Lenovo Personal Computer TC A51 8424 User Manual

ThinkCentre™  
ꢀꢁꢂ  
User Guide  
Types 8424, 8425, 8428  
Types 8171, 8172, 8173  
 
ThinkCentre™  
ꢀꢁꢂ  
User Guide  
Types 8424, 8425, 8428  
Types 8171, 8172, 8173  
 
Note  
Before using this information and the product it supports, be sure to read the “Important safety information” on page v and  
First Edition (April 2004)  
© Copyright International Business Machines Corporation 2004. All rights reserved.  
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract  
with IBM Corp.  
 
Contents  
© Copyright IBM Corp. 2004  
iii  
 
iv User Guide  
 
Important safety information  
This information can help you safely use your IBM® personal computer. Follow  
and retain all information included with your IBM computer. The information in  
this document does not alter the terms of your purchase agreement or the IBM  
Statement of Limited Warranty.  
Customer safety is important to IBM. Our products are developed to be safe and  
effective. However, personal computers are electronic devices. Power cords, power  
adapters, and other features can create potential safety risks that can result in  
physical injury or property damage, especially if misused. To reduce these risks,  
follow the instructions included with your product, observe all warnings on the  
product and in the operating instructions, and review the information included in  
this document carefully. By carefully following the information contained in this  
document and provided with your product, you can help protect yourself from  
hazards and create a safer computer work environment.  
Note: This information includes references to power adapters and batteries. In  
addition to mobile personal computers, IBM ships some products (such as speakers  
or monitors) with external power adapters. If you have such a product, this  
information applies to your product. In addition, your computer product may  
contain a coin-sized internal battery that provides power to your system clock even  
when the machine is unplugged, so the battery safety information applies to all  
computers.  
Conditions that require immediate action  
Products can become damaged due to misuse or neglect. Some product damage  
is serious enough that the product should not be used again until it has been  
inspected and, if necessary, repaired by an authorized servicer.  
As with any electronic device, pay close attention to the product when it is  
turned on. On very rare occasions, you might notice an odor or see a puff of  
smoke or sparks vent from your machine. Or you might hear sounds like  
popping, cracking or hissing. These conditions might merely mean that an  
internal electronic component has failed in a safe and controlled manner. Or,  
they might indicate a potential safety issue. However, do not take risks or  
attempt to diagnose the situation yourself.  
Frequently inspect your computer and its components for damage or wear or  
signs of danger. If you have any question about the condition of a component,  
do not use the product. Contact the IBM Support Center® or the product  
manufacturer for instructions on how to inspect the product and have it  
repaired, if necessary.  
In the unlikely event that you notice any of the conditions listed below, or if  
you have any safety concerns with your product, stop using the product and  
unplug it from the power source and telecommunication lines until you can  
speak to the IBM Support Center for further guidance.  
v Power cords, plugs, power adapters, extension cords, surge protectors, or power  
supplies that are cracked, broken or damaged.  
v Signs of overheating, smoke, sparks or fire.  
© Copyright IBM Corp. 2004  
v
 
 
v Damage to a battery (such as cracks, dents, creases), discharge from a battery, or  
a buildup of foreign substances on the battery.  
v A cracking, hissing or popping sound, or strong odor that comes from the  
product.  
v Signs that liquid has been spilled or an object has fallen onto the computer  
product, the power cord or power adapter.  
v The computer product, the power cord or power adapter has been exposed to  
water.  
v The product has been dropped or damaged in any way.  
v The product does not operate normally when you follow the operating  
instructions.  
Note: If you notice these conditions with a non-IBM product (such as an extension  
cord), stop using that product until you can contact the product manufacturer for  
further instructions, or until you get a suitable replacement.  
General safety guidelines  
Always observe the following precautions to reduce the risk of injury and property  
damage.  
Service  
Do not attempt to service a product yourself unless instructed to do so by the IBM  
Support Center. Use only an IBM authorized service provider who is approved to  
repair your particular product.  
Note: Some parts can be upgraded or replaced by the customer. These parts are  
referred to as Customer Replaceable Units, or CRUs. IBM expressly identifies CRUs  
as such, and provides documentation with instructions when it is appropriate for  
customers to replace those parts. You must closely follow all instructions when  
performing such replacements. Always make sure that the power is turned off and  
that the product is unplugged from any power source before you attempt the  
replacement. If you have any questions or concerns, contact the IBM Support  
Center.  
Power cords and power adapters  
Use only the power cords and power adapters supplied by the product  
manufacturer.  
Never wrap a power cord around the power adapter or other object. Doing so can  
stress the cord in ways that can cause the cord to fray, crack or crimp. This can  
present a safety hazard.  
Always route power cords so that they will not be walked on, tripped over, or  
pinched by objects.  
Protect the cord and power adapters from liquids. For instance, do not leave your  
cord or power adapter near sinks, tubs, toilets, or on floors that are cleaned with  
liquid cleansers. Liquids can cause a short circuit, particularly if the cord or power  
adapter has been stressed by misuse. Liquids can also cause gradual corrosion of  
the power cord terminals and/or the connector terminals on the adapter which can  
eventually result in overheating.  
vi User Guide  
 
 
Always connect power cords and signal cables in the correct order and ensure that  
all power cord connectors are securely and completely plugged into receptacles.  
Do not use any power adapter that shows corrosion at the ac input pins and/or  
shows signs of overheating (such as deformed plastic) at the ac input or anywhere  
on the power adapter.  
Do not use any power cords where the electrical contacts on either end show signs  
of corrosion or overheating or where the power cord appears to have been  
damaged in any way.  
Extension cords and related devices  
Ensure that extension cords, surge protectors, uninterruptible power supplies, and  
power strips that you use are rated to handle the electrical requirements of the  
product. Never overload these devices. If power strips are used, the load should  
not exceed the power strip input rating. Consult an electrician for more  
information if you have questions about power loads, power requirements, and  
input ratings.  
Plugs and outlets  
If a receptacle (power outlet) that you intend to use with your computer  
equipment appears to be damaged or corroded, do not use the outlet until it is  
replaced by a qualified electrician.  
Do not bend or modify the plug. If the plug is damaged, contact the manufacturer  
to obtain a replacement.  
Some products are equipped with a three-pronged plug. This plug fits only into a  
grounded electrical outlet. This is a safety feature. Do not defeat this safety feature  
by trying to insert it into a non-grounded outlet. If you cannot insert the plug into  
the outlet, contact an electrician for an approved outlet adapter or to replace the  
outlet with one that enables this safety feature. Never overload an electrical outlet.  
The overall system load should not exceed 80 percent of the branch circuit rating.  
Consult an electrician for more information if you have questions about power  
loads and branch circuit ratings.  
Be sure that the power outlet you are using is properly wired, easily accessible,  
and located close to the equipment. Do not fully extend power cords in a way that  
will stress the cords.  
Connect and disconnect the equipment from the electrical outlet carefully  
Batteries  
All IBM personal computers contain a non-rechargeable coin cell battery to provide  
power to the system clock. In addition many mobile products such as Thinkpad  
notebook PCs utilize a rechargeable battery pack to provide system power when in  
portable mode. Batteries supplied by IBM for use with your product have been  
tested for compatibility and should only be replaced with IBM approved parts.  
Never attempt to open or service any battery. Do not crush, puncture, or incinerate  
batteries or short circuit the metal contacts. Do not expose the battery to water or  
other liquids. Only recharge the battery pack strictly according to instructions  
included in the product documentation.  
Important safety information vii  
 
