• Keyboard Shortcuts

    Shortcut keys help provide an easier and quicker method of navigating and executing commands in the computer software.

  • Hardware Tips

    Learn about the latest computer hardware and find out how to diagnose

  • Knowledge Practise questions and answers

    Here you can practise more questions and answers to improve your knowledge on computer

Wednesday 30 August 2017

How to protect yourself while on the Internet

How to protect yourself while on the Internet


Below are all of the steps and suggestions everyone should follow to keep their computers and their personal information safe while being connected to the Internet.
Note: All of the following information should be followed and understood by all computer users regardless of what type computer, operating system, or device they are using.

Verify data is encrypted



When sending confidential information over the Internet, such as usernames, passwords, or credit card numbers, only send it securely. To verify this, look for a small lock (Internet browser security lock) in the bottom right corner of your browser window or next to the address bar (as shown below). If visible, this lock should also be in the locked position and not unlocked.

Internet Explorer secure address bar


We also suggest making sure the URL begins with https, as shown above.


While the lock is in the locked position, data is encrypted, which helps anyone from understanding the data if it's intercepted. When no lock is visible or in the unlocked position, all information is plaintext and could be read if intercepted. If a web page is not secure, such as an online forum, use a password you wouldn't use with protected sites, such as your online banking website.


Use a safe password

Websites that store confidential data, such as an online bank site, need to use strong passwords. Also, it is highly recommended that you use a different password for each website that requires a login. If you need help remembering your passwords, consider using a password manager.


When available always enable two-factor authentication

Two-factor authentication adds additional protection by requiring an additional step in verifying a login. Typically with two-factor authentication, after verifying your password, if the service does not recognize your computer, it sends your phone a text message with a verification code. If someone had your password but did not have your phone, even with a valid password, they cannot access your account.


Two-factor authentication should at the very least be enabled on your e-mail account. Most account passwords can be reset using the forgot password feature, which sends a new password or link to reset the password to the e-mail address on file. If anyone has access to your e-mail account, they could get the new password for your account.

Keep your operating system and software up-to-date

Many of the updates that are released by developers of operating systems are related to computer security related issues. Make sure your operating system is always running the latest updates and that you're running an operating system that is still supported by the developer. Older operating systems like Microsoft Windows XP are no longer supported by Microsoft and therefore no longer get updates.


Always be cautious of e-mail links and attachments

One of the most common methods of spreading viruses and malware is through e-mail attachments and hyperlinks sent through e-mail. Always be extremely cautious when dealing with any attachments or links in e-mails you've received from anyone (even friends and family).

E-mail is not encrypted


Never transmit confidential data over e-mail, such as passwords, credit card information, etc. E-mail is not encrypted, and if intercepted by a third-party, it could be read.
Be aware of phishing scams

Familiarized yourself with phishing scams and techniques, which are used to trick you into divulging your account information. Online banking sites, Paypal, eBay, Amazon, and other popular sites that require logins are popular targets.


Use caution when accepting or agreeing to prompts


When you're prompted to install any program or add-on, make sure to read and understand the agreement before clicking on the Ok button. If you do not understand the agreement or feel it is not necessary to install the program, cancel or close the window.
Additionally, when installing any program, watch for any check box that asks if it's ok to install a third-party program, toolbar, etc. These are never required and often cause more issues than good. Leave these boxes unchecked.


Be cautious where you're logging in from


Business


Your place of work can install key loggers or use other methods of monitoring the computer while online. Someone who has access to this information could read these logs and gather usernames and passwords. Also, do not store any passwords in your browser if your computer is shared with other coworkers.


Wireless network


When on a wireless network, realize that all information being sent to and from your computer can be intercepted and read by someone nearby. Prevent this from happening by only logging onto a secure network using WEP or WPA (only use WEP if WPA is not available). If this is a home wireless network, make sure it is secure.


