Download presentation
Presentation is loading. Please wait.
1
Memory Addresses
2
How Memory Addresses Are Used
3
How Memory Addresses Are Used
Applies to DOS and Windows 9x only Windows NT and Windows 2000 use a different memory-mapping design
5
Memory Addresses Are assigned during the boot process
BIOS or real-mode device drivers may only work if given a specific group of addresses (usually in the upper memory range between 640K and 1024K) Shadowing ROM (aka shadow RAM) ROM programming code copied into RAM to speed up system operation because of faster access speed of RAM
6
Input/Output Addresses
Numbers used by devices and the CPU to manage communication between them Also called port addresses or ports
7
Input/Output Addresses
8
Interrupt Request Numbers and I/O Addresses for Devices
continued
9
Interrupt Request Numbers and I/O Addresses for Devices
10
Direct Memory Access (DMA) Channels
A shortcut method whereby an I/O device can send data directly to memory, bypassing the CPU
11
Direct Memory Access (DMA) Channels
12
Tying It All Together To allocate system resources and use them to manage hardware devices, at startup a hardware device is assigned: An IRQ by which it can signal the CPU that it needs attention Some I/O addresses by which the CPU and the device can communicate Some memory addresses that indicate where the program to manage the device can be stored Perhaps a DMA channel to speed up sending its data to memory
15
Configuration Data and How It Is Stored
Also called setup information Information about the computer’s hardware Stored in one of these devices: DIP switches CMOS setup chip Jumpers
16
Setup Data Stored by DIP Switches
17
Setup Data Stored on a CMOS Chip
18
Setup Data Stored by Jumpers
19
Passwords Stored on CMOS
Startup password Required by computer during boot process to gain access to the PC Also called power-on password
20
Protecting Data, Software, and Hardware
Saving and restoring setup information in CMOS Keeping OS rescue disks Backing up the hard drive Documentation Damage from electricity
21
Saving and Restoring Setup Information in CMOS
Two common utility software programs for backing up setup information to a disk to be used to recover lost setup information Nuts & Bolts Norton Utilities
22
Saving Setup Information Using Nuts & Bolts
23
Saving Setup Information Using Nuts & Bolts
24
Saving Setup Information Using Norton Utilities
25
Saving Setup Information Using Norton Utilities
26
Saving Setup Information Using Norton Utilities
27
Keeping OS Rescue Disks
Allows you to boot a computer Essential for every computer
28
Backing Up Your Hard Drive
Backup An extra copy of a file or files made to a different location or storage media Backup policy depends on what you are backing up
29
Documentation Keep hardware and software documentation well labeled in a safe place
30
Damage from Electricity
Computers and data can be destroyed by two kinds of electricity Static electricity (ESD or electrostatic discharge) Power spikes, including lightning Practical protection against damage Never touch the inside of a computer when it is turned on Be grounded when computer is on Use devices for protection against electrical surges and lightning
31
Chapter Summary How individual computer components work together to perform tasks
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.