 
Battery abuse or mishandling can cause the battery to overheat, which can cause  
gasses or flame to “vent” from the battery pack or coin cell. If your battery is  
damaged, or if you notice any discharge from your battery or the buildup of  
foreign materials on the battery leads, stop using the battery and obtain a  
replacement from the battery manufacturer.  
Batteries can degrade when they are left unused for long periods of time. For some  
rechargeable batteries (particularly Lithium Ion batteries), leaving a battery unused  
in a discharged state could increase the risk of a battery short circuit, which could  
shorten the life of the battery and can also pose a safety hazard. Do not let  
rechargeable Lithium-Ion batteries completely discharge or store these batteries in a  
discharged state.  
Heat and product ventilation  
Computers generate heat when turned on and when batteries are charging.  
Notebook PCs can generate a significant amount of heat due to their compact size.  
Always follow these basic precautions:  
v Do not leave the base of your computer in contact with your lap or any part of  
your body for an extended period when the computer is functioning or when  
the battery is charging. Your computer produces some heat during normal  
operation. Extended contact with the body could cause discomfort or, potentially,  
a skin burn.  
v Do not operate your computer or charge the battery near flammable materials or  
in explosive environments.  
v Ventilation slots, fans and/or heat sinks are provided with the product for safety,  
comfort, and reliable operation. These features might inadvertently become  
blocked by placing the product on a bed, sofa, carpet, or other flexible surface.  
Never block, cover or disable these features.  
CD and DVD drive safety  
CD and DVD drives spin discs at a high speed. If a CD or DVD is cracked or  
otherwise physically damaged, it is possible for the disc to break apart or even  
shatter when the CD drive is in use. To protect against possible injury due to this  
situation, and to reduce the risk of damage to your machine, do the following:  
v Always store CD/DVD discs in their original packaging  
v Always store CD/DVD discs out of direct sunlight and away from direct heat  
sources  
v Remove CD/DVD discs from the computer when not in use  
v Do not bend or flex CD/DVD discs, or force them into the computer or their  
packaging  
v Check CD/DVD discs for cracks before each use. Do not use cracked or  
damaged discs  
Additional safety information  
DANGER  
Electrical current from power, telephone, and communication cables is  
hazardous.  
To avoid a shock hazard:  
v Do not connect or disconnect any cables or perform installation, maintenance,  
or reconfiguration of this product during an electrical storm.  
viii User Guide  
 
 
v Connect all power cords to a properly wired and grounded electrical outlet.  
v Connect to properly wired outlets any equipment that will be attached to this  
product.  
v When possible, use one hand only to connect or disconnect signal cables.  
v Never turn on any equipment when there is evidence of fire, water, or  
structural damage.  
v Disconnect the attached power cords, telecommunications systems, networks,  
and modems before you open the device covers, unless instructed otherwise  
in the installation and configuration procedures.  
v Connect and disconnect cables as described in the following table when  
installing, moving, or opening covers on this product or attached devices.  
To connect:  
To disconnect:  
1. Turn everything OFF.  
2. First, attach all cables to devices.  
3. Attach signal cables to connectors.  
4. Attach power cords to outlet.  
5. Turn device ON.  
1. Turn everything OFF.  
2. First, remove power cords from outlet.  
3. Remove signal cables from connectors.  
4. Remove all cables from devices.  
DANGER  
Le courant électrique provenant de l’alimentation, du téléphone et des câbles de  
transmission peut présenter un danger.  
Pour éviter tout risque de choc électrique :  
v Ne manipulez aucun câble et n’effectuez aucune opération d’installation,  
d’entretien ou de reconfiguration de ce produit au cours d’un orage.  
v Branchez tous les cordons d’alimentation sur un socle de prise de courant  
correctement câblé et mis à la terre.  
v Branchez sur des socles de prise de courant correctement câblés tout  
équipement connecté à ce produit.  
v Lorsque cela est possible, n’utilisez qu’une seule main pour connecter ou  
déconnecter les câbles d’interface.;  
v Ne mettez jamais un équipement sous tension en cas d’incendie ou  
d’inondation, ou en présence de dommages matériels.  
v Avant de retirer les carters de l’unité, mettez celle-ci hors tension et  
déconnectez ses cordons d’alimentation, ainsi que les câbles qui la relient aux  
réseaux, aux systèmes de té lécommunication et aux modems (sauf instruction  
contraire mentionnée dans les procédures d’installation et de configuration).  
v Lorsque vous installez, que vous déplacez, ou que vous manipulez le présent  
produit ou des périphériques qui lui sont raccordés, reportez-vous aux  
instructions ci-dessous pour connecter et déconnecter les différents cordons.  
Important safety information ix  
 
Connexion:  
Déconnexion:  
1. Mettez les unités hors tension.  
1. Mettez les unités hors tension.  
2. Commencez par brancher tous les  
2. Débranchez les cordons d’alimentation  
cordons sur les unités.  
des prises.  
3. Branchez les câbles d’interface sur des  
3. Débranchez les câbles d’interface des  
connecteurs.  
connecteurs.  
4. Branchez les cordons d’alimentation sur 4. Débranchez tous les câbles des unités.  
des prises.  
5. Mettez les unités sous tension.  
Lithium battery notice  
CAUTION:  
Danger of explosion if battery is incorrectly replaced.  
When replacing the battery, use only IBM Part Number 33F8354 or an equivalent  
type battery recommended by the manufacturer. The battery contains lithium and  
can explode if not properly used, handled, or disposed of.  
Do not:  
v Throw or immerse into water  
v Heat to more than 100°C (212°F)  
v Repair or disassemble  
Dispose of the battery as required by local ordinances or regulations.  
ATTENTION  
Danger d’explosion en cas de remplacement incorrect de la batterie.  
Remplacer uniquement par une batterie IBM de type ou d’un type équivalent  
recommandé par le fabricant. La batterie contient du lithium et peut exploser en  
cas de mauvaise utilisation, de mauvaise manipulation ou de mise au rebut  
inappropriée.  
Ne pas :  
v Lancer ou plonger dans l’eau  
v Chauffer à plus de 100°C (212°F)  
v Réparer ou désassembler  
Mettre au rebut les batteries usagées conformément aux règlements locaux.  
Modem safety information  
To reduce the risk of fire, electrical shock, or injury when using telephone  
equipment, always follow basic safety precautions, such as:  
v Never install telephone wiring during a lightning storm.  
v Never install telephone jacks in wet locations unless the jack is specifically  
designed for wet locations.  
v Never touch uninsulated telephone wires or terminals unless the telephone line  
has been disconnected at the network interface.  
v Use caution when installing or modifying telephone lines.  
x
User Guide  
 
 
v Avoid using a telephone (other than a cordless type) during an electrical storm.  
There may be a remote risk of electric shock from lightning.  
v Do not use the telephone to report a gas leak in the vicinity of the leak.  
Consignes de sécurité relatives au modem  
Lors de l’utilisation de votre matériel téléphonique, il est important de respecter les  
consignes ci-après afin de réduire les risques d’incendie, d’électrocution et d’autres  
blessures :  
v N’installez jamais de cordons téléphoniques durant un orage.  
v Les prises téléphoniques ne doivent pas être installées dans des endroits  
humides, excepté si le modèle a été conçu à cet effet.  
v Ne touchez jamais un cordon téléphonique ou un terminal non isolé avant que  
la ligne ait été déconnectée du réseau téléphonique.  
v Soyez toujours prudent lorsque vous procédez à l’installation ou à la  
modification de lignes téléphoniques.  
v Si vous devez téléphoner pendant un orage, pour éviter tout risque de choc  
électrique, utilisez toujours un téléphone sans fil.  
v En cas de fuite de gaz, n’utilisez jamais un téléphone situé à proximité de la  
fuite.  
Laser compliance statement  
Some IBM Personal Computer models are equipped from the factory with a  
CD-ROM drive or a DVD-ROM drive. CD-ROM drives and DVD-ROM drives are  
also sold separately as options. CD-ROM drives and DVD-ROM drives are laser  
products. These drives are certified in the U.S. to conform to the requirements of  
the Department of Health and Human Services 21 Code of Federal Regulations  
(DHHS 21 CFR) Subchapter J for Class 1 laser products. Elsewhere, these drives  
are certified to conform to the requirements of the International Electrotechnical  
Commission (IEC) 825 and CENELEC EN 60 825 for Class 1 laser products.  
When a CD-ROM drive or a DVD-ROM drive is installed, note the following  
handling instructions.  
CAUTION:  
Use of controls or adjustments or performance of procedures other than those  
specified herein might result in hazardous radiation exposure.  
Removing the covers of the CD-ROM drive or DVD-ROM drive could result in  
exposure to hazardous laser radiation. There are no serviceable parts inside the  
CD-ROM drive or DVD-ROM drive. Do not remove the drive covers.  
Some CD-ROM drives and DVD-ROM drives contain an embedded Class 3A or  
Class 3B laser diode. Note the following statement.  
DANGER  
Laser radiation when open. Do not stare into the beam, do not view directly with optical  
instruments, and avoid direct exposure to the beam.  
DANGER:  
Important safety information xi  
 
 
Certains modèles d’ordinateurs personnels sont équipés d’origine d’une unité de  
CD-ROM ou de DVD-ROM. Mais ces unités sont également vendues séparément  
en tant qu’options. L’unité de CD-ROM/DVD-ROM est un appareil à laser. Aux  
État-Unis, l’unité de CD-ROM/DVD-ROM est certifiée conforme aux normes  
indiquées dans le sous-chapitre J du DHHS 21 CFR relatif aux produits à laser de  
classe 1. Dans les autres pays, elle est certifiée être un produit à laser de classe 1  
conforme aux normes CEI 825 et CENELEC EN 60 825.  
Lorsqu’une unité de CD-ROM/DVD-ROM est installée, tenez compte des  
remarques suivantes:  
ATTENTION: Pour éviter tout risque d’exposition au rayon laser, respectez les  
consignes de réglage et d’utilisation des commandes, ainsi que les procédures  
décrites.  
L’ouverture de l’unité de CD-ROM/DVD-ROM peut entraîner un risque  
d’exposition au rayon laser. Pour toute intervention, faites appel à du personnel  
qualifié.  
Certaines unités de CD-ROM/DVD-ROM peuvent contenir une diode à laser de  
classe 3A ou 3B. Tenez compte de la consigne qui suit:  
DANGER  
Rayonnement laser lorsque le carter est ouvert. Évitez toute exposition directe des yeux  
au rayon laser. Évitez de regarder fixement le faisceau ou de l’observer à l’aide  
d’instruments optiques.  
xii User Guide  
 
