International Business Machines Corporation 1998. All rights reserved.
Note to U.S. Government Users — Documentation related to restricted rights — Use, duplication or disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corp.
Contents
Safety Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii
Laser Compliance Statement ............................... viii
Lithium Battery Notice ................................... ix
About This Book ...................................... xi
Related Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii
Chapter 1. Your IBM Personal Computer ....................... 1
Identifying Your Computer ................................ 2
Desktop Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
Tower Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
What Your IBM Personal Computer Offers ....................... 4
Microprocessor . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
System Memory . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
L2 Cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
ISA Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
PCI Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
AGP Bus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Expansion with Adapters ................................ 5
High-Capacity Hard Disk Drives ........................... 5
CD-ROM Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
ECP/EPP Parallel Port ................................. 5
Serial Ports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Universal Serial Bus Ports ............................... 6
Integrated Video Graphics Controller ........................ 7
Audio Adapter (Optional) ............................... 7
Ethernet Adapter (Optional) .............................. 7
Token Ring Adapter (Optional) ............................ 7
System-Management Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
IBM-Preinstalled Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Operating-System Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Ease-of-Use Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Ergonomic Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Advanced Power Management ............................ 9
Asset Security Features ................................. 9
Service and Support ................................... 9
Expandability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Desktop Model Connectivity .............................. 13
Tower Model Connectivity ............................... 14
Keyboard Extender . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Copyright IBM Corp. 1998 iii
Features at a Glance ..................................... 16
Desktop Model System Specifications .......................... 20
Tower Model System Specifications ........................... 22
Chapter 2. Arranging Your Workspace ........................ 25
Comfort . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
Glare and Lighting ..................................... 26
Air Circulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Electrical Outlets and Cable Lengths ........................... 26
Chapter 3. Operating Your Personal Computer ................... 27
Using Controls and Status Indicators .......................... 27
Starting Your Computer .................................. 28
Using a Mouse ........................................ 29
Shutting Down . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Using Video Features .................................... 30
Video Device Drivers .................................. 31
Video Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Using System-Management Features ........................... 32
System Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Updating the System BIOS ................................. 33
Flash ROM Recovery Procedure ............................ 34
Using a CD-ROM Drive .................................. 35
Handling a CD ...................................... 35
Loading a CD ....................................... 36
Using Security Features .................................. 38
Chapter 4. Configuring Your Computer ........................ 39
Starting the Configuration/Setup Utility Program ................... 40
Viewing and Changing Settings in the Configuration/Setup Utility Program .. 41
Exiting from the Configuration/Setup Utility Program ................ 43
Viewing the System Summary .............................. 44
Setting the Date and Time ................................. 45
System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Secure IDE Devices and Diskette Drives ....................... 45
Diskette Write Protect .................................. 45
POST/BIOS Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Adapter ROM Security ................................. 46
Power-On and Administrator Passwords ........................ 46
Power-On Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Setting and Changing a Power-On Password .................... 48
Administrator Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Power Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53
iv Using Your Personal Computer
Power Management Features .............................. 53
Automatic Power-On Features ............................. 54
Automatic Configuration and Power Interface (ACPI) BIOS Mode ....... 55
POST/BIOS Update over the Network ........................ 57
Chapter 5. Taking Care of Your Computer ...................... 59
Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Cleaning Your Computer ................................. 59
Computer and Keyboard ................................ 59
Monitor Screen . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Mouse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Replacing the Battery .................................... 61
Moving Your Computer .................................. 61
Chapter 6. Solving Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Using Diagnostic Tools ................................... 63
Power-On Self-Test (POST) ............................... 64
Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
POST Message Charts .................................. 69
Troubleshooting Charts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Diagnostic Programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
IBM Enhanced Diagnostics ............................... 97
PC-Doctor for Windows ................................. 98
PC-Doctor for Windows NT .............................. 99
CoSession Remote . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Installing Files from Option Diskettes .......................... 99
Managing TSR Programs (DOS or Microsoft Windows 3.1x) ........... 100
Chapter 7. Getting Help, Service, and Information ................ 101
Hardware Warranty Summary ............................. 101
Before You Call for Service ............................... 102
Getting Customer Support and Service ........................ 102
Using Electronic Support Services .......................... 103
Using the World Wide Web ............................. 104
Getting Information by Fax .............................. 104
Getting Help Online .................................. 104
Getting Help by Telephone .............................. 105
Getting Help Around the World .......................... 106
Purchasing Additional Services ............................. 106
Enhanced PC Support Line .............................. 106
900-Number Operating System and Hardware Support Line ......... 107
Network and Server Support Line ......................... 107
Ordering Support Line Services ........................... 107
Contents v
Warranty and Repair Services ............................ 108
Ordering Publications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Appendix A. Computer Records . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Serial Numbers and Keys ................................ 109
Device Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Appendix B. Product Warranties, License Information, and Notices ..... 113
Hardware Limited Warranty .............................. 113
License Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Program Name . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Additional Terms and Conditions .......................... 116
Program Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Warranty . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
U.S. Government Users Restricted Rights ..................... 117
Other Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Other Additional Terms and Conditions ...................... 117
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Trademarks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Electronic Emission Notices ............................. 119
Telecommunication Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Power Cord Notice ................................... 123
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
vi Using Your Personal Computer
Safety Information
DANGER:
Electrical current from power, telephone, and communication cables is hazardous. To avoid shock hazard, connect and disconnect cables as shown below when installing, moving or opening the covers of this product or attached devices. The power cord must be used with a properly grounded outlet.
To Connect
Turn everything OFF.
To Disconnect
Turn everything OFF.
First, attach all cables to devices.
Attach signal cables to receptacles.
Attach power cord to outlet.
Turn device ON.
12
In the U.K., by law, the telephone cable must be connected after the power cord.
1
First, remove power cord from
2
outlet.
Remove signal cables from receptacles.
Remove all cables from devices.
In the U.K., by law, the power cord must be disconnected after the telephone line cable.
Copyright IBM Corp. 1998 vii
Laser Compliance Statement
Some IBM Personal Computer models are equipped from the factory with a CD-ROM drive. CD-ROM drives are also sold separately as options. The CD-ROM drive is a laser product. The CD-ROM drive is certified in the U.S. to conform to the requirements of the Department of Health and Human Services 21 Code of Federal Regulations (DHHS 21 CFR) Subchapter J for Class 1 laser products. Elsewhere, the drive is certified to conform to the requirements of the International Electrotechnical Commission (IEC) 825 and CENELEC EN 60 825 for Class 1 laser products.
When a CD-ROM drive is installed, note the following.
CAUTION: Use of controls or adjustments or performance of procedures other than those specified herein might result in hazardous radiation exposure.
Opening the CD-ROM drive could result in exposure to hazardous laser radiation. There are no serviceable parts inside the CD-ROM drive. Do not open.
Some CD-ROM drives contain an embedded Class 3A or Class 3B laser diode. Note the following.
DANGER
Laser radiation when open. Do not stare into the beam, do not view directly with optical instruments, and avoid direct exposure to the beam.
viii Using Your Personal Computer
Lithium Battery Notice
CAUTION: Danger of explosion if battery is incorrectly replaced.
When replacing the battery, use only IBM Part Number 33F8354 or an equivalent type battery recommended by the manufacturer. The battery contains lithium and can explode if not properly used, handled, or disposed of.
Do not:
Throw or immerse into waterHeat to more than 100°C (212°F)Repair or disassemble
Dispose of the battery as required by local ordinances or regulations.
ATTENTION Danger d'explosion en cas de remplacement incorrect de la batterie.
Remplacer uniquement par une batterie IBM de type 33F8354 ou d'un type équivalent recommandé par le fabricant. La batterie contient du lithium et peut exploser en cas de mauvaise utilisation, de mauvaise manipulation ou de mise au rebut inappropriée.
Ne pas :
Lancer ou plonger dans l'eauChauffer à plus de 100°C (212°F)Réparer ou désassembler
Mettre au rebut les batteries usagées conformément aux règlements locaux.
Safety Information ix
x Using Your Personal Computer
About This Book
This book will help you become familiar with your IBM Personal Computer and its many features. It describes how to configure, operate, and maintain your PC. In the unlikely event you experience problems, you will also find helpful troubleshooting information, as well as instructions for obtaining service.
The book is organized as follows:
Chapter 1, "Your IBM Personal Computer," contains an overview of the features
of your PC.
Chapter 2, "Arranging Your Workspace," contains information about setting up
your work area to optimize use of your computer. Safety considerations are also discussed.
Chapter 3, "Operating Your Computer," contains instructions for the day-to-day
use of your computer. Startup and shutdown procedures, as well as information on using audio, video, system-management, and security features are included in this chapter.
Chapter 4, "Configuring Your Computer," contains instructions for using the
Configuration/Setup Utility Program.
Chapter 5, "Taking Care of Your Computer," contains information about the
proper handling and care of your PC.
Chapter 6, "Solving Problems," contains information that will help you identify
and correct problems that might arise as you use your computer.
Chapter 7, "Getting Help, Service, and Information," contains a description of
the wide variety of resources available from IBM to assist you in the use of your PC. This chapter also describes how to obtain additional information about IBM products.
Appendix A, "Computer Records," contains forms for recording information
about your PC, which can be helpful if you decide to install any additional options, or if you ever need to have your PC serviced.
Appendix B, "Product Warranties, License Information, and Notices," contains
warranty and license information for your computer, as well as legal notices and trademark information.
Copyright IBM Corp. 1998 xi
Related Publications
The following publications, together with this book, contain information about your computer.
Setting Up Your Personal Computer
This publication contains instructions to help you set up your computer.
Installing Options in Your Personal Computer
This publication contains instructions for adding memory, adapters, drives, and other options to your computer.
Understanding Your Personal Computer
This online publication (provided only with computers that have IBM-preinstalled software) includes general information about using personal computers and in-depth information about the specific features of your PC.
About Your Software
This publication (provided only with computers that have IBM-preinstalled software) contains information about the preinstalled software package.
Your Ready-to-Configure Utility Program CD
This publication contains information about the Ready-to-Configure Utility Program CD for your computer. The publication also contains instructions for
starting the CD.
The following publications contain more information about your computer.
Hardware Maintenance Manual
This separately purchased publication contains information for trained service technicians. To obtain a copy, refer to “Ordering Publications” on page 108. It is also available on the World Wide Web at
http://www.us.pc.ibm.com/cdt/hmm.html.
Technical Information Manual
This publication is available on the World Wide Web only at http://www.us.pc.ibm.com/support/desktop_support.html. It contains more information about the technical aspects of your computer.
xii Using Your Personal Computer
Chapter 1. Your IBM Personal Computer
Thank you for selecting an IBM Personal Computer. Your PC incorporates many of the latest advances in personal computer technology and is easy to expand and upgrade as your needs change. With its enhanced video and system-management capabilities, your computer is particularly suited for your corporate intranet environment.
1
1
An intranet is a private network that conforms to the same protocols as the Internet, but is contained within an organization. The intranet contains one or more servers that provide services to the workstations on the private network. Some intranets are also connected to the Internet.
Copyright IBM Corp. 1998
1
Identifying Your Computer
In most instances, the best way to identify your computer is by the machine type/model number. The model/type number indicates the various features of the computer, such as the type of microprocessor or the number of bays. You can find this number on the small label on the front of your computer. An example of a machine type/model number is 6282-54A.
You also need to know whether the computer is a desktop or tower. The desktop model can be set on its side in a floor stand, but the orientation of the drives will be vertical in that position, rather than horizontal. Towers and desktops used in their normal orientations have horizontal drive bays.
Throughout this book, your computer is identified as either a desktop model or a tower model. These naming conventions are used only where it is appropriate. Instructions without these naming conventions apply to both computer models.
Desktop Model
The desktop model comes with four bays and four expansion slots. This computer has a hard disk drive in bay 3 and a diskette drive in bay 4. If your computer has a CD-ROM drive, it is installed in bay 1. Bay two can accept a hard disk drive which does not have accessible media.
2 Using Your Personal Computer
Tower Model
The tower model comes with six bays and six expansion slots. This computer has a hard disk drive in bay 6 and a diskette drive in bay 4. If your computer has a CD-ROM drive, it is installed in bay 1. Bays two, three and five can accept hard disk drives which do not have accessible media.
Chapter 1. Your IBM Personal Computer 3
What Your IBM Personal Computer Offers
This section describes many of the features of your computer.
Microprocessor
At the core of your PC is an Intel Pentium II processor. With its advanced performance features, this MMX microprocessor supplies the speed and power you need to take advantage of even the most complex programs. In addition, the microprocessor incorporates new multimedia extensions into the Intel architecture, which improves the performance of multimedia and communications applications by accelerating calculations commonly performed for audio, video, speech synthesis and recognition, 2D and 3D graphics, and data communications.