Friends house


Be concerned when logging into an account on a friend's computer. A computer or network you are not familiar with could intentionally or unintentionally log usernames and passwords. Finally, when logging into any site on a friend's computer, never save the password information on their browser.


Use an alternative browser

Older versions of Internet Explorer are notoriously insecure. If you are using Internet Explorer as your browser, consider an alternative browser such as Google Chrome or Mozilla Firefox. If you are running Windows 10 and want to continue to use a Microsoft browser, consider using Microsoft Edge instead of Internet Explorer.


Be aware of those around you

While at work, school, library, or anywhere that has people around who could look at the monitor, be cautious of anyone shoulder surfing. Someone could watch you type in your password, which would give them access to your account.


If you need information displayed on the screen to remain private, consider a privacy filter for the display.


Update Internet browser plugins


Often many attackers find security vulnerabilities through browser plugins, such as Adobe Flash. Make sure all installed Internet plug-ins are up-to-date.


Secure saved passwords

Make sure to store passwords and login information in a secure area. Never write login information on a sticky note or in a text file that is not encrypted.

To save your passwords, we recommend using a password manager, which stores all login information and securely encrypts and password protects that information.


When saving password information in a browser, it may be visible to anyone who has access to your Internet browser. For example, without a master password setup in Firefox, anyone can see all stored passwords.


Protect yourself against malware, spyware, and viruses

Protect your computer from viruses by installing an anti-virus program on the computer. If you do not want to install anti-virus protection and your computer is running a newer version of Windows, at least have Windows Defender running on the computer. Also, having a malware protection program on the computer, such as Malwarebytes, is also a good method of protecting your computer against malware and spyware.


Verify the checksum of downloaded files

If you've downloaded a program from a website that also lists a file checksum, make sure the checksum matches the file that you've downloaded. Verifying the checksum of a downloaded program can help verify that the program you are installing is what you want to install.


How to verify the checksum of an installer file.


Use a third-party service to confirm the safety and security of a page

We recommend the free Web of Trust (WOT) tool to verify the safety of all websites on the Internet. If you or anyone else using your computer happens to visit a site that has been marked by the community as not being safe, you'll receive a warning.


Related Articles:)

  • How to prevent unauthorized computer access.
  • Protecting children from harmful material and people on the Internet.
  • Is online banking safe?
  • How to protect my webcam from being hacked.
  • How do I know if my computer has been hacked?
  • How can I be anonymous on the Internet?
  • How does a computer get infected with a virus or spyware?
  • Top 10 computer mistakes beginners make.

How to connect to the Internet

How to connect to the Internet

Before connecting to the Internet, you must determine how you're going to connect to the Internet. Are you going to be connecting to the Internet using a modem or a broadband Internet connection? Or do you want to use your smartphone to provide Internet service to your computer? Below is additional information about each of these types of connections and how to get connected with them.


Note: If you are reading this page on a computer or computing device you are on a computer connected to the Internet.
Connecting to the Internet with a modem
Connect to the Internet with broadband
Connect to the Internet using a smartphone
Connecting to the Internet with a modem

Connecting to the Internet using a computer modem (e.g. 56 K modem) is still a method of getting access to the Internet, despite the growing use of broadband Internet connections. 


Although connecting to the Internet with a modem can be a cheaper solution, it is a much slower connection. If you plan on doing more than the occasional web surfing and reading and sending e-mail, you should consider broadband. For example, if you want to play games over the Internet, it is recommended that you use a broadband connection instead of a modem.

Using a modem to connect to the Internet requires your computer to have an internal or external modem. You must also have a home phone line (landline).
Note: Not all new computers have a modem. If your computer has a modem, it should have an RJ-11 connection (not to be confused with an RJ-45 connection).
Note: A computer modem should not be confused with a broadband or cable modem.

Once you have verified your computer is compatible with connecting to the Internet, you need to find an Internet Service Provider (ISP). In most areas, you can connect to the Internet using a local ISP. Alternatively, you may want to consider a large ISP, such as AOL or MSN, which provide Internet service in many areas all over the world.