Chapter 1. Overview  
Thank you for selecting an IBM® computer. Your computer incorporates many of  
the latest advances in computer technology and can be upgraded as your needs  
change.  
Instructions for installing external and internal options are included in this  
publication. When adding an option, use these instructions along with the  
instructions that come along with the option.  
Information resources  
The Quick Reference that comes with your computer provides information for  
setting up your computer, starting the operating system, troubleshooting, and  
notices.  
Access IBM provides a link to more information about your computer. Click Start  
Access IBM.  
If you have Internet access, the most up-to-date manuals for your computer are  
available from the World Wide Web. To access this information, point your browser  
to:  
Type your machine type and model number in the Quick Path field, and click Go.  
© Copyright IBM Corp. 2004  
1
 
 
Features  
This section provides an overview of the computer features and preinstalled  
software.  
System summary  
The following information covers a variety of models. For a listing of features  
Microprocessor  
v Intel Pentium® 4 processor with HyperThreading Technology  
v Intel Pentium 4 processor  
v Intel® Celeronprocessor  
v Internal cache (size varies by model type)  
Memory  
Support for two 184-pin dual inline memory modules (DIMMs). Each DIMM  
socket can support up to 1 GB of PC2700 double data rate (DDR) synchronous  
dynamic random access memory (SDRAM) for a system maximum of 2 GB.  
Internal drives  
v 3.5-inch, half-inch (slim) diskette drive  
v Hard disk drive  
v CD-ROM, DVD-ROM, DVD-ROM/CD-RW Combo, CD-RW, or Rambo III, IV  
DVD-RAM Multi-Burner optical drive (some models)  
Video subsystem  
Intel Graphics Media Accelerator 900 with dual display support  
Audio subsystem  
The integrated AC’97 audio controller provides four audio connectors.  
v Microphone and headphone connectors on the front panel  
v Line-in and line-out connectors on the rear panel  
v Mono internal speaker  
Connectivity  
v 10/100/1000 Mbps integrated Intel Ethernet controller that supports the Wake  
on LAN feature (some models)  
v Peripheral Component Interconnect (PCI) V.90 Data/Fax modem (some models)  
System management features  
v Remote Program Load (RPL) and Dynamic Host Configuration Protocol (DHCP)  
v Wake on LAN  
v Wake on Serial port (RS232) from ACPI S1, S3, and S5  
v Wake on USB from ACPI S1 and S3  
v Wake on PS/2 Keyboard/Mouse from ACPI S1 and S3  
v Remote Administration  
v Automatic power-on startup  
2
User Guide  
 
 
v System Management (SM) BIOS and SM software  
v Ability to store POST hardware test results  
Input/output features  
v 1 PCI Slot  
v 1 PCI Express x1 slot with support for PCI-e DVI-D Connection Adapter  
v 25-pin Parallel Port  
v Two 9-pin serial connectors  
v Eight USB 2.0 connectors (two on front panel and six on rear panel)  
v PS/2® mouse connector  
v PS/2 keyboard connector  
v Ethernet connector  
v VGA monitor connector  
v Two audio connectors (line-in and line-out) on rear panel  
v Two audio connectors (microphone and headphone) on front panel  
Expansion  
v One 132-bit PCI slot  
v One PCI Express x1 slot with support for PCI-e DVI-D Connection Adapter  
v Two DIMM memory connectors  
Power  
v 225 Watt power supply with manual voltage selection switch  
v Automatic 50/60 Hz input frequency switching  
v Advanced Power Management support  
v Advanced Configuration and Power Interface (ACPI) support  
Security features  
The IBM Embedded Security Subsystem (ESS) is a security subsystem included on  
IBM ThinkCentre PCs. It consists of a dedicated Hardware Security Module built  
on to the motherboard and Client Security Software, a free, web-downloaded  
application. ESS provides the following security values by enhancing the security  
of:  
v data stored on the PC by providing an encryption application (File and Folder  
Encryption) or encryption products from ISVs (such as products from Utimaco  
Safeware)  
v digital certificates and other digital identity information stored on a PC  
v VPN products from Cisco, Check Point and 3Com by increasing the protection  
around login credentials these products use  
v customer network by providing unique machine identifiers for PCs in the  
network (by associating certificates with the built-in Hardware Security Module)  
Other security features include:  
v User and administrator passwords  
v Support for the addition of a cable lock such as a Kensington lock  
v Knockout holes for installing a rope clip (U-bolt)  
v Optional keylock on top cover  
v Startup sequence control  
Chapter 1. Overview  
3
 
 
v Startup without diskette drive, keyboard, or mouse  
v Diskette and hard disk I/O control  
v Serial and parallel port I/O control  
v Security profile by device  
IBM preinstalled software  
Your computer comes with preinstalled software. An operating system, device  
drivers to support built-in features, and other support programs are included.  
4
User Guide  
 
 
Operating systems (preinstalled) (varies by model)  
Note: Not all countries or regions will have these operating systems.  
v Microsoft® Windows® XP Home  
v Microsoft Windows XP Professional  
Available options  
The following are some available options:  
v External options  
– Parallel port devices, such as printers and external drives  
– Serial port devices, such as external modems and digital cameras  
– Audio devices, such as external speakers for the sound system  
– USB devices, such as printers, joysticks, and scanners  
– Security devices, such as a cable lock  
– Monitors  
v Internal options  
– System memory, called dual inline memory modules (DIMMs)  
– Peripheral component interconnect (PCI) adapters  
– PCI Express x1 adaptors  
– CD-ROM, DVD-ROM, or CD-RW drive, hard disk drive, diskette drive, and  
other removable media drives  
For the latest information about available options, see the following World Wide  
Web pages:  
You can also obtain information by calling the following telephone numbers:  
v Within the United States, call 1-800-IBM SERV (1-800-426-7378), your IBM  
reseller, or IBM marketing representative.  
v Within Canada, call 1-800-565-3344 or 1-800-IBM-4YOU.  
v Outside the United States and Canada, contact your IBM reseller or IBM  
marketing representative.  
Chapter 1. Overview  
5
 
 
Specifications  
This section lists certain specifications for your computer. For the latest  
specification information, see the User Guide for your computer model and type at:  
Dimensions  
Airflow  
Width: 12.2 inches (310 mm)  
Height: 3.35 inches (85 mm)  
Depth: 14.1 inches (358 mm)  
Approximately 14 cubic feet (0.45 cubic meters) per  
minute  
Acoustical noise-emission values  
Note: In this computer, fan speed is controlled by  
temperature, configuration, and software. Actual  
noise-emission values might be different from the stated  
values depending on the number of fans and the speed  
of the fans.  
Weight  
Minimum configuration as shipped: 7.3 kg (16 lbs)  
Maximum configuration: 8.5 kg (18.7 lbs)  
Environment  
Average sound-pressure levels for computers with a  
microprocessor that runs at or below 2.8 GHz:  
Air temperature:  
Operating at 0 - 3000 ft (914.4 m): 10° to 35°C (50°  
to 95°F)  
At operator position - 0.5 meters:  
Idle: 30 dBA  
Operating at 3000 ft - 7000 ft (2134 m): 10° to 32°C  
(50° to 89.6°F)  
Operating: 34 dBA  
At bystander position - 1 meter (3.3 ft):  
Idle: 26 dBA  
Non-operating: 10° to 43°C (50° to 110°F)  
Humidity:  
Operating: 29 dBA  
Operating: 8% to 80%  
Declared (upper limit) sound-power levels:  
Idle: 4.0 bels  
Non-operating: 8% to 80%  
Transit: 8% to 90%  
Operating: 4.3 bels  
Maximum altitude: 7000 ft (2133.6 m)  
Average sound-pressure levels for computers with a  
microprocessor that runs at greater than 2.8 GHz:  
Electrical input  
Input voltage:  
At operator position - 0.5 meters:  
Idle: 31 dBA  
Low range:  
Minimum: 100 V ac  
Operating: 34 dBA  
Maximum: 127 V ac  
At bystander position - 1 meter (3.3 ft):  
Idle: 26 dBA  
Input frequency range: 50–60 Hz  
Voltage switch setting: 115 V ac  
High range:  
Operating: 29 dBA  
Declared (upper limit) sound-power levels:  
Idle: 4.0 bels  
Minimum: 200 V ac  
Maximum: 240V ac  
Operating: 4.3 bels  
Input frequency range: 50–60 Hz  
Voltage switch setting: 230 V ac  
Input kilovolt-amperes (kVA) (approximate):  
Minimum configuration as shipped: 0.09 kVA  
Maximum configuration: 0.23 kVA  
Note: These levels were measured in controlled  
acoustical environments according to the procedures  
specified by the American National Standards Institute  
(ANSI) S12.10 and ISO 7779 and are reported in  
accordance with ISO 9296. Actual sound-pressure levels  
in a given location might exceed the average values  
stated because of room reflections and other nearby noise  
sources. The declared sound-power levels indicate an  
upper limit, below which a large number of computers  
will operate.  
Heat output (approximate) in British thermal units (Btu)  
per hour:  
Minimum configuration: 205.8 Btu/hr (60 watts)  
Maximum configuration: 548.8 Btu/hr (160 watts)  
6
User Guide  
 