System Memory
Your computer comes standard with non-parity or ECC (error correcting code) SDRAM (synchronous dynamic random access memory).
L2 Cache
L2 cache memory, which helps speed the exchange of information between the microprocessor and system memory, is integrated on the Pentium II processor in most models.
ISA Bus
Your PC has an ISA (industry standard architecture) bus, which is one of the most widely used and successful I/O (input/output) buses available. The ISA bus is popular because so many adapters and devices have been designed and marketed for it.
PCI Bus
Your computer also has a PCI (peripheral component interconnect) bus. PCI is one of the advanced I/O bus standards recently developed by the computer industry to keep up with performance improvements of microprocessor buses and advanced peripheral devices. The PCI bus adds to the capability of the ISA bus, speeding up the exchange of information among the microprocessor and peripheral devices within your computer system. This improves the overall performance of your computer, including the hard disk drive.
4 Using Your Personal Computer
AGP Bus
Your computer also has an integrated AGP Cirrus 5465 3-D SVGA (super video graphics array) bus. AGP is a state-of-the-art enhanced performance video bus for the integrated video controller, which provides a PC-like interface with performance extensions added specifically for video functions.
Expansion with Adapters
By installing optional adapters, you can expand the capabilities of your computer and take advantage of a variety of peripheral devices and applications. Your computer has a riser card for connecting adapters to the ISA or PCI bus. Examples of adapters that can be added to your computer include graphics, SCSI (small computer system interface), and NIC (network interface controller) adapters.
High-Capacity Hard Disk Drives
Some PC models come with a hard disk drive that has an enhanced integrated drive electronics (EIDE) bus-master interface. The EIDE drive plugs into one of two EIDE connectors located on the riser card in your computer. You can connect an additional hard disk drive to the ribbon cable already attached to the riser card, or you can purchase another cable and connect up to two hard disk drives or other IDE or EIDE devices to the second connector on the riser card.
Notes:
1. In the desktop model, a maximum of three internal IDE or EIDE devices can be installed—limited by the number of available bays.
2. For models with an IBM factory-installed CD-ROM, two ribbon cables (for connecting IDE or EIDE devices) are shipped with your computer.
CD-ROM Drive
A CD-ROM drive is installed in some PC models. CD-ROM (compact disc read-only memory) technology offers quick access to enormous amounts of information. A compact disc can store more than 650 MB of data, such as the large files needed for audio, still and full-motion video, and still and animated graphics. A CD-ROM drive can play back or read from a CD, but it cannot write information on it.
ECP/EPP Parallel Port
Your PC has one 25-pin parallel port. The parallel port is most often used to communicate with a parallel printer, but it can also be used with other parallel
Chapter 1. Your IBM Personal Computer 5
devices. To minimize electromagnetic interference (EMI), use braid-shielded cables with metal ends when connecting a device to this port.
The parallel port can operate in several different modes. The default mode for your computer is SPP (standard parallel port). However, your computer also supports the ECP/EPP (extended capabilities port/enhanced parallel port) mode. ECP/EPP has two advantages over SPP. When your computer is in ECP/EPP mode, you can print documents faster than when the computer is in SPP mode, and you can attach devices other than printers, such as communication and storage devices, to the parallel port. You can set modes of operation for the parallel port using the Configuration/Setup Utility Program.
Serial Ports
Your computer has two standard 9-pin, 16550-UART serial ports that can be used to communicate with devices such as modems, plotters, and printers. To minimize electromagnetic interference (EMI), use braid-shielded cables with metal ends when connecting devices to these ports.
Universal Serial Bus Ports
The universal serial bus (USB) interface is a new, emerging technology being developed to add more diversity and capabilities to personal computers. IBM has provided two, 4-pin USB connectors in your computer as a standard feature so you can be ready to take advantage of new USB devices as they become available.
Using this new technology, you will be able to plug many different types of optional, USB-compatible devices into the USB ports on your computer. Because USB incorporates Plug and Play technology, you can install and remove devices easily without turning off your computer or opening the cover. Once installed, the devices configure automatically.
In addition, an option called a hub can be connected to a USB port on your computer, which enables you to plug in more than one device at a time. A hub converts a single USB connector into multiple ports where USB devices can be attached.
For more information, see the USB Web site (http://www.usb.org). For USB drivers, see the Microsoft Web site (http://www.microsoft.com/support).
6 Using Your Personal Computer
Integrated Video Graphics Controller
The system board of your computer contains a high-performance, high-resolution, integrated AGP Cirrus 5465 3-D SVGA (super video graphics array) controller with 2 MB RAMBUS video memory.
Audio Adapter (Optional)
The stereo audio adapter card available for your computer provides all the digital audio and analog mixing functions required for recording and playing high-quality sound on your PC. The controller supports Sound Blaster Pro, Adlib, and Microsoft Windows Sound System applications.
Ethernet Adapter (Optional)
The Ethernet adapter card available for your computer has an Intel 10/100 Mbit, PCI Ethernet controller and an RJ-45 connector that provide a high-performance network connection.
Token Ring Adapter (Optional)
The token ring adapter card available for your computer is a PCI controller which has a 32-bit busmaster and either an RJ45 or a nine-pin D-shell connector, which provides a high-performance network connection. Token ring device drivers are provided on the Ready-to-Configure Utility Program CD for your computer. If your computer has IBM-preinstalled software, the device drivers are already installed on the hard disk. For instructions on connecting a network cable to your PC, refer to Setting Up Your Personal Computer.
System-Management Features
If you have a token ring adapter or an Ethernet adapter preinstalled, your computer has features that make it possible for a network administrator to manage and control your computer remotely over a network from a management console. These features are:
Enablement for LANClient Control Manager softwareRPL (Remote Program Load) and DHCP (Dynamic Host Configuration Protocol)Enablement for integrated Wake on LANAutomatic Power-On Startup SequenceEnablement for POST/BIOS updates over a network with an optional NIC
adapter
DMI (Desktop Management Interface) BIOS and DMI software
Chapter 1. Your IBM Personal Computer 7
For information on these features, refer to “Using System-Management Features” on page 32.
IBM-Preinstalled Software
IBM-preinstalled software is provided with some PC models. This software includes an operating system, device drivers to support built-in features, and other support programs. Detailed information about this software is included in About Your Software, which is included with the preinstallation package.
Operating-System Support
Your computer is designed to use a variety of operating systems in order to meet your particular needs. See page 19 for a list of operating systems that you can use with your PC.
Ease-of-Use Features
Your computer has many features that make it easy to work with, including a state-of-the-art system board, Plug and Play technology, and easy-to-use diagnostic programs.
The system board in your computer makes upgrading and servicing your PC easier. Cable connections for standard devices are located on the riser card. This arrangement helps to eliminate cable tangle and clutter on the system board, allows shorter cables, and makes it easier to remove the system board or to upgrade peripherals. In addition, the system board is on a sliding mechanism so that you can slide the system board in and out of the computer frame.
Support for Plug and Play technology is built into the system board of your PC. This feature makes adding options easier. When you add an adapter that is Plug and Play-compatible, the adapter is configured automatically. In most cases, no switches or jumpers have to be set on the adapter.
If you have a problem with your PC, IBM provides an easy-to-use diagnostic program (PC Doctor) that you can run to help determine if a hardware component is causing the problem. You can create a startable PC Doctor diskette for your computer from the download or the Ready-to-Configure Utility Program CD. In addition, operating system-specific diagnostic programs (and PC Doctor) are included on the Ready-to-Configure Utility Program CD for your computer.
8 Using Your Personal Computer
Ergonomic Features
Your PC has ergonomic features that make it more comfortable to use. The power switch and indicator lights are located for easy access and visibility. In addition, you can easily change monitor settings to reduce or eliminate flicker and jitter, and you can adjust the angle of the keyboard to make typing more comfortable.
Advanced Power Management
Energy conservation is an important concern. Your computer has Advanced Power Management (APM) and Advanced Configuration and Power Interface (ACPI) features that allow you to set different levels of energy conservation for specific components of your computer. You can view and change APM and ACPI settings using the Configuration/Setup Utility Program or the Windows 95 control panel.
Asset Security Features
Your PC has the following security features that help protect both your hardware and software:
Power-on and administrator password protection
Startup-sequence control
Hard disk drive and diskette drive access controlI/O port controlAsset information protectionEnablement for updating the POST/BIOS over the networkCover lock (in some models)U-bolt and security cabling (optional)Operating system securityDiskette write protection
Service and Support
You can obtain assistance for using your computer, as well as service, from a number of sources. Help is available on the World Wide Web and by phone, fax, and modem. For detailed information, see Chapter 7, “Getting Help, Service, and Information” on page 101.
Expandability
You can easily expand the capabilities of your computer by adding memory, drives, or adapters.
Chapter 1. Your IBM Personal Computer 9
Desktop Model Drive Bays: Your computer has four drive bays. Unoccupied
drive bays can be used for installing additional devices such as hard disk and CD-ROM drives.
The following illustration shows the drive bays in your computer.
5.25-Inch CD-ROM Drive (Standard
3.5-Inch Diskette Drive
in some models)
5.25-Inch Bay for Optional Drive
3.5-Inch Bay
10 Using Your Personal Computer
Tower Model Drive Bays: Your computer has six drive bays. Unoccupied drive
bays can be used for installing additional devices such as hard disk and CD-ROM drives. The following illustration shows the drive bays in your computer.
5.25-Inch CD-ROM Drive (Standard in some models)
5.25-Inch Bay for Optional Drive
3.5-Inch Bay
Socket7
Socket7
3.5-Inch Bay for Optional Drive
3.5-Inch Diskette Drive
Desktop Model Expansion Slots: Your computer has four expansion slots.
One or more of these slots might be occupied, depending on the model of your PC. Unoccupied slots can be used for installing adapters. The following illustration shows the locations of the expansion slots.
Chapter 1. Your IBM Personal Computer 11
Expansion Slots
Tower Model Expansion Slots: Your computer has six expansion slots. One or
more of these slots might be occupied, depending on the model of your PC. Unoccupied slots can be used for installing adapters. The following illustration shows the locations of the expansion slots.
Expansion Slots
12 Using Your Personal Computer
Desktop Model Connectivity
The following illustration shows the location of the external connectors on the rear of your computer.
USB 1
USB 2
Chapter 1. Your IBM Personal Computer 13
1 2
Mouse
Keyboard
Serial 2
2 1
Serial 1
Parallel
Monitor
Tower Model Connectivity
The following illustration shows the location of the external connectors on the rear of your computer.
USB 1 USB 2 Mouse
Keyboard
Serial 2
Serial 1
Monitor
1
2
2 1
Parallel
14 Using Your Personal Computer
Keyboard Extender
Your computer comes with an aesthetic keyboard extender. To attach it, align the extender with the bottom edge of the keyboard and snap them together, as shown below.
Chapter 1. Your IBM Personal Computer 15
Features at a Glance
The following information covers a variety of PC models. Some of the features listed apply to specific models only. For a listing of features for your specific model, refer to the System Summary screen in the Configuration/Setup Utility Program. For instructions on gaining access to the Configuration/Setup Utility Program and the System Summary screen, refer to “Viewing the System Summary” on page 44.
Microprocessor
Intel Pentium II processor with MMX technology
Memory
Installed: SDRAM, non-parity or ECC (error correcting code) DIMMsMaximum addressable: 256 MB (use only industry-standard, gold lead, 3.3 V,
unbuffered, DRAM DIMMs)
Two 168-pin DIMM socketsFlash memory for system programs
Level 2 Cache
Integrated in Intel Pentium II processor
Diskette Drives
Installed: One 3.5-inch, 1.44 MB
Internal Hard Disk Drives
Standard: One EIDE
PCI EIDE bus-masterMaximum IDE or EIDE devices: Four total
16 Using Your Personal Computer
CD-ROM Drive
One IDE CD-ROM drive (standard in some models)
Input/Output Features
One 25-pin, ECP/EPP parallel portTwo 9-pin, serial portsTwo 4-pin, USB ports
Mouse port
Keyboard port (Windows 95-compatible)One 15-pin, DDC2B-compliant monitor port
Video Controller
Integrated AGP Cirrus 5465 3-D SVGA (super video graphics array) controller
with 2 MB RAMBUS video memory
Audio Adapter (optional)
Audio adapter that supports Adlib, and Microsoft Windows Sound System
applications
Network Adapter (optional)
IBM 10/100 Mbit, PCI Ethernet adapter with Wake on LANIBM PCI Token Ring adapter with Wake on LAN
System Management
Enablement for LANClient Control Manager softwareRPL (Remote Program Load) and DHCP (Dynamic Host Configuration Protocol)Enablement for integrated Wake on LANAutomatic Power-On Startup SequenceEnablement for POST/BIOS updates over a networkDMI (Desktop Management Interface) BIOS and DMI software
Chapter 1. Your IBM Personal Computer 17
Expansion, Desktop Model
Four drive bays total—unoccupied bays can be used for installing additional
internal devices, such as a second hard disk drive.