Tip: Your ISP should provide you with instructions on how to connect your modem to their Internet service, as well as troubleshooting support for connectivity issues.


Check your local listings for companies that can provide you with an Internet connection. Also, talk with your friends or family to see who they like to use as an Internet Service Provider.


Connect to the Internet with broadband


Connecting to the Internet over broadband is a popular solution for connecting to the Internet today. Broadband is a much faster solution for connecting to the Internet when compared to a standard 56k modem. Having more bandwidth allows you to do more exciting things on the Internet, such as watch movies, listen to music, and playing games, as well as much faster load times for websites.


Unfortunately, broadband service is not available in all areas. Therefore, before getting this service, you must first determine if it is available in your area. Most broadband services are provided by your local phone companies or cable companies. Contact your local phone or cable service providers to see if they have broadband service available in your area.


If broadband service is available in your area, the company provides you with the hardware (e.g. cable modem) required to connect to their service. This hardware typically connects to a Network card (RJ-45 connector) or USB connection. If your provider does not offer a wireless router you can purchase and connect a wireless router (shown above) to connect any Wi-Fi to the Internet.


Note: Your ISP should provide you with instructions on connecting your computer to their service, as well as support if you have trouble connecting to or using their Internet service. Some broadband ISP companies will even send a technician to your home and set up Internet service to your computer for you.


Connect to the Internet using a smartphone


You may also be able to use your smartphone as an Internet connection for your computer. Doing so requires you to use tethering software, which allows the smartphone to act as a modem or wireless access point for the computer to use for Internet access.


Configuring the tethering software and the computer to use your smartphone for Internet service differs depending on which tethering software you use, as well as the type of phone you have. Check online for specific instructions for the tethering software and smartphone you are using.


However, not all smartphones are capable of tethering, and not all cell phone carriers allow smartphones on their network to be used for tethering. Cell phone carriers that allow tethering may not provide support for tethering. These carriers may also charge an additional fee to tether their smartphone.


Tip: Before tethering your smartphone, we recommend contacting the phone carrier to see if it supported and how much they charge.



Related Articles:)

  • How do computers connect to each other over the Internet?
  • How can I protect myself while online?
  • What things to do when bored on the Internet.
  • Protecting children from harmful material and people on the Internet.
  • See the Internet definition for further information and related links.
  • How do I find what computer modem I have?

How can I learn more about computers?

How can I learn more about computers?

This document is for anyone interested in learning more about their computer and how it works. Here you will find all related documents throughout Computer that can teach you everything you want to know about your computer.


Computer Overview

Understanding each of the major hardware components that make up a computer is always a good first step in learning more about computers. To learn more about each of the components in the computer, its connections, as well as a full explanation of each of the internal parts of a computer, see our computer definition.

15 computer topics


Transistors - The computer contains millions of transistors, which are used to create machine language using logic gates that turn on and off the circuits.
 

Machine language - All computers and electronic devices communicate in binary, which is a series of 0's and 1's or Off and On electrical signals. All software written on your computer is created in a high-level programming language that humans can understand. 
When complete, the program is compiled into a low-level machine language that computers understand.
 

ASCII codes - Each binary 0 or 1 is considered a bit and each number, letter, or other character is made up of eight bits (one byte). A common method for storing and editing text is done with ASCII codes, which is one byte of binary. For example, the lowercase letter "a" has an ASCII code decimal value of 97, which is 01100001 in binary.
 

Motherboard - The Motherboard is the largest circuit board in the computer that holds and connects everything together. Without the motherboard, components like your processor and memory could not communicate with each other.
 

Computer memory - Not to be confused with disk storage, the computer memory (RAM) is volatile memory and is used to store currently running applications. When the computer is turned off, all data in the memory is lost.
 

Computer disk storage - A non-volatile type of memory, disk storage like a hard drive is what stores your information even when the computer is turned off. All of your personal files, documents, songs, photos, etc. are stored in a storage device.
 