 
Supported operating positions  
To provide proper air flow to internal components, you must position your  
computer in one of the positions as illustrated below.  
Chapter 1. Overview  
7
 
 
8
User Guide  
 
Chapter 2. Installing options  
This chapter provides instructions for installing optional memory, PCI adapters,  
drives, and security features. When installing an option, use these instructions  
along with the instructions that come with the option.  
Important  
Before you install or remove any option, read “Important safety information”  
on page v. These precautions and guidelines will help you work safely.  
Handling static-sensitive devices  
Static electricity, although harmless to you, can seriously damage computer  
components and options.  
When you add an option, do not open the static-protective package containing the  
option until you are instructed to do so.  
When you handle options and other computer components, take these precautions  
to avoid static electricity damage:  
v Limit your movement. Movement can cause static electricity to build up around  
you.  
v Always handle components carefully. Handle adapters and memory modules by  
the edges. Never touch any exposed circuitry.  
v Prevent others from touching components.  
v When you install a new option, touch the static-protective package containing  
the option to a metal expansion-slot cover or other unpainted metal surface on  
the computer for at least two seconds. This reduces static electricity in the  
package and your body.  
v When possible, remove the option and install it directly in the computer without  
setting the option down. When this is not possible, place the static-protective  
package that the option came in on a smooth, level surface and place the option  
on it.  
v Do not place the option on the computer cover or other metal surface.  
Installing external options  
This section shows the various external connectors on your computer to which you  
can attach external options, such as external speakers, a printer, or a scanner. For  
some external options, you must install additional software in addition to making  
the physical connection. When adding an external option, use the information in  
this section to identify the required connector, and then use the instructions that  
come with the option to help you make the connection and install any software or  
device drivers that are required for the option.  
© Copyright IBM Corp. 2004  
9
 
 
Locating controls and connectors on the front of your  
computer  
The following illustration shows locations of the controls and connectors on the  
front of your computer.  
ꢀ1ꢁ  
ꢀ2ꢁ  
ꢀ3ꢁ  
ꢀ4ꢁ  
ꢀ5ꢁ  
Cover keylock (some models)  
CD or DVD drive  
Hard disk drive activity indicator ꢀ8ꢁ  
Power-on indicator  
Power button  
ꢀ6ꢁ  
ꢀ7ꢁ  
USB connectors (2)  
Microphone connector (line in)  
Headphone connector (line out)  
Diskette drive  
ꢀ9ꢁ  
10 User Guide  
 
 
Locating connectors on the rear of your computer  
The following illustration shows locations of connectors on the rear of your  
computer.  
ꢀ1ꢁ  
ꢀ2ꢁ  
ꢀ3ꢁ  
ꢀ4ꢁ  
ꢀ5ꢁ  
ꢀ6ꢁ  
ꢀ7ꢁ  
ꢀ8ꢁ  
Power cord connector  
Cable lock latch  
Rope clip (U-bolt) holes  
ꢀ9ꢁ  
ꢀ10ꢁ  
ꢀ11ꢁ  
Parallel connector  
Audio line-in connector  
Audio line-out connector  
USB connectors (4)  
PS/2 keyboard connector  
PS/2 mouse connector  
LEDs  
PCI and PCI express adapter slots ꢀ12ꢁ  
Serial connectors (2)  
Ethernet connector  
USB connectors (2)  
VGA monitor connector  
ꢀ13ꢁ  
ꢀ14ꢁ  
ꢀ15ꢁ  
Note: Some connectors on the rear of your computer are color-coded to help  
determine where to connect the cables.  
Obtaining device drivers  
You can obtain device drivers for operating systems that are not preinstalled at  
instructions are provided in README files with the device-driver files.  
Chapter 2. Installing options 11  
 
 
Opening the cover  
Important  
static-sensitive devices” on page 9 before opening the cover.  
To open the cover:  
1. Shut down your operating system, remove any media (diskettes, CDs, or tapes)  
from the drives, and turn off all attached devices and the computer.  
2. Unplug all power cords from electrical outlets.  
3. Disconnect all cables attached to the computer. This includes power cords,  
input/output (I/O) cables, and any other cables that are connected to the  
computer.  
4. Remove the floor stand, if attached.  
5. If a cover lock is installed, unlock the cover.  
6. Press inward on the two buttons and rotate the top cover upward as illustrated.  
12 User Guide  
 
 
Locating components  
The following illustration will help you locate the various components in your  
computer.  
ꢀ1ꢁ  
ꢀ2ꢁ  
Diskette drive lock  
DIMM (memory) connectors (2)  
ꢀ5ꢁ  
ꢀ6ꢁ  
Power supply assembly  
CD or DVD drive (hard disk drive is  
under the CD drive)  
ꢀ3ꢁ  
ꢀ4ꢁ  
Battery  
PCI riser  
ꢀ7ꢁ  
CD or DVD drive lock  
Chapter 2. Installing options 13  
 
 
Accessing system board components and drives  
You might need to rotate the drive bay assembly upward and remove the PCI riser  
and adapters to access system board components such as memory, the battery, the  
Clear CMOS/BIOS recovery jumper and to access the drives.  
To access system board components and the drives:  
1. Turn off the computer.  
3. Rotate the drive bay assembly upward as illustrated.  
Note: Make sure you note the location of any cables that you disconnect from  
the drives or the system board.  
4. If any PCI adapters are installed, remove the PCI riser and adapter cards. Do  
not remove any adapters from the riser card. See “Installing PCI adapters” on  
14 User Guide  
 
 
Identifying parts on the system board  
The system board (sometimes called the planar or motherboard) is the main circuit  
board in your computer. It provides basic computer functions and supports a  
variety of devices that are IBM-installed or that you can install later.  
The following illustration shows the locations of parts on the system board.  
ꢀ1ꢁ  
ꢀ2ꢁ  
Fan connectors (2)  
Memory DIMM connectors (2)  
ꢀ8ꢁ  
ꢀ9ꢁ  
Diskette drive connector  
Power button and front LED assembly  
connector  
ꢀ3ꢁ  
ꢀ4ꢁ  
SATA IDE hard disk drive  
connectors (2)  
Riser connector  
ꢀ10ꢁ Power supply connector  
ꢀ11ꢁ PATA Primary IDE connector (hard disk  
drive and CD-ROM drive)  
ꢀ5ꢁ  
ꢀ6ꢁ  
CMOS Battery  
Clear CMOS/BIOS recovery  
jumper  
ꢀ12ꢁ Power supply connector  
ꢀ13ꢁ Microprocessor  
ꢀ7ꢁ  
Internal speaker connector  
Chapter 2. Installing options 15  
 
 
Installing memory  
Your computer has two connectors for installing dual inline memory modules  
(DIMMs) that provide up to a maximum of 2 GB of system memory.  
When installing memory, the following rules apply:  
v Use 2.5 V, 184-pin, double data rate synchronous dynamic random access  
memory (DDR SDRAM), non-ECC DIMMs.  
v Use 128 MB, 256 MB, 512 MB, or 1 GB DIMMs (when available) in any  
combination.  
Note: Only DDR SDRAM DIMMs can be used.  
To install DIMMs:  
2. Locate the DIMM connectors. See “Identifying parts on the system board” on  
3. Open the retaining clips.  
4. Make sure the notch in the DIMM aligns with the tab on the connector. Push or  
insert the memory module straight down into the connector until the retaining  
clips close.  
5. Replace the PCI riser and adapters if it was removed.  
6. Place the drives back to the original position.  
16 User Guide  
 