Four expansion slots total (one ISA, two PCI, and one shared
ISA/PCI)—unoccupied slots can be used for installing optional adapters.
PCI/ISA Plug and Play adapter support.
Expansion, Tower Model
Six drive bays total—unoccupied bays can be used for installing additional
internal devices, such as a second hard disk drive.
Six expansion slots total (three ISA and three PCI) unoccupied slots can be used
for installing optional adapters.
PCI/ISA Plug and Play adapter support.
Power
Desktop model has 145 W, 115/230 V ac, 50/60 HzTower model has 200 W, 115/230 V ac, 50/60 HzBuilt-in overload and surge protectionAdvanced Power Management (APM)Advanced Computer Configuration Power Interface (ACPI)
Asset Security
Power-on and administrator passwordsStartup sequence controlUpdate POST/BIOS over networkStartup without keyboard, diskette drive, or mouseHard disk drive and diskette drive access controlI/O port control to disable input and output functions of the serial and parallel
ports and their attached devices
Diskette write protection (prevents the diskette drive from writing to diskettes)Cover keylock (on some models)Software-readable hardware identification dataSystem bolt-down support
18 Using Your Personal Computer
Operating Systems (Supported)
IBM OS/2 Warp Version 4.0Microsoft Windows 95Microsoft Windows NT Workstation Version 4.0
Operating Systems (Tested for Compatability)
2
IBM OS/2 Warp Version 3.0 with DOS and Windows application supportIBM OS/2 Warp Connect Version 3.0 with DOS and Windows application
support
IBM PC DOS Version 7.0MS DOS Version 6.22Microsoft Windows for Workgroups Version 3.11Microsoft Windows NT Version 3.51
IBM-Preinstalled Software
Preinstalled in some PC models are an operating system, device drivers to support built-in features, and other support programs. See About Your Software for a detailed description of the preinstallation package.
2
IBM has identified the operating systems listed here as the ones it has tested or intends to test for compatibility. It is possible, however, that IBM's testing may not be complete for some of these operating systems at the time this publication goes to press. Also, additional operating systems might be identified by IBM as compatible with your computer following the publication of this booklet. Corrections and additions to the list are available in IBM's online compatibility report, which can be found on the World Wide Web (http://www.us.pc.ibm.com/cdt/). For additional information, see Chapter 7, “Getting Help, Service, and Information” on page 101.
Chapter 1. Your IBM Personal Computer
19
Desktop Model System Specifications
Size
Depth: 450 mm (17.7 in.)Height: 128 mm (5.0 in.)Width: 450 mm (17.7 in.)
Weight
Minimum configuration as shipped: 9.9 kg (22 lb)Maximum configuration: 11.3 kg (25 lb)
Environment
Air temperature:
– System on: 10° to 32°C (50° to 90°F) – System off: 10° to 43°C (50° to 110°F)
Humidity:
– System on: 8% to 80% – System off: 8% to 80%
Maximum altitude: 2134 m (7000 ft)
Heat Output
Approximate heat output in British thermal units (Btu) per hour:
– Minimum configuration: 170 Btu (50 watts) – Maximum configuration: 700 Btu (204 watts)
Electrical Input
Sine-wave input (50 to 60 Hz) is required
Input voltage:
– Low range:
- Minimum: 90 V ac
- Maximum: 137 V ac
- Voltage switch setting: 115 or 115 V
– High range:
- Minimum: 180 V ac
- Maximum: 265 V ac
- Voltage switch setting: 230 or 230 V
– Input kilovolt-amperes (kVA) (approximately):
- Minimum configuration as shipped: 0.11 kVA
- Maximum configuration: 0.52 kVA
20 Using Your Personal Computer
Power consumption and heat output vary depending on the number and type of optional features installed and the power-management optional features in use.
Airflow
Approximately 0.56 cubic meters per minute (20 cubic feet per minute)
Acoustical Noise-Emission Values
Average sound-pressure levels:
– At operator position:
- 34 dBA idle
- 38 dBA operating
– At bystander position–1 meter (3.3 ft):
- 28 dBA idle
- 33 dBA operating
Declared (upper limit) sound power levels:
– 4.6 bels idle – 4.9 bels operating
These levels were measured in controlled acoustical environments according to procedures specified by the American National Standards Institute (ANSI) S12.10 and ISO 7779, and are reported in accordance with ISO 9296.
Actual sound-pressure levels in your location might exceed the average values stated because of room reflections and other nearby noise sources. The declared sound power levels indicate an upper limit, below which a large number of computers will operate.
Chapter 1. Your IBM Personal Computer 21
Tower Model System Specifications
Size
Depth: 445 mm (17.5 in.)Height: 492 mm (19.4 in.)Width: 200 mm (7.9 in.)
Weight
Minimum configuration as shipped: 15 kg (33 lb)Maximum configuration: 17.3 kg (38 lb)
Environment
Air temperature:
– System on: 10° to 35°C (50° to 95°F) – System off: 10° to 43°C (50° to 110°F)
Humidity:
– System on: 8% to 80% – System off: 8% to 80%
Maximum altitude: 2134 m (7000 ft)
Heat Output
Approximate heat output in British thermal units (Btu) per hour:
– Minimum configuration: 170 Btu (50 watts) – Maximum configuration: 969 Btu (285 watts)
Electrical Input
Sine-wave input (50 to 60 Hz) is required
Input voltage:
– Low range:
- Minimum: 90 V ac
- Maximum: 137 V ac
- Voltage switch setting: 115 or 115 V
– High range:
- Minimum: 180 V ac
- Maximum: 265 V ac
- Voltage switch setting: 230 or 230 V
– Input kilovolt-amperes (kVA) (approximately):
- Minimum configuration as shipped: 0.11 kVA
- Maximum configuration: 0.7 kVA
22 Using Your Personal Computer
Power consumption and heat output vary depending on the number and type of optional features installed and the power-management optional features in use.
Airflow
Approximately 0.57 cubic meters per minute (20 cubic feet per minute)
Acoustical Noise-Emission Values
Average sound-pressure levels:
– At operator position:
- 34 dBA idle
- 36 dBA operating
– At bystander position–1 meter (3.3 ft):
- 29 dBA idle
- 32 dBA operating
Declared (upper limit) sound power levels:
– 4.6 bels idle – 4.8 bels operating
These levels were measured in controlled acoustical environments according to procedures specified by the American National Standards Institute (ANSI) S12.10 and ISO 7779, and are reported in accordance with ISO 9296.
Actual sound-pressure levels in your location might exceed the average values stated because of room reflections and other nearby noise sources. The declared sound power levels indicate an upper limit, below which a large number of computers will operate.
Chapter 1. Your IBM Personal Computer 23
24 Using Your Personal Computer
Chapter 2. Arranging Your Workspace
To get the most from your computer, arrange both the equipment you use and your work area to suit your needs and the kind of work you do. Your comfort is of foremost importance, but light sources, air circulation, and the location of electrical outlets also can affect the way you arrange your workspace.
Comfort
Although no single working position is ideal for everyone, here are a few guidelines to help you find a position that suits you best.
Sitting in the same position for a long time causes fatigue. A good chair can make a big difference. The backrest and seat should adjust independently and provide good support. The seat should have a curved front to relieve pressure on the thighs. Adjust the seat so that your thighs are parallel to the floor and your feet are either flat on the floor or on a footrest.
When using the keyboard, keep your forearms parallel to the floor and your wrists in a neutral, comfortable position. Try to keep a light touch on the keyboard and your hands and fingers relaxed. You can change the angle of the keyboard for maximum comfort by adjusting the position of the keyboard feet.
Adjust the monitor so the top of the screen is at, or slightly below, eye level. Place the monitor at a comfortable viewing distance, usually 51 to 61 cm (20 to 24 in.), and position it so you can view it without having to twist your body.
Copyright IBM Corp. 1998 25
Lower Back Support
Seat Height
Viewing Distance
Glare and Lighting
Position the monitor to minimize glare and reflections from overhead lights, windows, and other light sources. Place the monitor at right angles to windows and other light sources, when possible. Reduce overhead lighting, if necessary, by turning off lights or using lower wattage bulbs. If you install the monitor near a window, use curtains or blinds to block the sunlight. You might have to adjust the Brightness and Contrast controls on the monitor as the room lighting changes throughout the day.
Where it is impossible to avoid reflections or to adjust the lighting, an antiglare filter placed over the screen might be helpful. However, these filters might affect the clarity of the image on the screen; try them only after you have exhausted other methods of reducing glare.
Dust buildup compounds problems associated with glare. Remember to clean your monitor screen periodically using a soft cloth moistened with a nonabrasive liquid glass cleaner.
Air Circulation
Your computer and monitor produce heat. The computer has a fan that pulls in fresh air and forces out hot air. The monitor lets hot air escape through vents. Blocking the air vents can cause overheating, which might result in a malfunction or damage. Place the computer and monitor so that nothing blocks the air vents; usually, 51 mm (2 in.) of air space is sufficient. Also, make sure the vented air is not blowing on someone else.
Electrical Outlets and Cable Lengths
The location of electrical outlets and the length of power cords and cables that connect to the monitor, printer, and other devices might determine the final placement of your computer.
When arranging your workspace:
Avoid the use of extension cords. When possible, plug the computer power
cord directly into an electrical outlet.
Keep power cords and cables neatly routed away from walkways and other
areas where they might get kicked accidentally.
For more information about power cords, see “Power Cord Notice” on page 123.
26 Using Your Personal Computer
Chapter 3. Operating Your Personal Computer
This chapter provides information to help you in the day-to-day use of your computer. It includes instructions for starting and shutting down your PC, as well as information on using audio, video, system-management, and security features.
Using Controls and Status Indicators
The following operating controls and status indicators are located on the front of your computer.
Power Switch: Press this switch to turn your computer on or off. Do not turn off
your computer if the in-use light for the hard disk drive or diskette drive is on.
Power-On Light: This status indicator lights when you turn on your computer. Hard-Disk Drive Light: When this light is on, it indicates that the hard disk drive
heads are being positioned or that your computer is reading from or writing to the hard disk.
Diskette-Drive Light: When this light is on, it indicates that the diskette drive heads
are being positioned or that your computer is reading from or writing to a diskette.
Diskette Eject Button: Push this button to release a diskette from the drive. Client (Workstation) LAN Light: This feature is not used in these models. This light
will never be activated, even though a LAN adapter may be installed in the computer.
Power Switch
Power-On Light
Hard-Disk
Drive Light
Client
(Workstation)
LAN Light
Copyright IBM Corp. 1998 27
Diskette Drive Light
Diskette Eject Button
Power Switch
Power-On Light
Hard-Disk Drive Light
Client (Workstation) LAN Light
Diskette Eject Button
Diskette
Socket7
Socket7
Drive Light
Starting Your Computer
What you see and hear when you start up your computer depends upon the settings in the Start Options menu of the Configuration/Setup Utility Program. The default settings are Power On Status [Disabled] and Power On Self Test [Quick].
Note: There are other selections that might also change what is displayed. The following briefly describes what you see in the default mode when you turn on
your computer:
The IBM logo appearsPress F1 for Configuration/Setup prompt appears
– If any errors were detected during POST, they are displayed.
If you have set a power-on password, a prompt appears on the screen. If you
have set both power-on and administrator passwords, you can type either password at the password prompt. (Refer to “System Security” on page 45 for instructions on setting and using passwords.) Type your password at the prompt and press Enter.
The first screen of your operating system or application program appears.
If Power On Status is [Enabled], and POST finishes without detecting a problem, you hear one beep. If POST detects a problem when you start your computer, you hear multiple beeps or no beep. In most cases, an error code appears in the top-left corner of the screen, and in some cases a description of the error is displayed beside the code. (Note that the screen will sometimes display multiple error codes and
28 Using Your Personal Computer
descriptions.) Write down all error code numbers and descriptions. For information on what caused an error message to appear and what action to take, refer to “Solving POST Error Message Problems” on page 66 and “POST Message Charts” on page 69.
If Power On Self Test is [Enhanced], information about memory configuration and test results are shown in the upper left corner. Prompts for running a fast POST or accessing the Configuration/Setup Utility Program appear in the lower-left corner of the screen.
Using a Mouse
A mouse is a device that you use to point to and select objects on the monitor screen. It connects to your computer by a cable. Some mouse devices are designed for the round mouse connector on the back of your PC; other mouse devices are designed for the D-shaped serial connector. You can use either type of mouse, if the correct software (device driver) is installed.