ROM - Another type of memory, read-only memory (ROM) is a memory chip that has data which can only be read. Most computers today have a programmable read-only memory (PROM), which is still read-only, but can be re-programmed if needed through a firmware update.
 

Memory capacity - All memory and storage has a total capacity that is written using abbreviations such as KB, MB, GB, and TB. See the full overview of all computer capacities for a complete understanding of all values.
 

Processor - The Central Processing Unit (CPU) is the component responsible for processing all instructions from software and hardware.
 

Software and Hardware - Software is instructions and code installed into the computer, like the Internet browser you're using to view this page. Hardware is a physical device you can touch, like the monitor you're using to display this page. See the differences between computer hardware and software for more information.
 

Input/Output - A computer works with a human by inputting data using an input device such as a keyboard, having the processor process that data, and then displaying the output on an output device such as a monitor. The printer is also another output device and is what allows you to get a hard copy of documents and pictures stored on the computer.
 

Expansion cards - An expansion card is a card that can be added to the computer to give it additional capabilities. A video card, modem, network card, and sound card are all examples of expansion cards. However, many computers may also have on-board devices, such as a sound card and network card that are built onto the motherboard. For a laptop computer, additional cards are added into the PC Card slot.
 

Programming - All software running on the computer has been created using a programming language by a computer programmer.
 

Operating system - Every computer must have an operating system for software to communicate with the hardware. For example, most IBM compatible computers run the Microsoft Windows operating system and have the option to run alternative operating systems, such as a Linux variant. Apple computers only run macOS.
 

Network - Computers communicate with other computers over a network using a network interface card (NIC) or Wi-Fi that connects to a router. There are two primary types of networks: a local area network (LAN) and a wide area network (WAN). The Internet is also considered a network, which uses the TCP/IP protocol.
 

How does a computer work?

Knowing how the computer works after you press the power button is also an excellent way to learn more about your computer.
 

How to use a computer

If you are new to using a computer and need additional help or want to gain a better understanding on how to use a computer see our how to use a computer document.
 

Computer history

The history of computers and how they have progressed over the years is another great way get a better understanding of computers. We've listed several thousand key events in our computer history section and list hundreds of computer pioneers who have made the computer industry what it is today.

Keep informed

Computers and their hardware and related software are constantly evolving. Try to keep as up-to-date as possible by reading computer related news, blogs, RSS feeds, newsletters, forums, and following computer people on social networking sites like Twitter.
 

Computer related news sites

Computer quiz

Ready to test yourself and learn more about computers at the same time? Take the Computer  quiz, which contains hundreds of computer related questions. After each question is answered, a brief description of the answer is given, as well as additional information and related links. When the quiz is completed, you'll get a complete overview of what categories you may need to learn more about and links to where you can find that information.


Free college courses

Many of the big colleges and universities have posted free online courses that can be watched by anyone, covering a wide range of computer related topics. Watching these online can give you a similar education to what you may get by going to school.


Watch free online lectures
Online free books

There are hundreds of thousands of online computer books and computer related e-books that can be downloaded. See the eBook definition for a full listing of places to find books online for free and legally.


What computer books would you recommend reading?

How to find information about my computer

How to find information about my computer

Your computer has dozens of hardware components and can be running thousands of different programs. Below is a complete list of how to find more information about all of the parts of your computer and everything it may be running.



Types of computer

In the past, it was much easier to identify the type of computer you were using. Today, there are desktops, laptops, netbooks, tablets, hybrid computers, and smartphones that are all considered a computer. Below is a visual example of the more common computers to give you a better comparison of the different types of computers.
 


Once you have identified the type of computer, it can make it easier to help identify the software and hardware running on the computer.


Model number and Serial number


Determining your computer model number and serial number can help you troubleshoot the computer and can also help you find the latest drivers and other updates for your computer. With Desktop computer many OEM's list the information on the side of the computer, like the Hewlett Packard computer sticker shown to the right.