 
Installing PCI adapters  
This section provides information and instructions for installing and removing PCI  
adapters. Your computer has a riser card with one PCI expansion slot and one PCI  
Express x1 expansion slot.  
To install a PCI adapter:  
2. While holding the left rear of the computer chassis down, pull upward on the  
handle provided, to remove the PCI riser and any adapters that are currently  
installed.  
3. Release the slot cover latch and remove the slot cover for the appropriate  
expansion slot.  
4. Remove the adapter from its static-protective package.  
5. Install the adapter into the appropriate slot in the PCI riser.  
Note: The top slot is for the PCI adaptor and the bottom slot is for the PCI  
express adaptor.  
Chapter 2. Installing options 17  
 
 
6. Position the adapter-slot-cover latch to retain the adapters.  
7. Reinstall the PCI riser and adapters.  
What to do next:  
v To work with another option, go to the appropriate section.  
v To complete the installation, go to “Closing the cover and connecting the  
Removing and replacing the battery  
Your computer has a special type of memory that maintains the date, time, and  
settings for built-in features, such as parallel-port assignments (configuration). A  
battery, sometimes called the CMOS battery, keeps this information active when  
you turn off the computer.  
The battery normally requires no charging or maintenance throughout its life;  
however, no battery lasts forever. If the battery fails, the date, time, and  
configuration information (including passwords) are lost. An error message is  
displayed when you turn on the computer.  
Refer to “Lithium battery notice” on page x for information about replacing and  
disposing of the battery.  
Important  
Before you install or remove any component, read “Important safety  
information” on page v. These precautions and guidelines will help you work  
safely.  
To change the battery:  
1. Turn off the computer and disconnect the power cord from the electrical outlet  
and from the computer.  
battery.  
4. Remove the PCI riser and PCI adapters that impede access to the battery.  
5. Remove the old battery.  
18 User Guide  
 
 
6. Install the new battery.  
7. Install the PCI riser and adapters if removed.  
8. Replace the cover, and connect the cables. See “Closing the cover and  
Note: When the computer is turned on for the first time after battery  
replacement, an error message might be displayed. This is normal after  
replacing the battery.  
9. Turn on the computer and all attached devices.  
10. Use the IBM Setup Utility program to set the date and time and any  
passwords.  
Removing and replacing an optical drive  
2. Rotate the drive bay assembly upward to gain access to the cable connections.  
3. Disconnect the signal and power cables from the drive.  
4. Slide the lockꢀ1ꢁto the unlocked position.  
5. Open the door at the front of the drive and slide it out the front of the  
computer.  
6. Install the new drive into the bay from the front.  
7. Slide the lock ꢀ1ꢁto the locked position and close the door at the front of the  
drive.  
Chapter 2. Installing options 19  
 
 
8. If you are replacing an existing drive, place the master/slave jumper on the  
drive in the same position as on the drive being replaced. Also refer to any  
instructions that come with the drive.  
9. Connect the signal cable and power cable to the drive.  
procedure.  
Removing and replacing a diskette drive  
2. Slide the lockꢀ1ꢁto the unlocked position.  
3. Slide the drive towards the rear of the computer far enough to gain access to  
the flat cable connector on the drive and disconnect the flat cable from the  
drive.  
4. Rotate the drive bay assembly upward and remove the diskette drive.  
To install a new diskette drive:  
1. Slide the new drive partially into the bay from the rear.  
2. Connect the flat cable to the new drive.  
3. Slide the new drive completely into the bay and slide the lockꢀ1ꢁto the locked  
position.  
procedure.  
Installing security features  
To help prevent hardware theft and unauthorized access to your computer, several  
security lock options are available. The following sections help you identify and  
install the various types of locks that might be available for your computer. In  
addition to physical locks, unauthorized use of your computer can be prevented by  
a software lock that locks the keyboard until a correct password is typed in.  
20 User Guide  
 
 
Make sure that any security cables you install do not interfere with other computer  
cables.  
Identifying security locks  
The following illustration will help you to identify the various types of security  
locks that your computer might have.  
ꢀ1ꢁ  
ꢀ2ꢁ  
ꢀ3ꢁ  
Holes for Rope clip (U-bolt)  
Slot for integrated cable lock (Kensington lock)  
Cover lock  
Integrated security cable  
With an integrated cable lock (sometimes referred to as the Kensington lock), you  
can secure your computer to a desk, table, or other non-permanent fixture. The  
cable lock attaches to a security slot at the rear of your computer and is operated  
with a key. This is the same type of lock used with many laptop computers. You  
can order a security cable directly from IBM. Go to  
Chapter 2. Installing options 21  
 
 
®
22 User Guide  
 
Rope clip  
Using a 3/16 in (5 mm) security rope clip (sometimes referred to as a U-bolt), a  
steel security cable, and a padlock you can secure your computer to a desk, table,  
or other non-permanent fixture. For computers designed to accommodate the rope  
clip, knockouts at the rear of the chassis are provided.  
To install a rope clip:  
2. Use a tool, such as a screwdriver, to remove the two metal knockouts.  
3. Insert the rope clip through the rear of the chassis and install the nuts using  
either an adjustable or an appropriate sized wrench.  
4. Replace the cover.  
5. Thread the security cable through the rope clip and around an object that is not  
part of or permanently attached to the building structure or foundation, and  
from which it cannot be removed; then fasten the cable together with a lock.  
®
Cover lock  
Your computer comes with a built-in key lock or a provision to install a key lock  
such as those provided by the Illinois Lock Company. The mailing address is:  
Illinois Lock Company  
301 W. Hintz Road  
Wheeling, IL 60090-5754 USA  
Password protection  
To deter unauthorized use of your computer, you can use the IBM Setup Utility  
program to set a password. When you turn on your computer you are prompted to  
type the password to unlock the keyboard for normal use.  
Chapter 2. Installing options 23  
 
 
Erasing a lost or forgotten password (clearing CMOS)  
This section applies to lost or forgotten passwords. For more information about  
lost or forgotten passwords, go to Access IBM.  
To erase a forgotten password:  
2. Locate the Clear CMOS/BIOS recovery jumper on the system board. See  
3. Move the jumper from the standard position (pins 1 and 2) to the  
maintenance or configure position (pins 2 and 3).  
4. Install the PCI riser and adapters if removed.  
5. Lower the drive bay assembly and reconnect any cables that were  
disconnected.  
6. Close the cover and connect the power cable. See “Closing the cover and  
7. Restart the computer, leave it on for approximately 10 seconds, and then turn  
off the computer.  
8. Repeat step 1.  
9. Move the CMOS/BIOS recovery jumper back to the standard position (pins 1  
and 2).  
10. Reassemble the computer and close the cover. See “Closing the cover and  
Closing the cover and connecting the cables  
After working with options, you need to install any removed parts, close the cover,  
and reconnect cables, including telephone lines and power cords. Also, depending  
on the option that is installed, you might need to confirm the updated information  
in the IBM Setup Utility program.  
To close the cover and connect cables to your computer:  
1. Ensure that all components have been reassembled correctly and that no tools  
or loose screws are left inside your computer.  
2. Clear any cables that might impede the replacement of the cover.  
3. Make sure the drive bay assembly is lowered and that the drive locks are both  
in the locked position. Otherwise, you cannot close the cover.  
4. Close the cover.  
5. If a cover lock is installed, lock the cover.  
6. If your computer is being placed in the vertical position, attach the floor stand.  
Attention: To prevent overheating and possible component damage, always  
attach the floor stand when placing the computer in the vertical position.  
7. Reconnect the external cables and power cords to the computer. See “Locating  
8. To update the configuration, see Chapter 3, “Using the IBM Setup Utility,” on  
24 User Guide  
 
 
Chapter 3. Using the IBM Setup Utility  
The IBM Setup Utility program is stored in the electrically erasable programmable  
read-only memory (EEPROM) of your computer. The IBM Setup Utility program is  
used to view and change the configuration settings of your computer, regardless of  
which operating system you are using. However, the operating-system settings  
might override any similar settings in the IBM Setup Utility program.  
Starting the IBM Setup Utility program  
To start the IBM Setup Utility program, do the following:  
1. If your computer is already on when you start this procedure, shut down the  
operating system and turn off the computer.  
2. Turn on the computer and look for the following prompt on the logo screen:  
(To interrupt normal startup, press Enter)  
Press Enter when you see the prompt.  
3. When the Startup Interrupt Menu displays, press F1.  
Note: If a user password or an administrator password has been set, the IBM  
Setup Utility program menu is not displayed until you type your  
password. See “Using passwords” for more information.  
The IBM Setup Utility might start automatically when POST detects that hardware  
has been removed or new hardware has been installed in your computer.  
Viewing and changing settings  
The IBM Setup Utility program menu lists items that identify system configuration  
topics.  
When working with the IBM Setup Utility program menu, you must use the  
keyboard. The keys used to perform various tasks are displayed at the bottom of  
each screen.  
Exiting from the IBM Setup Utility program  
When you finish viewing or changing settings, press Esc to return to the IBM  
Setup Utility program menu (you might have to press Esc several times). If you  
want to save the new settings, select Save Settings or Save and exit the Setup  
Utility. Otherwise, your changes will not be saved.  
Using passwords  
By using the IBM Setup Utility program, you can set passwords to prevent  
unauthorized persons from gaining access to your computer and data. The  
following types of passwords are available:  
v User Password  
v Administrator Password  
v IDE Drive User Password  
v IDE Drive Master Password  
© Copyright IBM Corp. 2004  
25  
 