With a mouse, you can move the pointer on the monitor screen. If you have never used a mouse before, it might feel a bit awkward at first. However, with a little practice, the mouse movements will seem natural.
Place the mouse beside the keyboard on a flat surface or mouse pad. (A mouse pad is a flat, smooth, foam-rubber pad available at most computer stores.) The mouse has a ball on the bottom, so working on a flat, smooth surface is important. You can use your right or left hand to control the mouse.
Notice that the mouse has two buttons on the top (some mice have more buttons). Rest your hand comfortably on the mouse with your index finger on the left button (if you are using your right hand). Some programs and operating systems provide an option to set up the mouse for left-hand use. When a mouse is set up for left-hand use, the button functions are reversed.
Use the left button to select and open objects with the mouse. Some programs also use the right button. The use of the right mouse button varies.
To use the mouse, slide it from side to side and forward and backward on a flat surface. The pointer on the monitor screen moves as you move the mouse. When you see an item that you want to select on the screen, you simply move the pointer to that item (this is called pointing). Then you press and release the left button on the mouse (this is called clicking).
To learn how to use the mouse with the software in your computer, see the documentation accompanying the software.
Chapter 3. Operating Your Personal Computer 29
Some programs support only one mouse button, others support two, and some support three. Despite the differences, some terms are fairly standard throughout the industry.
Point Move the mouse so the pointer is on the object you want. Click Press and release the mouse button once. Double-click Rapidly press and release the mouse button twice. Drag Point to an object, press the mouse button, and hold it down as you
move the mouse to relocate the object.
Drop After dragging an object to a new location, release the mouse button.
Shutting Down
When you are ready to turn off your computer, follow the shutdown procedure for your operating system to prevent the loss of unsaved data or damage to your software programs. See your operating-system documentation for instructions.
Using Video Features
Your computer has an integrated AGP Cirrus 5465 3-D SVGA (super video graphics array) controller. SVGA is a video standard for displaying text and graphic images on a monitor screen. Like other video standards, SVGA supports a variety of video modes. Video modes are different combinations of resolution, refresh rate, and color depth defined by a video standard for displaying text or graphics. (For further information on video modes, refer to Understanding Your Personal Computer.)
SVGA provides higher-resolution graphics, faster refresh rates, and more colors than previous video standards, such as video graphics array (VGA). At the same time, SVGA supports all standard VGA modes.
To get the best possible image on your screen and to reduce flicker, you might need to reset the resolution and refresh rate of your monitor. You can view and change monitor settings through your operating system. Instructions for doing this are included in a README file that is provided on the Ready-to-Configure Utility Program CD for your computer.
Refer to your operating-system documentation for further information on monitor settings.
30 Using Your Personal Computer
Attention
Before you change any monitor settings, be sure to review the information that comes with your monitor. Using a resolution or refresh rate that is not supported by your monitor might cause the screen to become unreadable and damage the monitor. The information that comes with your monitor usually includes the resolutions and refresh rates that the monitor supports. If you need additional information, contact the manufacturer of the monitor.
To minimize screen flicker and jitter, set your monitor for the highest noninterlaced refresh rate that the monitor supports. If your monitor complies with the VESA Display Data Channel (DDC) standard, it is probably already set to the highest refresh rate that the monitor and video controller can support. If you are not sure if your monitor is DDC-compliant, refer to the documentation provided with the monitor.
Video Device Drivers
To take full advantage of the video controller in your computer, some operating systems and application programs require custom software, known as video device drivers. These device drivers provide support for greater speed, higher resolution, more available colors, and flicker-free images.
The video device drivers are provided on the Ready-to-ConfigureUtility Program CD for your computer. Instructions for installing the device drivers are provided on the Ready-to-Configure Utility Program CD in the README file that corresponds to your operating system. IBM also maintains the latest versions of video device drivers for all IBM-manufactured computers on the World Wide Web.
If your computer has IBM-preinstalled software, video device drivers have already been installed on the hard disk in your PC. However, the device driver installation instructions in the README file will be helpful if you ever need to reinstall the device drivers; if you want to change video resolution, color depth, or monitor settings; or if you need information on obtaining and installing updated device drivers.
Video Controller
The video controller in your computer supports the use of AGP, which can speed up the process of displaying video graphics. This feature for the video controller is activated by the video device drivers when the video interrupt feature is set to Enabled (the default) in the Configuration/Setup Utility program.
Chapter 3. Operating Your Personal Computer 31
If you leave the bus master activated, the video device drivers and the video controller operate at a faster speed. When the video controller needs information from system memory, the video controller can become the bus master and fetch the information directly from memory. This means the video controller will not have to wait for the microprocessor to read the information and write it to video memory. You can accomplish this by changing the video interrupt setting from Enabled to Disabled, using the Configuration/Setup Utility program (described on page 39).
Using System-Management Features
This section is intended primarily for network administrators. It describes features of your computer that make it possible for a network administrator to remotely manage and control your PC when it is linked to a network.
The BIOS (basic input output system) of your computer supports an interface called DMI (Desktop Management Interface). DMI is software used to gather information about the hardware and software in your computer so that network administrators can remotely monitor and control your PC. DMI can be used to remotely track many types of information about networked PCs, including serial numbers, memory attributes, product-specific characteristics of installed peripherals, and operating system configuration information. This information can be accessed using a DMI browser. DMI browsers are provided by all major operating systems and all major LAN management packages (including TME 10 NetFinity, Intel LAN Desk, and Microsoft SMS).
The Wake on LAN feature can be used by a network administrator to turn on your PC from a management console. When Wake on LAN is used in conjunction with network-management software, such as TME 10 NetFinity Version 4 (provided on the Ready-to-Configure Utility Program CD for your computer), many types of functions, such as data transfers, software updates, and POST and BIOS updates can be performed remotely on your PC and other computers enabled for Wake on LAN that are linked to your network. This updating can be done after hours and on weekends, which saves time and increases productivity. Users are not interrupted during normal working hours and LAN traffic is kept to a minimum.
Other features such as remote program load (RPL) and dynamic host configuration protocol (DHCP) also allow a network administrator to remotely control your computer. If you use remote program load in conjunction with LANClient Control Manager software, you can use a feature called Hybrid RPL. Using LANClient Control Manager, you set up your computer by installing hybrid images (or files) on the hard disk drive. Then, each time the computer starts from the network, LANClient Control Manager recognizes your computer as a Hybrid RPL client and a bootstrap program is downloaded to your computer. This bootstrap program is
32 Using Your Personal Computer
small and helps prevent network congestion. Working off the hybrid images, the bootstrap program initiates the startup process from the hard disk drive of your computer. An advantage to Hybrid RPL is that the network load associated with standard RPL is avoided.
System Programs
System programs are the basic layer of software built into every IBM PC. They include the power-on self test (POST), the basic input/output system (BIOS) code, and the Configuration/Setup Utility program. POST is a set of tests and procedures that is performed every time you turn on your PC. The BIOS is a layer of software that translates instructions from other layers of software into instructions that the computer hardware can understand. The Configuration/Setup Utility Program enables you to view and change the configuration and setup of your computer.
In the past, the system programs were contained in a read-only memory (ROM) module on the system board. If you wanted to update POST routines, BIOS instructions, and the Configuration/Setup Utility Program, you had to disassemble the computer and replace modules, or you had to replace the system board. Now, the system programs are stored in an EEPROM (electrically erasable programmable read-only memory) module, which is also referred to as a flash memory. The contents can be easily updated with an update (flash) diskette. The process of updating the system programs EEPROM is often referred to as flashing the BIOS.
Updating the System BIOS
As part of the continuing work to improve quality, IBM might make changes and enhancements to the system programs. When updates are released, they will be available on the World Wide Web (http://www.pc.ibm.com/desktop/) or through the PC Company Bulletin Board Service (see “Using Electronic Support Services” on page 103) in files that can be downloaded onto a diskette. Updates on the Web site or BBS will have the file name NZKTnnA.EXE, where nn is a release number. Instructions for using the system programs updates will be available in a README file included in the downloaded files. When updating system programs with a flash diskette, note the following:
If you have set an administrator password, your computer will halt and request the administrator password. The update process will not begin until you enter the password. If you have set an administrator password, the system programs update will run only if you first perform a cold startup (the computer is turned off and then turned on).
Chapter 3. Operating Your Personal Computer 33
If your computer is connected to a network, the system programs also can be updated remotely, using network-management software, such as IBM LANClient Control Manager.
Flash ROM Recovery Procedure
If power to your computer is interrupted while POST/BIOS is being updated, your computer might not restart (reboot) correctly. If this happens, perform the following procedure to recover:
1. Turn the computer off.
2. Remove the cover. Refer to Installing Options in Your Personal Computer for safety information and cover removal procedures.
3. Locate the Recovery jumper on the system board. See the label inside your computer for the location of the jumper.
4. Move the jumper from pins 1 and 2 to 2 and 3
5. Insert the POST/BIOS update (flash) diskette into drive A.
6. Turn the computer on and follow the instructions on the monitor for flash update.
7. After the update session completes, turn the computer off and remove the diskette from drive A.
8. Move the jumper back to pins 1 and 2.
9. Install the cover and reconnect any cables that were disconnected.
10. Turn the computer on to restart the operating system.
34 Using Your Personal Computer
Using a CD-ROM Drive
Some PC models have a preinstalled CD-ROM drive. CD-ROM (compact disc read-only memory) technology offers quick access to enormous amounts of information. A compact disc can store more than 650 MB of data, such as the large files needed for audio, still and full-motion video, and still and animated graphics. A CD-ROM drive can play back or read from a CD, but it cannot write information to it. CD-ROM drives use industry-standard, 12 cm (4.75-inch) CDs.
Follow these guidelines when using a CD-ROM drive:
Do not place the drive where there is:
– High temperature – High humidity – Excessive dust
– Excessive vibration or sudden shock – An inclined surface
– Direct sunlight
Do not insert any object other than a CD into the drive.Before moving the computer, remove the CD from the drive.
Handling a CD
When handling a CD, follow these guidelines:
Hold the CD by its edges. Do not touch the surface.To remove dust or fingerprints, wipe the CD from the center to the outside.
Wiping the CD in a circular direction might cause loss of data.
Do not write or stick paper on the CD.Do not scratch or mark the CD.Do not place or store the CD in direct sunlight.Do not use benzene, thinners, or other cleaners to clean the CD.Do not drop or bend the CD.
Chapter 3. Operating Your Personal Computer 35
Loading a CD
To load a CD into the CD-ROM drive:
1. Press the Eject/Load button. The tray slides out of the drive. (Do not manually force the tray open.)
2. Place the CD in the tray with the label facing up. If you have placed the desktop model in a vertical position using an optional floor stand,
3
extend the supports on the tray so that the CD does not slip off the tray when the CD-ROM drive is operating.
There are several CD-ROM drives available for your computer. They are alike except for the supports that hold the CD-ROM in place. If your CD-ROM drive resembles the one shown below, you will need to install the support wire that is included with your drive.
To install the support wire:
1. Press the Eject button to open the CD tray.
2. Locate the wire that is installed in the right edge of the tray.
3. Gently flex the wire until you can remove each end from its socket.
4. Locate the two holes near the edge of the tray. (One hole is in the notch on the inner end of the tray, and the other is in a spring-tab at the outer end.)
5. Insert the wire into the inner hole first, then flex the wire until you can insert the other end of it into the spring-tab. When the wire is inserted correctly, it is
3
If you place the desktop model in a vertical position, use a floor stand to prevent damage to the computer due to overheating. Refer to Installing Options in Your Personal Computer for information on purchasing and installing a floor stand.
36 Using Your Personal Computer
parallel to the edge of the tray and approximately three-fourths of an inch in from the outside edge. Because of the spring-tab, you can lift the support wire when you insert a CD and let it hold the CD in place.
If your CD-ROM drive resembles the one shown below, you will only need to extend the clips to secure the CD.
Clip
1. Close the tray by pressing the Eject/Load button, or by gently pushing the tray forward. When the tray is closed, the indicator light on the front of the drive will activate to indicate that the drive is in use.
2. To eject the CD, press the Eject/Load button. When the tray slides out, carefully remove the CD. (If the clips or the support wire on the tray are extended, retract them to remove the CD.)
3. Close the tray by pressing the Eject/Load button, or by gently pushing the tray forward.
Note: If the tray does not slide out of the drive when you press the Eject/Load
button, insert the pointed end of a large paper clip into the emergency-eject hole located above and to the left of the CD-ROM indicator light.
If you have installed a CD-ROM drive yourself and need additional information about the drive, refer to the documentation that comes with the CD-ROM drive.
Chapter 3. Operating Your Personal Computer 37
Using Security Features
A variety of computer security features are provided to help protect your computer hardware and software. For additional information, see “Asset Security Features” on page 9.