Laptop, Netbook, and Hybrid computers often have the model and serial number on the bottom of the computer. If you cannot find this information, manufacturers like Dell, HP, Lenovo, and Acer also have tools on the computer and websites to help identify your computer.


Operating system


The operating system is what allows your computer software to communicate with the computer hardware. Today, there are several operating systems that can be installed on a device including Microsoft Windows, Apple macOS, Apple iOS, Linux, Chrome OS and Android. For a traditional computer (desktop or laptop) you are going to be using either Microsoft Windows, Apple macOS, or Linux.


Desktop, laptop, Netbook, and Hybrid computers


The most common operating system for these types of computers is Microsoft Windows, Apple Mac, and Linux. You can quickly identify if the computer is running Windows if it has a Start button at the bottom-left corner of the screen. An Apple computers can be identified by the Apple menu at the top of the screen or the dock at the bottom of the screen. Linux computers get a little more tricky because of all of the different type of interfaces that they can be using.

Tip: Keep in mind that all of these operating systems have different versions. For instance, as of this writing the newest version of Windows is Windows 10, but Windows 8 and 7 are still supported.


Tablet 
Today, there are two strong competitors making operating systems for tablets, Apple, who makes iOS and Google, who make Android. If you are trying to identify between the two operating systems because they look similar, you can determine what operating system your tablet is running by looking at the top bar. Apple places the time in the top center, and Google places the time in the top-right of the home screen.
 

To find the version information for either of these operating systems follow the steps below.
 

  • With Android click Apps, Settings, and then About device (Android version)
    With Apple click Settings, General, About

Smartphone
Like a tablet, there are two strong competitors who make operating systems for smartphones, Apple, who makes iOS and Google, who make Android. There are also many smaller competitors including BlackBerry, who makes BlackBerry OS and Microsoft, who makes Windows Phone.
To find the version information for either Apple or Android operating system follow the steps below.


  • With Android click Apps, Settings, and then About device (Android version)
  • With Apple click Settings, General, About

Software

There are thousands of programs and apps that can be installed and the best way to find the version of a program you are using is to view the help or about for that program. Information about the program and version information can be accessed through the help section in the file menu. With a desktop or laptop computer, you can quickly open this section in almost all programs by pressing the F1 key.


Hardware
There are dozens of hardware components inside your computer, and peripherals that can be connected to your computer. See the link below for related links on identifying all of the hardware in your computer.


  • How to find what hardware is installed in the computer.
Related Articles:)

How can I learn more about computers?
See our desktops, laptops, tablets, hybrid computers, and smartphones for further information about each of these devices and related links.

Wednesday 23 August 2017

How do I clear my Internet browser history?

How do I clear my Internet browser history?

As you browse the Internet, most web page data is cached locally on your computer to help pages load faster and reduces the amount of data you need to transfer over your Internet connection.
 

To help keep your browsing history private, and to free up disk space on your computer, you can clear your local browsing history. Select your Internet browser from the following list to get started.
 

  • Microsoft Edge
  • Mozilla Firefox
  • Google Chrome
  • Google Chrome on Android
  • Google Chrome on iOS
  • Opera
  • Safari
  • Safari on iOS
  • Microsoft Internet Explorer
  • Netscape Navigator
  • Additional Tips

Microsoft Edge

Microsoft Edge is the default browser in Windows 10, replacing Internet Explorer on new computers.
  1. View Edge history
  2. Clear Edge history
To view your Edge browsing history:
In a Microsoft Edge browser window, open the history menu using the keyboard shortcut Ctrl+H. You can also access this menu with the following steps:

  1. Click the Hub Microsoft Edge Hub button in the upper right-hand corner of the window.
  2. Click the History Microsoft Edge History icon icon to open the history menu.

This menu allows you to view the pages you've visited in chronological order.