 
You do not have to set any passwords to use your computer. However, if you  
decide to set any passwords, read the following sections.  
Password considerations  
If you are setting any of the various types of passwords on your computer, you  
should read and understand the following information:  
v If you type an incorrect password, you will see an error message. If you type an  
incorrect password three consecutive times, you must turn the computer off and  
start again.  
v If you set both a User Password and an IDE Drive User Password to the same  
string, you will be prompted for the password only once when you turn on your  
computer.  
v Do not move an IDE hard disk drive to another computer if an IDE Drive User  
Password has been set unless that computer also supports the IDE Drive User  
password.  
v If your computer is connected to a local area network (LAN), Wake on LAN will  
not work unless both a User Password and an IDE Drive User Password are set  
using the same password.  
User Password  
When a User Password is set, the user is prompted to type a valid password each  
time the computer is turned on. The computer cannot be used until a valid  
password is typed from the keyboard.  
Administrator Password  
Setting an Administrator Password deters unauthorized persons from changing  
configuration settings. If you are responsible for maintaining the settings of several  
computers, you might want to set an Administrator Password.  
After you set an Administrator Password, a password prompt is displayed each  
time you try to access the IBM Setup Utility program.  
If both the user and administrator passwords are set, you can type either  
password. However, to change any configuration settings, you must use your  
administrator password.  
IDE Drive User Password  
The IDE Drive User Password is used to protect the data on the IDE hard disk  
drive(s). When this password is set, you are prompted to type a valid password  
before any hard disk drive can be used. This prompt is displayed each time you  
turn on your computer. If your computer has multiple hard disk drives, they all  
must use the same password.  
Attention  
If an IDE Drive User Password is set but no IDE Drive Master Password is  
set, there is no recovery in the event that the IDE Drive User Password is lost  
or forgotten. The hard disk drive must be replaced. See “IDE Drive Master  
26 User Guide  
 
 
IDE Drive Master Password  
The IDE Drive Master Password is used to recover use of the hard disk drive in  
the event that the IDE Drive User Password is lost or forgotten. Only the person  
who knows the IDE Drive Master password can reset the IDE Drive User  
Password.  
Attention  
Make sure that the IDE Drive Master password is stored in a safe place. If  
both the IDE Drive User password and the IDE Drive Master password are  
lost or forgotten, the IDE hard disk drive must be replaced.  
If both the IDE Drive User Password and the IDE Drive Master Password are to be  
set, the IDE Drive Master Password must be set before setting the IDE Drive User  
Password.  
Setting, changing, and deleting a password  
To set, change, or delete a password, do the following:  
Note: A password can be any combination of up to seven characters (A- Z, a-z,  
and 0-9).  
1. Start the IBM Setup Utility program (see “Starting the IBM Setup Utility  
2. From the IBM Setup Utility program menu, select Security.  
3. Select Set Passwords. Read the information displayed on the right side of the  
screen.  
Using Security Profile by Device  
Security Profile by Device is used to enable or disable user access to the following  
devices:  
IDE controller  
When this feature is set to Disable, all devices connected to the  
IDE controller (such as hard disk drives or the CD-ROM drive)  
are disabled and will not be displayed in the system  
configuration.  
Diskette Drive Access  
Diskette Write Protect  
When this feature is set to Disable, the diskette drive cannot be  
accessed.  
When this feature is set to Enable, all diskettes are treated as if  
they are write-protected.  
To set Security Profile by Device, do the following:  
1. Start the IBM Setup Utility program (see “Starting the IBM Setup Utility  
2. From the IBM Setup Utility program menu, select Security.  
3. Select Security Profile by Device.  
4. Select the desired devices and settings and press Enter.  
5. Return to the IBM Setup Utility program menu and select Exit and then Save  
Settings or Save and exit the Setup Utility.  
Note: If you do not want to save the settings, select Exit the Setup Utility  
without saving.  
Chapter 3. Using the IBM Setup Utility 27  
 
 
Selecting a startup device  
If your computer does not start up (boot) from a device such as the CD-ROM,  
diskette, or hard disk as expected, use one of the following procedures to select a  
startup device.  
Selecting a temporary startup device  
Use this procedure to startup from any boot device.  
Note: Not all CDs, hard disks, and diskettes are startable (bootable).  
1. Turn off your computer.  
2. Turn on your computer and look for the following prompt on the logo screen:  
(To interrupt normal startup, press Enter)  
Press Enter when you see the prompt.  
3. When the Startup Interrupt Menu displays, press F12.  
4. Select the desired startup device from the Startup Device menu and press Enter  
to begin.  
Note: Selecting a startup device from the Startup Device menu does not  
permanently change the startup sequence.  
Changing the startup device sequence  
To view or permanently change the configured startup device sequence, do the  
following:  
1. Start the IBM Setup Utility program (see “Starting the IBM Setup Utility  
2. Select Startup.  
3. Select Startup Sequence. See the information displayed on the right side of the  
screen.  
4. Select the devices for the Primary Startup Sequence, the Automatic Startup  
Sequence, and the Error Startup Sequence.  
5. Select Exit from the IBM Setup Utility menu and then Save Settings or Save  
and exit the Setup Utility.  
If you have changed these settings and want to return to the default settings, select  
Load Default Settings on the Exit menu.  
Advanced settings  
On some computer models the Advanced settings menu includes a setting to  
Enable/Disable HyperThreading. This feature works only with  
HyperThreading-aware operating systems such as Microsoft Windows XP. The  
default setting for HyperThreading is Enabled. However, if you select Set Defaults  
and are using an operating system other than Windows XP, your computer  
performance might be degraded. Therefore, you should always set  
HyperThreading to Disabled unless you are sure your operating system supports  
HyperThreading.  
28 User Guide  
 
 
Appendix A. Updating POST/BIOS  
This appendix contains information about updating POST/BIOS and how to  
recover from a POST/BIOS update failure.  
POST/BIOS  
POST and BIOS are the basic layer of software that is built into your computer.  
They include the power-on self-test (POST), the basic input/output system (BIOS)  
code, and the IBM Setup Utility program. POST is a set of tests and procedures  
that is performed each time you turn on your computer. BIOS is a layer of  
software that translates instructions from other layers of software into electrical  
signals that the computer hardware can understand. You can use the IBM Setup  
Utility program to view and change the configuration and setup of your computer.  
Your computer system board has a module called electrically erasable programmable  
read-only memory (EEPROM, also referred to as flash memory). You can easily update  
POST, BIOS, and the IBM Setup Utility program by starting your computer using a  
flash update diskette or by running a special update program from your operating  
system.  
IBM might make changes and enhancements to the POST/BIOS. When updates are  
released, they are available as downloadable files on the World Wide Web (see the  
Quick Reference). Instructions for using the POST/BIOS updates are available in a  
.txt file that is included with the update files. For most models, you can download  
either an update program to create a system-program-update (flash) diskette or an  
update program that can be run from the operating system.  
Note: You can download a self starting bootable CD image (known as an .iso  
to support systems without a diskette drive.  
Updating (flashing) BIOS from a diskette  
1. Insert a POST/BIOS update (flash) diskette into the diskette drive (drive A) in  
your computer. POST/BIOS updates are available at  
2. Turn on the computer. If it is on already, you must turn it off and back on  
again. The update begins.  
Updating (flashing) BIOS from your operating system  
Note: Due to constant improvements being made to the IBM Web site, Web page  
content (including the links referenced in the following procedure) is subject  
to change.  
and press Enter.  
2. Locate Downloadable files for your type of computer.  
3. Under Select your product, choose your machine type and click Go.  
4. In Downloadable file by category, click BIOS.  
5. Under Download files - BIOS by date, click your machine type.  
© Copyright IBM Corp. 2004  
29  
 