38 Using Your Personal Computer
Chapter 4. Configuring Your Computer
The Configuration/Setup Utility Program is stored in the EEPROM (electrically erasable programmable read-only memory) of your computer. You can use the Configuration/Setup Utility Program to view and change the configuration and setup of your computer, regardless of which operating system you are using. However, the settings you select in your operating system might override any similar settings in the Configuration/Setup Utility Program.
The following is a brief description of the categories that appear in the main menu of the Configuration/Setup Utility Program
System Summary provides information about the current options and features
in your computer. Included in the system summary is information about the microprocessor, memory, video controller, and diskette and hard disk drives.
Product Data contains information about the machine type and model, flash
EEPROM revision level, system-board identifier, system serial number, and BIOS date.
Devices and I/O Ports allows you to view and change settings for devices and
I/O ports, including video, IDE drive, serial ports, audio ports, and parallel port.
Start Options allows you to view and change settings for device startup
sequence, keyboard speed, virus detection, various power-on options, and other features of your computer.
Date and Time allows you to view and change the date and time of the internal
clock in your computer.
System Security allows you to control access to the hard disk and diskette
drives. You can also set, change, and delete power-on and administrator passwords.
Advanced Setup allows you to view and change settings for advanced
hardware features, including ROM shadowing and microprocessor, memory, and PCI control. The settings in Advanced Setup must be configured correctly. If they are not, your computer might malfunction.
ISA Legacy Resources allows you to indicate which system resources (DMA,
interrupt, memory, and I/O port) are used by ISA adapters that are not Plug and Play.
Power Management allows you to view and change settings that affect the
energy-saving features of your computer, including the automatic power-on feature and advanced configuration and power interface (ACPI).
Copyright IBM Corp. 1998 39
Important
In most cases, when you add or remove hardware from your computer or erase passwords, the BIOS (basic input/output system) detects the changes and then updates the configuration automatically. Although the computer changes the configuration settings automatically, you must save these changes in the Configuration/Setup Utility Program for the new configuration to take effect. If you do not save the new settings, your operating system will not start. To save the configuration after adding, removing hardware, or erasing passwords, complete the following steps.
1. When you turn on the computer, an error message indicating that a configuration change has occurred appears approximately 30 seconds after the memory count numbers stop cycling in the top-left corner of the screen. When the configuration error message disappears, the POST Startup Errors screen appears, and you are prompted to Continue or Exit Setup. Select Continue. (If you select Exit Setup, you will get another error message.)
2. The Configuration/Setup Utility Program menu appears with a right arrowhead (5) next to the menu category in which the configuration change has occurred. Select this menu item if you want to view the new configuration settings, and then press Esc to return to the Configuration/Setup Utility Program menu.
3. Select Save Settings from the Configuration/Setup Utility Program menu.
4. Press Esc to exit from the Configuration/Setup Utility Program and follow the instructions on the screen.
Starting the Configuration/Setup Utility Program
To start the Configuration/Setup Utility Program
1. Turn on your computer. If your computer is already on when you start this procedure, you must shut down the operating system, turn off the computer, wait a few seconds until all in-use lights go off, and restart the computer. (Do not use Ctrl+Alt+Del to restart the computer.)
2. When the Configuration/Setup Utility Program prompt appears in the lower left corner of the screen during startup, press F1. (The Configuration/Setup Utility Program prompt appears on the screen for only a few seconds. You must press F1 quickly.)
3. If you have not set an administrator password, the Configuration/Setup Utility Program menu appears on the screen. If you have set an administrator
40 Using Your Personal Computer
password, the Configuration/Setup Utility Program menu will not appear until you type your administrator password at the password prompt and press Enter.
If you have set both an administrator and a power-on password, you can type either of the passwords at the password prompt. However, if you think you might need to change any settings in the Configuration/Setup Utility Program, you must type your administrator password at the password prompt. If you type your power-on password, you will be able to view limited information in the Configuration/Setup Utility Program, but you will not be able to change any settings.
The menu you see on your computer might look slightly different from the menu shown here, but it will operate the same way.
Configuration/Setup Utility
Select Option:
System Summary Product Data Devices and I/O Ports Start Options Date and Time System Security Advanced Setup ISA Legacy Resources Power Management
Save Settings Restore Settings
Exit Setup
Viewing and Changing Settings in the Configuration/Setup Utility Program
The Configuration/Setup Utility Program menu lists items that identify system configuration topics. If a bullet () appears beside a menu item, then an additional menu is available. If a right arrowhead (5) appears beside a menu item, then a change to that item has been made or the Configuration/Setup Utility Program detected an error and attempted to correct it. Also, an additional menu might follow a menu item with a beside it. If an asterisk (*) appears next to a menu item, it indicates a system resource conflict. Resolve this conflict before exiting from
Chapter 4. Configuring Your Computer 41
Load Default Settings
the Configuration/Setup Utility Program so that your computer will function properly. For information and instructions on resolving system resource conflicts, refer to Installing Options in Your Personal Computer and the documentation that comes with the hardware you want to install.
When working with the Configuration/Setup Utility Program menu, you must use the keyboard. Refer to the following table for the keys used to accomplish various tasks.
Keys Function
Use these arrow keys to move between menu items until the item you
want is highlighted.
Use these arrow keys to display and toggle between choices for a menu
item.
Enter Press this key to select a highlighted menu item. Esc Press this key to exit from a menu after viewing or making changes to
the settings in the menu.
+ Use this key in some menus to increase the numerical value of a setting.
Use this key (the minus or hyphen key) in some menus to decrease the
numerical value of a setting.
0–9 Use these number keys in some menus to change the numerical value of
a setting.
F1 Press this key for help on a selected menu item. F9 Press this key if you changed and saved the setting of a selected menu
item and you want to restore the setting that was active before you made the change.
F10 Press this key to return the setting of a selected menu item to a default
value.
Note: Active keys are displayed at the bottom of each screen; not all of the above
keys are active with every menu.
In the Configuration/Setup Utility Program menus, the configuration information you can change is enclosed in brackets like these [ ]. You cannot change information that is not surrounded by brackets.
42 Using Your Personal Computer
Exiting from the Configuration/Setup Utility Program
When you finish viewing or changing settings in the Configuration/Setup Utility Program follow these steps to exit from the program:
1. Press Esc to return to the Configuration/Setup Utility Program menu. (Depending on where you are in the program, you might have to press Esc several times to get back to the Configuration/Setup Utility Program menu.)
2. Before you exit from the Configuration/Setup Utility Program menu, select Save Settings if you want to save all settings as they currently appear. If you do not complete this step, your settings will not be saved.
3. From the Configuration/Setup Utility Program menu, press Esc, and follow the instructions on the screen.
Chapter 4. Configuring Your Computer 43
Viewing the System Summary
You can use the Configuration/Setup Utility Program to view a summary of the options and features in your computer. To view the system summary:
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select System Summary from the Configuration/Setup Utility Program menu. The System Summary screen appears.
Depending on your model and configuration, your screen might appear slightly different from the one shown here.
System Summary
Processor Pentium II Processor Speed 233 MHz Cache Size 512 KB Cache State Enabled System Memory 32 MB Memory Type Non Parity Video Controller Cirrus Logic GD-546x VGA Diskette Drive A: 1.44 MB, 3.5" Diskette Drive B: Not Installed IDE Hard Disk Drive 0 4224 MB IDE Hard Disk Drive 1 Not Installed IDE Hard Disk Drive 2 Not Installed IDE Hard Disk Drive 3 Not Installed
4
MHz only denotes the internal clock speed of the microprocessor, not application performance; many factors affect application performance.
44 Using Your Personal Computer
Setting the Date and Time
Your computer has an internal clock that maintains the date and time. A battery keeps the clock active when the power is disconnected.
To set the date and time:
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select Date and Time from the Configuration/Setup Utility Program menu.
3. Type the date and time in the appropriate fields.
4. Press Esc to return to the Configuration/Setup Utility Program menu.
5. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu and press Enter.
6. To exit from the Configuration/Setup Utility Program, press Esc and follow the instructions on the screen.
Your operating system might also have a function for setting the date and time. Refer to your operating system documentation for more information.
System Security
Several security features are available to help you secure your computer and the information you store in it.
Secure IDE Devices and Diskette Drives
This feature allows you to control when IDE devices and diskette drives are accessible to system software.
Diskette Write Protect
This feature disables the ability to write to a diskette in the diskette drive.
POST/BIOS Update
This feature allows you to specify if update POST/BIOS from the network is enabled or disabled.
Chapter 4. Configuring Your Computer 45
Adapter ROM Security
If this is set to YES, the keyboard is locked during adapter ROM initialization. This can be used in conjunction with an administrator password to prevent the use of adapter ROM-based utilities.
Power-On and Administrator Passwords
Important
Keep a record of your administrator password in a secure place. If you lose or forget the administrator password, you will not be able to access the Configuration/Setup Utility program, and you will not be able to erase and reset an administrator password. If you lose or forget your password, you must remove the computer cover and move a jumper on the system board. (Refer to “Erasing a Lost or Forgotten Administrator Password” on page 51 for further information.)
These password features help prevent unauthorized persons from gaining access to the information stored in your computer. Other password security features might be available through your operating system or network.
Power-On Password
The power-on password feature deters unauthorized persons from gaining access to the information stored in your computer. You do not need to set a power-on password, but doing so allows you to control who can use your computer. When a power-on password is set, you must type the password at a prompt that appears as the computer starts.
When you set the power-on password, you can choose one of three password prompt modes:
On In password prompt On mode, you are prompted for the power-on
password when you turn on the computer. Until the correct password is entered, the computer's operating system will not start, and the keyboard will remain locked. If you have a mouse connected to the mouse port, it also will remain locked. If you have a mouse connected to a serial port, it will be activated when the computer is started, regardless of whether a password is set.
Note: If Update POST/BIOS from network is enabled, you cannot
select On. In this case you should select Dual. If it is set to On
46 Using Your Personal Computer
when Update POST/BIOS from network is enabled, it will automatically be reset to Dual.
Off In password prompt Off mode (sometimes referred to as unattended
start mode), you are not prompted to enter your power-on password when you turn on the computer. The computer will start the operating system. However, if you have a mouse connected to the mouse port, refer to the following text box.
Important Information for Mouse Users
This information applies only to those who have a mouse connected to the mouse port; a serial mouse is not affected by the password prompt Off mode.
The password prompt Off mode prevents the computer from detecting that a mouse is attached. Because the mouse device driver will not be loaded automatically through the CONFIG.SYS or AUTOEXEC.BAT files in this mode, an error message that the mouse port is disabled will appear and the computer will halt. To enable the operating system to load without displaying the error message, read the information below that applies to your operating system.
If you are using OS/2, do one of the following before enabling password prompt Off mode:
Set the CONFIG.SYS file so the operating system does not stop on
a device-driver error. To do this, put the command "PAUSEONERROR=NO" near the top of the CONFIG.SYS file.
or
Remove the mouse driver statement from the CONFIG.SYS file.
If you are using Windows NT or Windows 95, do the following:
When the computer is started and the mouse port disabled error
message appears, type either your power-on or administrator password to enable the keyboard. Then use the keyboard to put a check mark in the Do not display this message in the future check box.
Once the operating system starts in password prompt Off mode, the keyboard will remain locked. If you have a mouse connected to the mouse port, it also will remain locked.
Although you are not prompted to type a password in this mode, you can type either your power-on or administrator password anytime after POST has completed, even after the operating system has loaded. If you
Chapter 4. Configuring Your Computer 47
type a password, the keyboard will unlock, but the mouse connected to the mouse port will remain disabled.
Password prompt Off mode is useful for network servers and other computers that operate unattended. If a power failure occurs, the computer will automatically restart and resume operating in this mode when power is restored, without operator intervention.
Dual In the password prompt Dual mode, the startup behavior of the
computer depends on whether the computer is started from the computer power switch or by an unattended method, such as a modem or timer.
If you start the computer by using the power switch, the computer operates the same as it does in password prompt On mode. Refer to page 46 for further information.
If the computer is started by an unattended method, such as remotely over a LAN, the computer operates the same as it does in password prompt Off mode. Refer to page 47 for further information.
If both a power-on and administrator password are set, you can type either password at the password prompt that appears as you start your computer. However, if you want to change any settings in the Configuration/Setup Utility Program, you must type your administrator password at the password prompt that appears when you try to access the Configuration/Setup Utility Program. If you type your power-on password at this prompt, you will be able to view limited information in the Configuration/Setup Utility Program, but you will not be able to change any settings.
The password does not appear on the screen as you type it. If you type the wrong password, you receive a screen message telling you so. If you type the wrong password three times, you must turn off the computer and start again. When you type the correct password, the keyboard and mouse will unlock, and the computer will begin normal operation.