To clear your Edge browsing history:

  1. Open the history menu as described above.
  2. Click Clear all history.
  3. Check the box next to each type of data you'd like to clear. Browsing history is the first item listed, so make sure this is checked.
  4. Click Show more for additional options. Select any that you would like to clear.
  5. Click Clear to erase the selected data.
  6. If you want the selected items to be cleared automatically when you close your browser, set Always clear this when I close the browser to On.
  7. When you're done, click the Hub Microsoft Edge Hub icon button.


Mozilla Firefox

There are several ways to view and edit your history in Firefox.
  1. View Firefox history
  2. Clear Firefox history
1.To view your browsing history in Firefox:
If you do not have a custom homepage set, you can click the History button in any new browsing window.




2.  Or you can always view your browsing history in the History sidebar. Open it by pressing Alt to show the menu bar, then choosing View → Sidebar → History. Or, you can use the keyboard shortcut, Ctrl+H.
 

3. You can also view your history if you click the hamburger menu button Firefox Menu in the top right-hand corner of your window, then click History. This gives you a quick look at your history. From this menu you can also View History Sidebar.

Lastly, you can open your browsing history in the Firefox Library. To open this view, press Alt to show the menu bar, then choose History → Show All History. The keyboard shortcut for this view is Ctrl+Shift+H. When viewing your history here, you can highlight individual pages in your history and press Del to delete them. Right-click any item for more options.








To clear your browsing history in Firefox:
Click the hamburger menu button Firefox Menu icon and select History.
Choose Clear Recent History...
The Clear Recent History window will open. In the drop-down menu, choose how far back you want to clear the history, then click Clear Now.

You can also access this menu using the keyboard shortcut Ctrl+Shift+Del.



Computer POST and beep codes

Computer POST and beep codes


The computer POST (power-on self-test) checks a computer's internal hardware for compatibility and connection before starting the remainder of the boot process. If the computer passes the POST, the computer may give a single beep (some computers may beep twice) as it starts and continue to boot. However, if the computer fails the POST, the computer will either not beep or generate a beep code that tells the user the source of the problem.


If your computer has an irregular POST or a beep code not mentioned below, follow the POST troubleshooting steps to determine the failing hardware component.




  • AMI BIOS beep codes
  • Award BIOS beep codes
  • Dell beep codes
  • IBM BIOS beep codes
  • Macintosh startup tones
  • Phoenix BIOS beep codes
  • Motherboard help

AMI BIOS beep codes

Below are the AMI BIOS Beep codes that can occur. However, because of the wide variety of different computer manufacturers with this BIOS, the beep codes may vary.


Beep Code                                   Descriptions

1 short                          DRAM refresh failure
2 short
                          Parity circuit failure
3 short
                          Base 64 K RAM failure
4 short
                          System timer failure
5 short
                          Process failure
6 short
                          Keyboard controller Gate A20 error
7 short
                          Virtual mode exception error
8 short
                          Display memory Read/Write test failure
9 short
                          ROM BIOS checksum failure
10 short
                        CMOS shutdown Read/Write error
11 short
                        Cache Memory error
1 long, 3 short
               Conventional/Extended memory failure
1 long, 8 short
               Display/Retrace test failed
two-tone siren
               Low CPU Fan speed, Voltage Level issue


AWARD BIOS beep codes

Below are Award BIOS Beep codes that can occur. However, because of the wide variety of different computer manufacturers with this BIOS, the beep codes may vary.
 

Beep Code                         Description

1 long, 2 short                 Indicates a video error has occurred and the BIOS 
                                      cannot initialize the video screen to display any                                       additional information.
1 long, 3 short                 Video card not detected (reseat video card) 

                                      or bad video card
Beeps repeating 
endlessly                          RAM problem.
Repeated high 

frequency beeps 
while PC is running            Overheating processor (CPU)
Repeated beeps 

alternating high & 
low frequency                     Issue with the processor (CPU), possibly damaged

If any other correctable hardware issues are found, the BIOS displays a message.
 