 
6. Scroll down and look for a .txt file that has instructions for Flash BIOS update  
from the operating system. Click the .txt file.  
7. Print these instructions. This is very important since they are not on the screen  
after the download begins.  
8. From your browser, Click Back to return to the list of files. Carefully follow the  
printed instructions to download, extract, and install the update.  
Recovering from a POST/BIOS update failure  
If power to your computer is interrupted while POST/BIOS is being updated (flash  
update), your computer might not restart correctly. If this happens, perform the  
following procedure commonly called Boot-block Recovery.  
1. Turn off the computer and any attached devices, such as printers, monitors,  
and external drives.  
2. Unplug all power cords from electrical outlets, and open the cover. See  
3. Locate the Clear CMOS/BIOS Recovery jumper on the system board. See  
page 14 to gain access to the Clear CMOS/BIOS Recovery jumper.  
5. Remove any cables or adapters that impede access to the Clear CMOS/BIOS  
Recovery jumper.  
6. Move the jumper from the standard position (pins 1 and 2) to pins 2 and 3.  
7. Replace any cables or adapters that were removed.  
9. Reconnect the power cords for the computer and monitor to electrical outlets.  
10. Insert the POST/BIOS update (flash) diskette into drive A, and turn on the  
computer and the monitor.  
11. During the update session there will be no video. You will hear a long beep  
when recovery is completed. Remove the diskette from the diskette drive, and  
turn off the computer and monitor.  
12. Unplug the power cords from electrical outlets.  
14. Remove any cables or adapters that impede access to the Clear CMOS/BIOS  
Recovery jumper.  
15. Replace the Clear CMOS/BIOS Recovery jumper to its original position.  
16. Replace any cables or adapters that were removed.  
17. Close the cover and reconnect any cables that were disconnected.  
18. Turn on the computer to restart the operating system.  
30 User Guide  
 
 
Appendix B. Cleaning the mouse  
This appendix provides instructions on how to clean your mouse. The procedure  
will be different depending on which type of mouse you have.  
Cleaning an optical mouse  
If you experience some problems with your optical mouse, check the following:  
1. Turn the mouse over and look carefully at the lens area.  
a. If there is a smudge on the lens, gently clean the area with a plain cotton  
swab or plain q-tip.  
b. If there is some debris in the lens, gently blow the debris away from the  
area.  
2. Check the surface you are using the mouse on. If you have a very intricate  
picture or pattern beneath the mouse it is difficult for the digital signal  
processor (DSP) to determine changes in the mouse position.  
Cleaning a mouse with a ball  
If the pointer on the screen does not move smoothly with the mouse, you might  
need to clean the mouse.  
Note: The following illustration might be slightly different from your mouse.  
ꢀ1ꢁ Retainer ring  
ꢀ2ꢁ Ball  
ꢀ3ꢁ Plastic rollers  
ꢀ4ꢁ Ball cage  
© Copyright IBM Corp. 2004  
31  
 
 
To clean a mouse with a ball:  
1. Turn off your computer.  
2. Turn the mouse over, with the top side down, and look carefully at the bottom.  
Twist the retainer ringꢀ1ꢁto the unlocked position to remove the ball.  
3. Place your hand over the retainer ring and ballꢀ2ꢁ, and then turn the mouse  
over, top side up, so that the retainer ring and ball fall out into your hand.  
4. Wash the ball in warm, soapy water then dry it with a clean cloth. Blow air  
carefully into the ball cageꢀ4ꢁto dislodge dust and lint.  
5. Look for a build up of dirt on the plastic rollersꢀ3ꢁinside the ball cage. This  
build up usually appears as a stripe running across the middle of the rollers.  
6. If the rollers are dirty, clean them by using a cotton swab soaked in isopropyl  
(rubbing) alcohol. Turn the rollers with your finger and continue swabbing  
them until all the dirt is removed. Be sure the rollers are still centered in their  
channels after you clean them.  
7. Remove any fibers from the swab that might be remaining on the rollers.  
8. Replace the ball and the retainer ring.  
9. Turn your computer back on.  
32 User Guide  
 
Appendix C. Manual modem commands  
The following section lists commands for manually programming your modem.  
Commands are accepted by the modem while it is in Command Mode. Your  
modem is automatically in Command Mode until you dial a number and establish  
a connection. Commands may be sent to your modem from a PC running  
communication software or any other terminal devices.  
All commands sent to the modem must begin with AT and end with ENTER. All  
commands may be typed in either upper or lower case, but not mixed. To make  
the command line more readable, spaces may be inserted between commands. If  
you omit a parameter from a command that requires one, it is just like specifying a  
parameter of 0.  
Example:  
ATH [ENTER]  
Basic AT commands  
In the following listings, all default settings are printed in bold text.  
Command  
Function  
A
Manually answer incoming call.  
A/  
Repeat last command executed. Do not  
precede A/ with AT or follow with ENTER.  
D_  
0 - 9, A-D, # and *  
last number redial  
pulse dialing  
L
P
Note: Pulse dialing is not supported for  
Australia, New Zealand, Norway, and South  
Africa.  
T
W
,
touch-tone dialing  
wait for second dial tone  
pause  
@
!
wait for five seconds of silence  
flash  
;
return to Command Mode after dialing  
DS=n  
E_  
Dial one of the four telephone numbers  
(n=0-3) stored in the modem non-volatile  
memory.  
E0  
Commands are not echoed  
E1  
Commands are echoed  
+++  
Escape Characters - Switch from Data Mode  
to Command Mode (T.I.E.S. Command)  
H_  
H0  
Force modem on-hook (hang up)  
© Copyright IBM Corp. 2004  
33  
 
 
Command  
I_  
Function  
H1  
Force modem off-hook (make busy)  
Note: H1 command is not supported for Italy  
Display product-identification code  
Factory ROM checksum test  
Internal memory test  
I0  
I1  
I2  
I3  
Firmware ID  
I4  
Reserved ID  
L_  
L0  
L1  
L2  
L3  
M0  
M1  
M2  
M3  
Low speaker volume  
Low speaker volume  
Medium speaker volume  
High speaker volume  
M_  
Internal speaker off  
Internal speaker on until carrier detected  
Internal speaker always on  
Internal speaker on until carrier detected and  
off while dialing  
N_  
O_  
Included for compatibility only, provides no  
effect  
O0  
O1  
Return to Data Mode  
Return to Data Mode and initiate an equalizer  
retrain  
P
Set Pulse dial as default  
Modem sends responses  
Read and display value in register r.  
Set register r to value n (n = 0-255).  
Set Tone Dial as default  
Numeric responses  
Q_  
Sr?  
Sr=n  
T
Q0  
V_  
V0  
V1  
W0  
W1  
Word responses  
W_  
X_  
Report DTE speed only  
Report line speed, error correction protocol,  
and DTE speed.  
W2  
X0  
Report DCE speed only  
Hayes Smartmodem 300 compatible  
responses/blind dialing.  
X1  
Same as X0 plus all CONNECT  
responses/blind dialing  
X2  
X3  
X4  
Same as X1 plus dial tone detection  
Same as X1 plus busy detection/blind dialing  
All responses and dial tone and busy signal  
detection  
Z_  
Z0  
Z1  
Reset and retrieve active profile 0  
Reset and retrieve active profile 1  
34 User Guide  
 
Extended AT commands  
Command  
&C_  
Function  
&C0  
&C1  
&D0  
&D1  
Force Carrier Detect Signal High (ON)  
Turn on CD when remote carrier is present  
Modem ignores the DTR signal  
&D_  
Modem returns to Command Mode after DTR  
toggle  
&D2  
Modem hangs up, returns to the Command  
Mode after DTR toggle  
&D3  
&F  
Resets modem after DTR toggle  
Recall factory default configuration  
Guard tone disabled  
&F_  
&G_  
&G0  
&G1  
&G2  
&K0  
&K3  
&K4  
&K5  
&K6  
Guard tone disabled  
1800 Hz guard tone  
&K_  
Disable flow control  
Enable RTS/CTS hardware flow control  
Enable XON/XOFF software flow control  
Enable transparent XON/XOFF flow control  
Enable both RTS/CTS and XON/XOFF flow  
control  
&M_  
&P_  
&M0  
&P0  
&P1  
&P2  
Asynchronous operation  
US setting for off-hook-to-on-hook ratio  
UK and Hong Kong off-hook-to-on-hook ratio  
Same as &P0 setting but at 20 pulses per  
minute  
&P3  
Same as &P1 setting but at 20 pulses per  
minute  
&R_  
&S_  
&R0  
&R1  
&S0  
&S1  
Reserved  
CTS operates per flow control requirements  
Force DSR Signal High (ON)  
DSR off in command mode, on in on-line  
mode  
&T_  
&T0  
&T1  
&T3  
&T4  
Ends test in progress  
Perform Local Analog Loopback Test  
Perform Local Digital Loopback Test  
Grant Remote Digital Loopback Test request  
by remote modem  
&T5  
&T6  
&T7  
Deny Remote Digital Loopback Test request  
Perform a Remote Digital Loopback Test  
Perform a Remote Digital Loopback Test and  
Self-Test  
&T8  
&V0  
Perform Local Analog Loopback Test and  
Self-Test  
&V  
Displays Active and Stored Profiles  
Appendix C. Manual modem commands 35  
 