Setting and Changing a Power-On Password
Use the Configuration/Setup Utility Program to set or change a power-on password. You can use any combination of up to seven characters (A–Z, a–z, and 0–9) for this password.
Attention: Keep a record of your power-on password in a secure place. When a power-on password has been set, you cannot activate the keyboard and mouse without first using the password.
48 Using Your Personal Computer
To set or change a power-on password:
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Power-On Password.
4. Type your password and press Down Arrow ().
5. Type your password again.
6. At Password Prompt, select Off, On, or Dual. Press Left Arrow () or Right Arrow () to toggle between selections.
Note: If Update POST/BIOS from network is enabled, you cannot select On.
In this case you should select Dual. If it is set to On when Update
POST/BIOS from network is enabled, it will automatically be reset to Dual.
7. Select Change Power-On Password, and follow the instructions on the screen.
8. Press Esc twice to return to the Configuration/Setup Utility Program menu.
9. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu.
10. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Deleting a Power-On Password: Use the Configuration/Setup Utility Program
to delete a power-on password.
To delete a power-on password:
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Power-On Password.
4. Select Delete Power-On Password and follow the instructions on the screen.
5. Press Esc twice to return to the Configuration/Setup Utility Program menu.
6. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu.
7. To exit from the Configuration/Setup Utility Program, press Esc and follow the instructions on the screen.
Chapter 4. Configuring Your Computer 49
Administrator Password
Setting an administrator password deters unauthorized persons from changing settings in the Configuration/Setup Utility Program. When an administrator password is set, you can change settings in the Configuration/Setup Utility Program only after typing the administrator password at the password prompt that appears when you try to access the Configuration/Setup Utility Program.
If you are responsible for maintaining the settings of several computers, you might want to set an administrator password.
When you set an administrator password, a password prompt appears each time you try to access the Configuration/Setup Utility Program. The password does not appear on the screen as you type it. If you type the wrong password, you receive a screen message telling you so. If you type the wrong password three times, you must turn off the computer and start again. When you type the correct password, the Configuration/Setup Utility Program menu appears.
If both a power-on and administrator password are set, you can type either of the passwords at the password prompt that appears as you start your computer. However, if you want to change any settings in the Configuration/Setup Utility Program, you must type your administrator password at the password prompt that appears when you try to access the Configuration/Setup Utility Program. If you type your power-on password at this prompt, you will be able to view limited information in the Configuration/Setup Utility Program, but you will not be able to change any settings.
Setting and Changing an Administrator Password: Use the
Configuration/Setup Utility Program to set or change an administrator password. You can use any combination of up to seven characters (A–Z, a–z, and 0–9) for the password.
To set or change an administrator password:
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Administrator Password.
4. Type your password and press Down Arrow ().
5. Type your password again.
6. At Power-On Password Changeable by User, select Yes or No. Press Left Arrow () or Right Arrow () to toggle between selections. (If you select Yes
50 Using Your Personal Computer
and an administrator password is set, the power-on password can be changed without having to enter the administrator password. If you select No and an administrator password is set, the power-on password cannot be changed unless the administrator password is entered.)
7. Select Change Administrator Password and follow the instructions on the
screen.
8. Press Esc until you return to the Configuration/Setup Utility Program menu.
9. Before you exit from the program, select Save Settings from the
Configuration/Setup Utility Program menu.
10. To exit from the Configuration/Setup Utility Program, press Esc and follow the
instructions on the screen.
Deleting an Administrator Password: Use the Configuration/Setup Utility
Program to delete an administrator password.
To delete an administrator password:
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select System Security from the Configuration/Setup Utility Program menu.
3. Select Administrator Password.
4. Select Delete Administrator Password and follow the instructions on the screen.
5. Press Esc until you return to the Configuration/Setup Utility Program menu.
6. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu.
7. To exit from the Configuration/Setup Utility Program, press Esc and follow the instructions on the screen.
Erasing a Lost or Forgotten Administrator Password: This section applies to
lost or forgotten administrator passwords.
If you have lost or forgotten your administrator password, you must remove the computer cover and move the CMOS Clear jumper (also referred to as the password jumper) on the system board in order to erase the password so that you can regain access to the Configuration/Setup Utility program.
See Installing Options in Your Personal Computer for instructions on removing the computer cover and moving jumpers. Refer to the system board label inside the computer for the location of the CMOS Clear (password) jumper.
Chapter 4. Configuring Your Computer 51
Important
If you move the CMOS Clear jumper, you will lose all setup data stored in the computer, and you will need to reconfigure the computer. Use the Configuration/Setup Utility Program to reconfigure the computer and to set a new password.
52 Using Your Personal Computer
Power Management
Your computer comes with built-in energy-saving capabilities. You can view and change energy-saving settings using the Power Management menu in the Configuration/Setup Utility Program. This section describes the Power Management features in your computer and provides instructions for using these features.
Attention: If a device, such as a monitor, does not have power-management capabilities, it can be damaged when exposed to a reduced-power state. Before you make energy-saving selections for your monitor, check the documentation that comes with your monitor to see if it supports Display Power Management Signaling (DPMS).
Power Management Features
With Power Management, the computer and monitor (if the monitor supports DPMS) can be set to go into a reduced-power state if they are inactive for a specified length of time.
Time to Low Power: With this option, you can specify the amount of time that
the computer must be inactive before Power Management options begin to take affect. You can select from 5 minutes to 1 hour.
System Power: With this option, you can select On if you want the computer
to remain on, or Off if you want the computer to shut down.
Display: With this option, you can select one of the following reduced-power
states:
Standby: In this mode, the screen is blanked, but the screen image is
restored immediately when any activity is detected.
Suspend: In this mode, the monitor uses less power than in Standby mode.
The screen is blanked, but the screen image is restored within a few seconds after any activity is detected.
OFF: In this mode, the monitor power is turned off. To restore power to
the monitor, you must press the monitor power switch. On some monitors, you might have to press the power switch twice.
If OFF is selected, you must specify the Time to Display 'off'. You can select 5 minutes to 1 hour.
Note: Time to display off is the amount of time after the reduced-power
state before the display enters the off state.
Chapter 4. Configuring Your Computer 53
Disable: In this mode, the monitor is unaffected by the power management
settings.
IDE Drives: This selection enables you to specify if the IDE drives should be
enabled or disabled when power management options take affect.
Setting Power Management Features: To set Power Management features,
complete the following steps.
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select Power Management from the Configuration/Setup Utility Program menu.
3. Select APM.
4. Set APM BIOS Mode to Enabled.
5. Select values for power management (time to low power, system power,, processor speed, display, and time to display off), as necessary.
6. Set IDE Drives to Enabled or Disabled. Note: SCSI drives are not affected by APM.
7. Press Esc twice to return to the Configuration/Setup Utility Program menu.
8. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu.
9. To exit from the Configuration/Setup Utility Program, press Esc and follow the instructions on the screen.
Automatic Power-On Features
The Automatic Power-On features within the Power Management menu allow you to enable and disable features that automatically turn your computer on. You must also select the startup sequence you want to use for the type of power-on event selected. If you select Automatic, make sure Automatic Power On Startup Sequence in the Startup Sequence menu is set to enabled. Otherwise, the system will use the Primary startup sequence.
Wake on LAN: If you have remote-network-management software and a NIC
card that supports the Wake on LAN, Tivoli, LCCM, or LCM, and you have a management system that generates the LAN wakeup you can use the IBM-developed Wake on LAN feature built into the NIC in your computer. (You can also use the Wake on LAN feature if you have installed a properly configured token-ring adapter that is enabled for Wake on LAN.) When you set Wake on LAN to Enabled, your computer will turn on when it receives a
54 Using Your Personal Computer
specific signal from another computer on your local area network (LAN). Contact your network administrator if you have questions.
Serial Port Ring Detect: If your computer has an external modem connected to
a serial port and you want the computer to turn on automatically when a ring is detected on the modem, set this feature to Enabled.
MODEM Ring Detect: If your computer has an internal modem and you want
the computer to turn on automatically when a ring is detected on the modem, set this feature to Enabled. The modem must also support this feature. A cable from the modem connects to a connector on the riser card.
Wake Up on Alarm: With this feature, you can specify a date and time at
which the computer will be turned on automatically. This can be either a single event, a daily event, or a weekly event.
PCI Wake Up: If enabled, this setting allows your system to power on in
response to wake up requests from PCI devices that support this feature.
Setting Automatic Power-On Features: To set Automatic Power-On features,
complete the following steps.
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select Power Management from the Configuration/Setup Utility Program menu.
3. Select Automatic Power On.
4. Select the menu item for the feature you want to set. Use Left Arrow () or Right Arrow () to select either Enabled or Disabled.
5. Select Startup Sequence for the feature. Use Left Arrow () or Right Arrow () to select either Primary or Automatic.
6. Press Esc until you return to the Configuration/Setup Utility Program menu.
7. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu.
8. To exit from the Configuration/Setup Utility Program, press Esc and follow the instructions on the screen.
Automatic Configuration and Power Interface (ACPI) BIOS Mode
This setting is used to enable or disable ACPI BIOS mode. When ACPI BIOS mode is enabled, the operating system is allowed to control the power management features of your computer and the settings for APM BIOS mode are ignored. Not all operating systems support ACPI BIOS mode. Refer to your operating system documentation to determine if ACPI is supported.
Chapter 4. Configuring Your Computer 55
Setting ACPI BIOS Mode: The ACPI BIOS mode is set to Enabled by default.
To set ACPI BIOS mode, complete the following steps.
1. Start the Configuration/Setup Utility Program (see “Starting the Configuration/Setup Utility Program” on page 40).
2. Select Power Management from the Configuration/Setup Utility Program menu.
3. Set ACPI BIOS Mode to Enabled or Disabled as desired using the Left Arrow () or Right Arrow ().
4. Press Esc to return to the Configuration/Setup Utility Program menu.
5. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu.
6. To exit from the Configuration/Setup Utility Program, press Esc and follow the instructions on the screen.
56 Using Your Personal Computer
POST/BIOS Update over the Network
This setting is used to enable or disable the POST/BIOS update feature for systems that are shipped with IBM network adapters. When the feature is enabled, the system programs in your computer can be updated remotely from a network server. If you have set an administrator password for your computer, it does not have to be entered by the server. Consult your network administrator for information on setting up your network server to perform POST and BIOS updates.
To access the POST/BIOS Update setting:
1. Start the Configuration/Setup Utility Program. (See “Starting the Configuration/Setup Utility Program” on page 40.)
2. Select System Security.
3. Select POST/BIOS Update.
4. Select Update POST/BIOS from network.
5. To enable update POST/BIOS over the network, select Enabled. To disable, select Disabled.
6. Press Esc until you return to the Configuration/Setup Utility Program menu.
7. Before you exit from the program, select Save Settings from the Configuration/Setup Utility Program menu.
8. To exit from the Configuration/Setup Utility Program, press Esc and follow the instructions on the screen.
Chapter 4. Configuring Your Computer 57
58 Using Your Personal Computer
Chapter 5. Taking Care of Your Computer
This chapter provides guidelines for the proper handling and care of your computer.
Basics
Here are some basic points about keeping your computer functioning properly:
Keep your computer in a clean, dry environment. Make sure it rests on a flat,
sturdy surface.
Do not place items on top of the monitor or cover any of the vents in the
monitor or computer. These vents provide air flow to keep your computer from overheating.
Keep food and drinks away from all parts of your computer. Food particles
and spills might make the keyboard and mouse sticky and unusable.
Do not get the power switches or other controls wet. Moisture can damage
these parts and cause an electrical hazard.
Always disconnect a power cord by grasping the plug, not the cord.
Cleaning Your Computer
It is a good practice to clean your computer periodically to protect the surfaces and ensure trouble-free operation.
CAUTION: Be sure to turn off the computer and monitor power switches before cleaning the computer and monitor screen.
Computer and Keyboard
Use only mild cleaning solutions and a damp cloth to clean the painted surfaces of the computer.
Monitor Screen
Do not use abrasive cleaners when cleaning the surface of the monitor screen. The screen surface is easily scratched, so avoid touching it with pens, pencil points, and erasers.
Copyright IBM Corp. 1998 59
To clean the screen surface, wipe it gently with a soft, dry cloth, or blow on the screen to remove grit and other loose particles. Then use a soft cloth moistened with a nonabrasive liquid glass cleaner. In addition, an anti-static cleaner can be used to slow the buildup of dust on the screen surface.
Mouse
If the pointer on the screen does not move smoothly with the mouse, you might need to clean the mouse.
1. Turn off the computer.
2. Disconnect the mouse cable from the computer.
3. Turn the mouse upside down. Unlock the retainer on the bottom of the mouse by moving it in the direction indicated by the arrow on the retainer.