Dell beep codes



Beep Code                                     Description

1 beep                            BIOS ROM corruption or failure
2 beeps
                          Memory (RAM) not detected
3 beeps
                          Motherboard failure
4 beeps
                          Memory (RAM) failure
5 beeps
                          CMOS Battery failure
6 beeps
                          Video card failure
7 beeps
                          Bad processor (CPU)
 

For other Dell beep codes, please refer to Dell's Beep Codes and PSA Diagnostics Chart page.
 

IBM BIOS beep codes

Below are general IBM BIOS Beep codes that can occur. However, because of the wide variety of models shipping with this BIOS, the beep codes may vary.


Beep Code                                     Description

No Beeps                               No Power, Loose Card, or Short.
1 Short Beep
                          Normal POST, computer is ok.
2 Short Beep
                          POST error, review screen for error code.
Continuous Beep
                     No Power, Loose Card, or Short.
Repeating Short Beep              No Power, Loose Card, or Short.
1 Long and 1 Short Beep         Motherboard issue.
1 Long and 2 Short Beeps        Video (Mono/CGA Display Circuitry) issue.
1 Long and 3 Short Beeps.       Video (EGA) Display Circuitry.
3 Long Beeps                          Keyboard or Keyboard card error.
1 Beep, Blank or 

Incorrect Display                     Video Display Circuitry.
 

Macintosh startup tones



Tones                                                         Error

Error Tone. (two sets of 
different tones)                          Problem with logic board or SCSI bus.
Startup tone, drive spins, 

no video                                    Problem with video controller.
Powers on, no tone.                    Logic board problem.
High Tone, four higher tones.       Problem with SIMM.