4. Turn the mouse right-side up, and the retainer and ball will drop out.
5. Wash the ball in warm, soapy water, and dry it well.
6. Using a damp cloth, wipe the outside of the mouse and the retainer. Be sure to wipe the rollers inside the mouse.
7. Insert the ball and retainer. Lock the retainer by moving it in the opposite direction of the arrow.
8. Reconnect the mouse cable to the computer.
60 Using Your Personal Computer
Replacing the Battery
Your computer has a special type of memory that maintains the date, time, and the settings for built-in features, such as serial- and parallel-port assignments (configuration). A battery keeps this information active when you turn off the computer.
The battery requires no charging or maintenance throughout its life; however, no battery lasts forever. If the battery fails, the date, time, and configuration information (including passwords) are lost. An error message is displayed when you turn on the computer.
Refer to “Lithium Battery Notice” on page ix of this publication and Installing Options in Your Personal Computer for information about replacing the battery.
If you replace the original lithium battery with a heavy-metal battery or a battery with heavy-metal components, be aware of the following environmental consideration. Batteries and accumulators that contain heavy metals must not be disposed of with normal domestic waste. They will be taken back free of charge by the manufacturer, distributor, or representative, to be recycled or disposed of in a proper manner.
Moving Your Computer
Important
Do not move the computer while it is on. Sudden movements, such as bumps, jerks, and drops, can cause the read/write head of the hard disk drive to bounce against the surface of the disk itself. This can cause loss of data and a variety of hard disk errors. Always turn off the computer before you move it. When the computer is off, the read/write head automatically parks itself over a nondata area of the hard disk. This process can help to prevent damage to the hard disk.
CAUTION: Do not risk injury by moving or lifting the computer by yourself. Ask another person to help you.
If your computer has a hard disk drive, take the following precautions:
1. Back up all files and data from the hard disk. Operating systems can vary in the way they perform backup procedures. Some
operating systems save only data files, while others make copies of application
Chapter 5. Taking Care of Your Computer 61
program files and data files. Refer to your operating-system documentation for information about software backup.
2. Remove all media (diskettes, compact discs, tapes, and so on) from the drives.
3. Turn off the computer and all attached devices.
4. Unplug the power cords from electrical outlets.
5. Note where you have attached your cables to the rear of the computer; then remove them.
6. If you saved the original shipping cartons and packing materials, use them to pack the units. If you are using different cartons, cushion the units to avoid any damage.
62 Using Your Personal Computer
Chapter 6. Solving Problems
This chapter presents an overview of diagnostic tools available to you. You can use these tools to identify and correct problems that might come up as you use your computer. This chapter also contains information about option diskettes and terminate-and-stay-resident (TSR) programs.
Important
If you have just added new software or a new computer option and your computer is not working, do the following before using the other information in the chapter:
Remove the software or device you just added.Run the diagnostic programs to determine if your computer is running
correctly. (See “Diagnostic Programs” on page 97 for information about diagnostic programs provided with your computer.)
Reinstall the new software or new device.
Using Diagnostic Tools
Computer problems can be caused by hardware, software, or user error (for example, pressing the wrong key). Using the diagnostic aids discussed in this chapter, you might be able to solve such problems yourself or gather helpful information you can pass on to a service technician.
You can check the hardware by following the procedures in this chapter. You can also use the diagnostic programs provided with your computer (see “Diagnostic Programs” on page 97 for a description of these programs).
If the hardware checks out OK, and you have not made a user error, you might have a software problem. If you suspect that you have a software problem and your computer came with IBM-preinstalled software, refer to About Your Software and the operating-system documentation that comes with your computer. If you have installed software applications yourself, consult the documentation that comes with the software.
Copyright IBM Corp. 1998 63
The following tools are available to diagnose hardware-related problems:
Power-on self-test (POST)
Error messages
POST message charts Troubleshooting charts Diagnostic programs
Note: In addition to the preceding tools, if you have access to the World Wide
Web, you can also view or download the latest problem-solving tips from the http://www.us.pc.ibm.com/desktop/ Web site.
Descriptions of the diagnostic tools follow.
Power-On Self-Test (POST)
Each time you turn on your computer, it performs a series of tests that check the operation of the base computer. This series of tests is called the power-on self-test (POST).
Note
If your computer starts but does not boot when you press the power switch, do the following:
Make sure all cables are securely connected to the correct locations.Check to see if the voltage-selection switch is set to the correct position for
your country.
For additional information, see Setting Up Your Personal Computer.
POST does the following:
Checks basic system-board operations
Checks the memory operation
Compares the current system configuration with that established by the
Configuration/Setup Utility program
Starts the video operation
Verifies the presence of diskette drives, hard disk drives, and the CD-ROM
drive (if installed)
If Power On Self Test is [Enhanced], information about memory configuration and test results are shown in the upper left corner. Options for running a quick POST
64 Using Your Personal Computer
or accessing the Configuration/Setup Utility Program appear in the lower-left corner of the screen. Quick mode is the default mode of operation.
Note: The amount of available memory shown might be somewhat less than
expected because of basic input/output system (BIOS) shadowing in random access memory (RAM).
If POST finishes without detecting any problems, the first screen of your operating system or application program appears (if you have not set a power-on password). If you have set a power-on password, a password prompt appears. You must enter your password before the first screen of your operating system or application program will appear. (For further information on using passwords, refer to “System Security” on page 45.)
If Power On Status is Enabled and POST detects a problem, you will hear multiple beeps or no beep. In most cases, an error code appears in the top left corner of the screen, and in some cases a description of the error is displayed beside the code. (Note that the screen will sometimes display multiple error codes and descriptions.) For more information about what caused an error message to appear and what action to take, refer to “Solving POST Error Message Problems” on page 66 and “POST Message Charts” on page 69.
If you hear no beep at all during POST, refer to “Troubleshooting Charts” on page 87. You might need to have your computer serviced.
Error Messages
Error messages that appear on the screen might be text, numeric, or both. There are several types of error messages:
POST error messages
Messages that appear when POST finds problems with the hardware during startup or when a change in the hardware configuration is found. POST error messages are 3-, 4-, 5-, 8-, or 12-character alphanumeric messages and include brief explanations (except I999XXXX errors).
For more information about what caused an error message to appear and what action to take, refer to “Solving POST Error Message Problems” on page 66 and “POST Message Charts” on page 69.
Software-generated error messages
Messages that appear if a problem or conflict is detected by the application program, the operating system, or both. Error messages for operating-system and other software problems are generally text messages, but they also can be
Chapter 6. Solving Problems 65
numeric messages. For information about these software error messages, refer to the information that comes with the operating system or application program.
Diagnostic error messages
Messages that appear if a hardware problem is detected by a diagnostic test program. The messages present text information that can be used to identify a failing part.
Solving POST Error Message Problems: If you receive an error message
during the power-on-self-test (POST), completing the steps outlined in this section might enable you to resolve the problem.
Note
If you have just added, removed, or changed the location of a device and you receive an error message, follow the procedure described in the Important text box on page 40. If the procedure on page 40 does not eliminate the error message, then proceed with the following instructions.
1. Write down all error code numbers and descriptions that appear on the screen as you start your computer. (Note that a single problem can cause several error messages to appear. When you correct the cause of the first error message, the other error messages probably will not appear on the screen the next time you turn on your computer.)
2. If you have set a power-on password, a password prompt appears. If you have set both power-on and administrator passwords, you can type either password at the password prompt. However, if you think you might need to change any settings in the Configuration/Setup Utility Program, type your administrator password at the password prompt. If you type your power-on password, you will be able to view error codes and error code descriptions displayed on the POST Startup Errors screen, and you will also be able to view limited information in the Configuration/Setup Utility Program. However, you will not be able to change any settings.
3. In the case of most errors, the Configuration/Setup Utility Program starts automatically so that you can attempt to identify and correct the problem. When the Configuration/Setup Utility Program starts, a screen labeled POST Startup Errors appears. (Note that the POST Startup Errors screen does not appear immediately. You must wait approximately one minute.) If the POST Startup Errors screen does not appear, proceed to step 6.
4. At the POST Startup Errors screen, select Continue if you want to access the Configuration/Setup Utility Program menu. Select Exit Setup if you want to exit the Configuration/Setup Utility Program. (See the following Important text
66 Using Your Personal Computer
box for information on exiting the Configuration/Setup Utility Program without making any changes to current settings.) To select an item, press Up Arrow () or Down Arrow () to highlight the item, and then press Enter.
Important
If you exit from the Configuration/Setup Utility Program without selecting Save Settings, your operating system will not start, but the computer will automatically restart. When the computer restarts, you will get a POST error message, and then the Configuration/Setup Utility Program will again start automatically.
If you select Save Settings and then exit the Configuration/Setup Utility Program, your system will save all settings as they currently appear in the Configuration/Setup Utility Program and your operating system will start (unless there is an unresolved problem with an IDE device).
5. If you selected Continue in step 4 on page 66, the Configuration/Setup Utility
Program menu appears on the screen. You will see a pointer next to any menu items that are malfunctioning or that have been changed since the last time you turned on your computer. If you did not knowingly make a change to a flagged menu item, there is likely a malfunction in that item. If you made a change, continue here. If you did not make a change, go to the Important text box on page 67.
To use the Configuration/Setup Utility Program, do the following:
a. Select the menu item that is flagged (or that you wish to view) by pressing
Up Arrow () or Down Arrow (), and then press Enter.
b. A new menu specific to the item that you selected appears. Press Left
Arrow () or Right Arrow () to toggle between choices for a menu item. (Note that each menu item has a Help screen. To view the Help screen, select the menu item, and then press F1.)
c. When you have finished viewing and changing settings, press Esc to return
to the Configuration/Setup Utility Program menu.
d. Before you exit from the program, select Save Settings.
e. To exit from the Configuration/Setup Utility Program, press Esc and follow
the instructions on the screen. When you exit from the Configuration/Setup Utility Program menu, your new settings will be saved and your operating system will start automatically (unless there is an unresolved problem with an IDE device).
Chapter 6. Solving Problems 67
6. For more information about what caused an error message to appear and what action to take, refer to the following chart.
Problem Go to:
POST error code or message appears. “POST Message Charts” on page 69.
After more than one beep, application program or operating system appears.
Blank screen, unreadable screen, or other unusual response occurs.
“Diagnostic Programs” on page 97.
“Troubleshooting Charts” on page 87.
If you are unable to resolve a problem and need assistance, refer to Chapter 7, “Getting Help, Service, and Information” on page 101.
68 Using Your Personal Computer
POST Message Charts
The computer might display more than one error message. Often, the first error to occur causes subsequent errors. When using the POST message charts in this section, always begin by following the suggested action for the first error message that appears on your computer screen. Note that, in these charts, “X” can be any alphanumeric character.
Important
If you find it necessary to remove the computer cover, first read "Removing the Cover" in Installing Options in Your Personal Computer for important safety information and instructions.
POST Message Description
101 102
114 An adapter read-only memory (ROM) error occurred.
121 A hardware error occurred.
161 The battery on the system board is dead.
A failure occurred during testing of the system board and microprocessor.
Action: Have the computer serviced.
Action: Remove all adapters that are not required for system
startup and reinstall them one at a time, retesting after each is reinstalled. When an adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer serviced.
Action: Have the computer serviced.
CAUTION: Danger of explosion if lithium battery is incorrectly replaced.
Replace the battery with the same or equivalent type recommended by the manufacturer. Dispose of batteries as required by local ordinances or regulations. (See “Lithium Battery Notice” on page ix and “Replacing the Battery” on page 61 for important information on battery use, disposal, and replacement.)
Action: Replace the battery. Note: The computer can be used until you replace the battery.
Chapter 6. Solving Problems 69
POST Message Description
162 A change in device configuration occurred. This message is
displayed under one or more of the following conditions:
A new device has been installed.A device has been moved to a different location or cable
connection.
A device has been removed or disconnected from a cable.A device is failing and is no longer recognized by the
computer as being installed.
An external device is not turned on.An invalid checksum is detected in CMOS memory
(nonvolatile RAM).
Action:
1. Verify that all external devices are turned on. External devices must be turned on before the computer is turned on.
2. Verify that all devices are properly installed and securely connected.
3. If you added, removed, or changed the location of a device, you must save the new configuration in the Configuration/Setup Utility Program. Refer to the Important text box on page 40 for further information and instructions on saving the configuration.
4. If you did not add, remove, or change the location of a device, a device is probably failing. Running the diagnostic programs might isolate the failing device. (See “Diagnostic Programs” on page 97 for information about diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer serviced.
163 The clock is not working correctly.
Action: Set the correct date and time. If the date and time are set correctly and saved and the 163 error message reappears, replace the battery.
If this does not correct the problem, have the computer serviced. Note: The computer can be used until it is serviced, but any
application programs that use the date and time will be affected.
70 Using Your Personal Computer
POST Message Description
164 A change in the memory configuration occurred. This error can be
caused by adding, removing, or incorrectly installing memory. Note: The computer can be used with decreased memory capacity
until the error is corrected.
Action:
1. If you added memory, see Installing Options in Your Personal Computer and Chapter 4, “Configuring Your Computer” on
page 39 of this booklet to verify that the new memory is correct for your computer, and that it is installed and configured correctly.
2. If you added or removed memory, you must save the new configuration in the Configuration/Setup Utility Program. Refer to the Important text box on page 40 for further information and instructions on saving the configuration.
3. Running the diagnostic programs might isolate the location of the problem DIMM and provide additional information. (See “Diagnostic Programs” on page 97 for information about diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer serviced.
167 The microprocessor was updated and the correct system BIOS
update program was not found. This error can be caused when a different microprocessor is installed.
Action: If you updated the microprocessor, refer to “Updating the System BIOS” on page 33 and perform the BIOS flash update procedure.
If the problem cannot be isolated and corrected, have the computer serviced.
175 The primary copy of secure data is damaged. This can occur if the
computer is turned off while the Configuration/Setup Utility program is updating the administrator password or startup sequence.
Action: POST will attempt to use the alternate copy of secure data to correct the primary copy. If the operation is successful, the administrator password and startup sequence will remain as they were before the Configuration/Setup Utility program was invoked and this error will not appear during the next power-on. If the operation is not successful, other POST errors might appear and the system board must be replaced.
Chapter 6. Solving Problems 71
POST Message Description
176 The computer was tampered with. This indicates that the cover
has been removed and the chassis-intrusion detector has not been cleared by entering the administrator password. Note that chassis-intrusion can be detected only if the chassis-intrusion detector feature is activated, which occurs when enhanced security is enabled and an administrator password is set.
Action: To reset the chassis-intrusion detector, you must enter the administrator password.
186 Security hardware control logic error. The security data could
either not be read or written and the administrator password and startup sequence are not reliable.
Action: If your computer is in enhanced security mode, the startup process will not continue. The system board must be replaced.
187 A problem occurred with the administrator password and startup
(boot) sequence. Action: If enhanced security is not enabled, use the
Configuration/Setup Utility program to:
1. Clear the startup sequence (Start Options, Startup sequence).
2. Clear the administrator password. For instructions, see “Deleting an Administrator Password” on page 51.
3. Reload the default settings (Load Default Settings).
4. Reset an administrator password. For instructions, see “Setting and Changing an Administrator Password” on page 50.
For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
190 The computer chassis-intrusion detector was cleared.
72 Using Your Personal Computer
POST Message Description
20X A failure occurred during testing of the memory. This error can be
caused by incorrectly installed memory, a failing DIMM, or a system-board failure.
Action:
1. If you have added memory, see Installing Options in Your Personal Computer and Chapter 4, “Configuring Your
Computer” on page 39 of this booklet to verify that the new memory is correct for your computer, and that it is installed and configured correctly.
2. Run the diagnostic programs to verify the problem. (See “Diagnostic Programs” on page 97 for information about diagnostic programs provided with your computer.)
If the problem cannot be isolated and corrected, have the computer serviced.
301 303
A failure occurred during testing of the keyboard and keyboard controller. These error messages also might be accompanied by continuous beeping.
Action:
Ensure that:
1. Nothing is resting on the keyboard and pressing a key.
2. No key is stuck.
3. The keyboard cable is securely attached to the keyboard connector on the computer. (For the location of the keyboard connector, refer to “Desktop Model Connectivity” on page 13.)
Note: If you have just connected a new mouse or other pointing
device, turn off the computer and disconnect that device. Wait at least 5 seconds, and then turn on the computer. If the error message goes away, replace the device. If the error message remains, have the keyboard and cable or the computer serviced.
Chapter 6. Solving Problems 73
POST Message Description
601 A failure occurred during testing of the diskette drive and
diskette-drive controller. This error can be caused by a loose or incorrectly connected cable, a failing drive, or a failing system board.
Note: The computer can be used, but one or more diskette drives
might not work.
Action: Verify that all diskette drive cables are properly installed and securely connected.
Running the diagnostic programs might isolate the diskette drive that failed, but you must have your computer serviced. (See “Diagnostic Programs” on page 97 for information about diagnostic programs provided with your computer.)
602 The computer is not able to start the diskette in the drive. The
diskette might be damaged or formatted incorrectly. Action: Try another startable diskette that is formatted correctly
and is in good condition. (For information and instructions on formatting diskettes, refer to Understanding Your Personal Computer and your operating-system documentation.)
If this does not correct the problem, have the computer serviced.
604 A failure occurred during the testing of a diskette drive.
Action:
1. Verify that the Configuration/Setup Utility Program correctly reflects the type of diskette drive you have installed. (For instructions on using the Configuration/Setup Utility Program, refer to Chapter 4, “Configuring Your Computer” on page 39.)
2. Run the diagnostic programs. (See “Diagnostic Programs” on page 97 for information about diagnostic programs provided with your computer.)
3. If the diagnostic programs detect a failure, replace the diskette drive.
If the problem cannot be isolated and corrected, have the computer serviced.
74 Using Your Personal Computer
POST Message Description
662 A diskette drive configuration error occurred.
Action:
1. Verify that the Configuration/Setup Utility Program correctly reflects the number of diskette drives you have installed. (For instructions on using the Configuration/Setup Utility Program, refer to Chapter 4, “Configuring Your Computer” on page 39.)
2. If you installed or removed a diskette drive, you must save the new configuration in the Configuration/Setup Utility Program. Refer to the Important text box on page 40 for further information and instructions on saving the configuration.
If this does not correct the problem, have the computer serviced.
1762 A hard disk configuration error occurred.
Action:
1. Verify that the Configuration/Setup Utility Program correctly reflects the number of hard disk drives you have installed. (For instructions on using the Configuration/Setup Utility Program, refer to Chapter 4, “Configuring Your Computer” on page 39.)
2. If you added or removed a hard disk drive, you must save the new configuration in the Configuration/Setup Utility Program. Refer to the Important text box on page 40 for further information and instructions on saving the configuration.
If the problem cannot be isolated and corrected, have the computer serviced.
178X A failure occurred during testing of the hard disk drive or a
primary or secondary IDE device.
Action:
1. Run the diagnostic programs. (See “Diagnostic Programs” on page 97 for information about diagnostic programs provided with your computer.)
2. If the diagnostic programs detect a failure, replace the defective hard disk drive or primary or secondary IDE or EIDE device.
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 75
POST Message Description
1800 A PCI adapter has requested a hardware interrupt that is not
available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the hardware interrupt settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required interrupt resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all hardware interrupts are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make an interrupt available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the hardware
interrupt used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make an interrupt available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
76 Using Your Personal Computer
POST Message Description
1801 A PCI adapter has requested memory resources that are not
available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the memory resource settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required memory resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all memory resources are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make memory available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
resources used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make memory available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 77
POST Message Description
1802 A PCI adapter has requested an I/O address that is not available,
or the PCI adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the I/O address settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required I/O resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all I/O addresses are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make an I/O address available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the I/O
address used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make an I/O address available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
78 Using Your Personal Computer
POST Message Description
1803 1804
A PCI adapter has requested a memory address that is not available, or the PCI adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the memory address settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required memory resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all memory addresses are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make a memory address available to the PCI adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
address used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make a memory address available to the PCI adapter you want to install.
If the problem cannot be isolated and corrected, have the computer serviced.
1805 A PCI adapter read-only memory (ROM) error occurred.
Action: Remove all of the PCI adapters that are not required for system startup and reinstall them one at a time, retesting after each is reinstalled. When an adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 79
POST Message Description
1850 A Plug and Play adapter has requested a hardware interrupt that
is not available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the hardware interrupt settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required interrupt resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all hardware interrupts are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make an interrupt available to the Plug and Play adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the hardware
interrupt used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make an interrupt available to the Plug and Play adapter you want to install.
5. If your system will be loading a Plug and Play operating system, ensure that Plug and Play Operating System is set to Yes.
6. Ensure that the address decode value for the adapter is properly set.
If the problem cannot be isolated and corrected, have the computer serviced.
80 Using Your Personal Computer
POST Message Description
1851 A Plug and Play adapter has requested memory resources that are
not available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the memory resource settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required memory resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all memory resources are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make memory available to the Plug and Play adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
resources used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make memory available to the Plug and Play adapter you want to install.
5. If your system will be loading a Plug and Play operating system, ensure that Plug and Play Operating System is set to Yes.
6. Ensure that the address decode value for the adapter is properly set.
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 81
POST Message Description
1852 A Plug and Play adapter has requested an I/O address that is not
available, or the Plug and Play adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the I/O address settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required I/O resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all I/O addresses are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make an I/O address available to the Plug and Play adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the I/O
address used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make an I/O address available to the Plug and Play adapter you want to install.
5. If your system will be loading a Plug and Play operating system, ensure that Plug and Play Operating System is set to Yes.
6. Ensure that the address decode value for the adapter is properly set.
If the problem cannot be isolated and corrected, have the computer serviced.
82 Using Your Personal Computer
POST Message Description
1853 1854
A Plug and Play adapter has requested a memory address that is not available, or the Plug and Play adapter might be defective.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the memory address settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required memory resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all memory addresses are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make a memory address available to the Plug and Play adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the memory
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make a memory address available to the Plug and Play adapter you want to install.
5. If your system will be loading a Plug and Play operating system, ensure that Plug and Play Operating System is set to Yes.
6. Ensure that the address decode value for the adapter is properly set.
If the problem cannot be isolated and corrected, have the computer serviced.
address used by the removed adapter to Available before installing another adapter.
Chapter 6. Solving Problems 83
POST Message Description
1855 A Plug and Play adapter read-only memory (ROM) error occurred.
Action: Remove all of the Plug and Play adapters that are not required for system startup and reinstall them one at a time, retesting after each is reinstalled. When an adapter fails, replace it.
If the problem cannot be isolated and corrected, have the computer serviced.
84 Using Your Personal Computer
POST Message Description
1856 A Plug and Play adapter has requested a DMA address that is not
available.
Action:
1. Make sure that settings for all ISA legacy adapters are correct in the Configuration/Setup Utility Program. If the DMA address settings are not correct, change and save the settings. Setting the resources used by ISA legacy adapters to Not available enables the Plug and Play function to configure around the legacy adapters.
For background information on PCI, ISA, Plug and Play, and legacy (non-Plug and Play) adapters, refer to Installing Options in Your Personal Computer. For information about required DMA resource settings for ISA legacy adapters, refer to the documentation that comes with these adapters. For instructions on using the Configuration/Setup Utility Program, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure that switches on all ISA legacy adapters are set correctly. For information about switch settings, refer to the documentation that comes with the ISA legacy adapters.
3. If all DMA addresses are being used by ISA legacy adapters, you might need to remove an ISA legacy adapter to make a DMA address available to the Plug and Play adapter you want to install. For instructions on removing adapters, see Installing Options in Your Personal Computer.
Note: If you remove an ISA legacy adapter, set the DMA
address used by the removed adapter to Available before installing another adapter.
4. If you have other PCI or Plug and Play adapters installed, you might need to remove one of these adapters to make a DMA address available to the Plug and Play adapter you want to install.
5. If your system will be loading a Plug and Play operating system, ensure that Plug and Play Operating System is set to Yes.
6. Ensure that the address decode value for the adapter is properly set.
If the problem cannot be isolated and corrected, have the computer serviced.
Chapter 6. Solving Problems 85
POST Message Description
1962 A startup sequence error occurred.
Action:
1. Make sure the settings for startup options are correct in the Configuration/Setup Utility Program. If the settings are not correct, change and save them. For instructions, see Chapter 4, “Configuring Your Computer” on page 39.
2. Make sure the primary IDE (or, if applicable, SCSI) cable is properly installed and securely connected.
3. Make sure all adapters are installed correctly. For instructions on adding adapters, see Installing Options in Your Personal Computer.
If the problem cannot be isolated and corrected, have the computer serviced.
2462 A video configuration error occurred.
Action:
1. Make sure the monitor signal cable is securely attached to the monitor connector. (For the location of the monitor connector, refer to “Desktop Model Connectivity” on page 13.)
2. If you just added or removed video memory, you must save the new configuration in the Configuration/Setup Utility Program. Refer to the Important text box on page 40 for further information and instructions on saving the configuration.
If the problem cannot be isolated and corrected, have the computer serviced.
I9990301 A hard disk failure occurred.
Action: Have the computer serviced.
Other Numbers The computer POST found an error.
Action: Follow the instructions on the screen.
86 Using Your Personal Computer
Loading...