Phoenix BIOS beep codes

Below are the beep codes for Phoenix BIOS Q3.07 OR 4.X


Beep Code                              Description and what to check

1-1-1-1               Unconfirmed beep code. Reseat RAM chips or replace 
                          RAM chips as possible solution
1-1-1-3
               Verify Real Mode.
1-1-2-1
               Get CPU Type.
1-1-2-3
               Initialize system hardware.
1-1-3-1
               Initialize chipset registers with initial POST values.
1-1-3-2
               Set in POST flag.
1-1-3-3
               Initialize CPU registers.
1-1-4-1
               Initialize cache to initial POST values.
1-1-4-3
               Initialize I/O.
1-2-1-1
               Initialize Power Management.
1-2-1-2
               Load alternate registers with initial POST values.
1-2-1-3
               Jump to UserPatch0.
1-2-2-1
               Initialize keyboard controller.
1-2-2-3
               BIOS ROM checksum.
1-2-3-1
               8254 timer initialization.
1-2-3-3
               8237 DMA controller initialization.
1-2-4-1
               Reset Programmable Interrupt Controller.
1-3-1-1
               Test DRAM refresh.
1-3-1-3
               Test 8742 Keyboard Controller.
1-3-2-1
               Set ES segment to register to 4 GB.
1-3-3-1
               28 Autosize DRAM.
1-3-3-3
               Clear 512 K base RAM.
1-3-4-1
               Test 512 base address lines.
1-3-4-3
               Test 512 K base memory
1-4-1-3
               Test CPU bus-clock frequency.
1-4-2-4
               Reinitialize the chipset.
1-4-3-1
               Shadow system BIOS ROM.
1-4-3-2
               Reinitialize the cache.
1-4-3-3
               Autosize cache.
1-4-4-1
               Configure advanced chipset registers.
1-4-4-2
               Load alternate registers with CMOS values.
2-1-1-1
               Set Initial CPU speed.
2-1-1-3
               Initialize interrupt vectors.
2-1-2-1
               Initialize BIOS interrupts.
2-1-2-3
               Check ROM Copyright notice.
2-1-2-4
               Initialize manager for PCI Options ROMs.
2-1-3-1
               Check video configuration against CMOS.
2-1-3-2
               Initialize PCI bus and devices.
2-1-3-3
               Initialize all video adapters in system.
2-1-4-1
               Shadow video BIOS ROM.
2-1-4-3
               Display Copyright notice.
2-2-1-1
               Display CPU Type and speed.
2-2-1-3
               Test keyboard.
2-2-2-1
               Set key click if enabled.
2-2-2-3
               56 Enable keyboard.
2-2-3-1
               Test for unexpected interrupts.
2-2-3-3
               Display prompt Press F2 to enter SETUP.
2-2-4-1
               Test RAM between 512 and 640 k.
2-3-1-1
               Test expanded memory.
2-3-1-3
               Test extended memory address lines.
2-3-2-1
               Jump to UserPatch1.
2-3-2-3
               Configure advanced cache registers.
2-3-3-1
               Enable external and CPU caches.
2-3-3-3
               Display external cache size.
2-3-4-1
               Display shadow message.
2-3-4-3
               Display non-disposable segments.
2-4-1-1
               Display error messages.
2-4-1-3
               Check for configuration errors.
2-4-2-1
               Test real-time clock.
2-4-2-3
               Check for keyboard errors
2-4-4-1
               Set up hardware interrupts vectors.
2-4-4-3
               Test coprocessor if present.
3-1-1-1
               Disable onboard I/O ports.
3-1-1-3
               Detect and install external RS232 ports.
3-1-2-1
               Detect and install external parallel ports.
3-1-2-3
               Re-initialize onboard I/O ports.
3-1-3-1
               Initialize BIOS Data Area.
3-1-3-3
               Initialize Extended BIOS Data Area.
3-1-4-1
               Initialize floppy controller.
3-2-1-1
               Initialize hard disk controller.
3-2-1-2
               Initialize local bus hard disk controller.
3-2-1-3
               Jump to UserPatch2.
3-2-2-1
               Disable A20 address line.
3-2-2-3
               Clear huge ES segment register.
3-2-3-1
               Search for option ROMs.
3-2-3-3
               Shadow option ROMs.
3-2-4-1
               Set up Power Management.
3-2-4-3
               Enable hardware interrupts.
3-3-1-1
               Set time of day.
3-3-1-3
               Check key lock.
3-3-3-1
               Erase F2 prompt.
3-3-3-3
               Scan for F2 key stroke.
3-3-4-1
               Enter SETUP.
3-3-4-3
               Clear in POST flag.
3-4-1-1
               Check for errors
3-4-1-3
               POST done, prepare to boot operating system.
3-4-2-1
               One beep.
3-4-2-3
               Check password (optional).
3-4-3-1
               Clear global descriptor table.
3-4-4-1
               Clear parity checkers.
3-4-4-3
               Clear screen (optional).
3-4-4-4
               Check virus and backup reminders.
4-1-1-1
               Try to boot with INT 19.
4-2-1-1
               Interrupt handler error.
4-2-1-3
               Unknown interrupt error.
4-2-2-1
               Pending interrupt error.
4-2-2-3
               Initialize option ROM error.
4-2-3-1
               Shutdown error.
4-2-3-3
               Extended Block Move.
4-2-4-1
               Shutdown 10 error.
4-3-1-3
               Initialize the chipset.
4-3-1-4
               Initialize refresh counter.
4-3-2-1
               Check for Forced Flash.
4-3-2-2
               Check HW status of ROM.
4-3-2-3
               BIOS ROM is OK.
4-3-2-4
               Do a complete RAM test.
4-3-3-1
               Do OEM initialization.
4-3-3-2
               Initialize interrupt controller.
4-3-3-3
               Read in bootstrap code.
4-3-3-4
               Initialize all vectors.
4-3-4-1
               Boot the Flash program.
4-3-4-2
               Initialize the boot device.
4-3-4-3
               Boot code was read OK.
two-tone siren    Low CPU Fan speed, Voltage Level issue


Related Articles:)


Additional information on the POST and how a computer works?

Good Morning Beautiful

Do you know????

Do you know????
/