 
Command  
&W_  
Function  
&V1  
&W0  
&W1  
%E0  
%E1  
Display Last Connection Statistics  
Stores the active profile as Profile 0  
Stores the active profile as Profile 1  
Disable auto-retrain  
%E_  
Enable auto-retrain  
+MS?  
Displays the current Select Modulation  
settings  
+MS=?  
Displays a list of supported Select Modulation  
options  
+MS=a,b,c,e,f  
Select modulation where: a=0, 1, 2, 3, 9, 10, 11,  
12, 56, 64, 69; b=0-1; c=300-56000; d=300-  
56000; e=0-1; and f=0-1. A, b, c, d, e, f  
default=12, 1, 300, 56000, 0, 0. Parameter “a”  
specifies the modulation protocol desired  
where: 0=V.21, 1=V.22, 2=V.22bis, 3=V.23,  
9=V.32, 10=V.32bis, 11=V.34,  
12=V.90,K56Flex,V.34......,56=K 56Flex,  
V.90,V.34......, 64=Bell 103, and 69=Bell 212.  
Parameter “b” specifies automode operations  
where: 0=automode disabled, 1= automode  
enabled with V.8/V.32 Annex A. Parameter  
“c” specifies the minimum connection data  
rate (300- 56000). Parameter “d” specifies the  
maximum connection rate (300-56000);  
Parameter “e” specifies the codec type (0=  
Law, and 1=A-Law). Parameter “f” specifies  
“robbed bit” signaling detection (0=detection  
disabled 1=detection enabled)  
MNP/V.42/V.42bis/V.44 commands  
Command  
Function  
%C_  
%C0  
%C1  
%C2  
%C3  
&Q0  
&Q5  
&Q6  
Disable MNP Class 5 and V.42bis data compression  
Enable MNP Class 5 data compression only  
Enable V.42bis data compression only  
Enable MNP Class 5 and V.42bis data compression  
Direct data link only (same as \N1)  
V.42 data link with fallback options  
Normal data link only (same as \N0)  
Disable V.44  
&Q_  
+DS44=0, 0  
+DS44=3, 0  
+DS44?  
Enable V.44  
Current values  
+DS44=?  
List of support values  
36 User Guide  
 
 
Fax Class 1 commands  
+FAE=n  
Data/Fax Auto Answer  
Service Class  
+FCLASS=n  
+FRH=n  
+FRM=n  
+FRS=n  
Receive data with HDLC framing  
Receive data  
Receive silence  
+FTH=n  
+FTM=n  
+FTS=n  
Transmit data with HDLC framing  
Transmit data  
Stop transmission and wait  
Fax Class 2 commands  
+FCLASS=n  
+FAA=n  
+FAXERR  
+FBOR  
+FBUF?  
+FCFR  
Services class.  
Adaptive answer.  
Fax error value.  
Phase C data bit order.  
Buffer size (read only).  
Indicate confirmation to receive.  
Service class.  
+FCLASS=  
+FCON  
+FCIG  
Facsimile connection response.  
Set the polled station identification.  
Report the polled station identification.  
Capability to receive.  
+FCIG:  
+FCR  
+FCR=  
Capability to receive.  
+FCSI:  
Report the called station ID.  
DCE capabilities parameters.  
Report current session.  
Current session results.  
Report remote capabilities.  
Current sessions parameters.  
Begin or continue phase C receive data.  
Data transmission.  
+FDCC=  
+FDCS:  
+FDCS=  
+FDIS:  
+FDIS=  
+FDR  
+FDT=  
+FDTC:  
+FET:  
Report the polled station capabilities.  
Post page message response.  
Transmit page punctuation.  
Call termination with status.  
Session termination.  
+FET=N  
+FHNG  
+FK  
+FLID=  
+FLPL  
Local ID string.  
Document for polling.  
+FMDL?  
+FMFR?  
Identify model.  
Identify manufacturer.  
Appendix C. Manual modem commands 37  
 
 
+FPHCTO  
+FPOLL  
+FPTS:  
Phase C time out.  
Indicates polling request.  
Page transfer status.  
Page transfer status.  
Identify revision.  
+FPTS=  
+FREV?  
+FSPT  
Enable polling.  
+FTSI:  
Report the transmit station ID.  
Voice commands  
#BDR  
#CID  
Select Baud Rate  
Enable Caller ID detection and reporting format  
Select Data, Fax or Voice/Audio  
Identify Model  
#CLS  
#MDL?  
#MFR?  
#REV?  
#TL  
Identify Manufacturer  
Identify Revision Level  
Audio output transmit level  
Query Buffer Size  
#VBQ?  
#VBS  
#VBT  
#VCI?  
#VLS  
#VRA  
#VRN  
#VRX  
#VSDB  
#VSK  
#VSP  
#VSR  
#VSS  
#VTD  
#VTM  
#VTS  
#VTX  
Bits per sample (ADPCM or PCM)  
Beep Tone Timer  
Identify Compression Method  
Voice line select  
Ringback goes away timer  
Ringback never came timer  
Voice Receive Mode  
Silence deletion tuner  
Buffer skid setting  
Silence detection period  
Sampling rate selection  
Silence deletion tuner  
DTMF tone reporting capability  
Enable timing mark placement  
Generate tone signals  
Voice transmit mode  
38 User Guide  
 
 
Attention Switzerland User:  
If your Swisscom phone line does not have Taxsignal switched OFF, modem  
function may be impaired. The impairment may be resolved by a filter with  
the following specifications:  
Telekom PTT SCR-BE  
Taximpulssperrfilter-12kHz  
PTT Art. 444.112.7  
Bakom 93.0291.Z.N  
Appendix C. Manual modem commands 39  
 
40 User Guide  
 
Appendix D. Notices  
IBM may not offer the products, services, or features discussed in this document in  
all countries. Consult your local IBM representative for information on the  
products and services currently available in your area. Any reference to an IBM  
product, program, or service is not intended to state or imply that only that IBM  
product, program, or service may be used. Any functionally equivalent product,  
program, or service that does not infringe any IBM intellectual property right may  
be used instead. However, it is the user’s responsibility to evaluate and verify the  
operation of any non-IBM product, program, or service.  
IBM may have patents or pending patent applications covering subject matter  
described in this document. The furnishing of this document does not give you  
any license to these patents. You can send license inquiries, in writing, to:  
IBM Director of Licensing  
IBM Corporation  
North Castle Drive  
Armonk, NY 10504-1785  
U.S.A.  
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS  
PUBLICATION “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER  
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED  
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS  
FOR A PARTICULAR PURPOSE. Some jurisdictions do not allow disclaimer of  
express or implied warranties in certain transactions, therefore, this statement may  
not apply to you.  
This information could include technical inaccuracies or typographical errors.  
Changes are periodically made to the information herein; these changes will be  
incorporated in new editions of the publication. IBM may make improvements  
and/or changes in the product(s) and/or the program(s) described in this  
publication at any time without notice.  
The products described in this document are not intended for use in implantation  
or other life support applications where malfunction may result in injury or death  
to persons. The information contained in this document does not affect or change  
IBM product specifications or warranties. Nothing in this document shall operate  
as an express or implied license or indemnity under the intellectual property rights  
of IBM or third parties. All information contained in this document was obtained  
in specific environments and is presented as an illustration. The result obtained in  
other operating environments may vary.  
IBM may use or distribute any of the information you supply in any way it  
believes appropriate without incurring any obligation to you.  
Any references in this publication to non-IBM Web sites are provided for  
convenience only and do not in any manner serve as an endorsement of those Web  
sites. The materials at those Web sites are not part of the materials for this IBM  
product, and use of those Web sites is at your own risk.  
© Copyright IBM Corp. 2004  
41  
 
 
Trademarks  
The following terms are trademarks of the IBM Corporation in the United States or  
other countries or both:  
IBM  
PS/2  
ThinkCentre  
Wake on LAN  
Intel, Celeron, and Pentium are trademarks of Intel Corporation in the United  
States, other countries, or both.  
Microsoft, Windows, and Windows NT are trademarks of Microsoft Corporation in  
the United States, other countries, or both.  
Other company, product, and service names may be trademarks or service marks  
of others.  
42 User Guide  
 
 
Index  
Special characters  
F
A
H
adapter  
I
installing options  
B
L
C
changing  
M
memory  
cleaning  
microprocessor  
connectors  
modem commands  
cover  
D
N
drives  
O
E
© Copyright IBM Corp. 2004  
43  
 
 
 
ꢀꢁꢂꢃ  
Part Number: 19R0474  
Printed in USA  
(1P) P/N: 19R0474  
 

Lathem Time Clock 5000E User Manual
Lennox Hearth Indoor Fireplace COL 3629 User Manual
Lenovo Laptop 1996 User Manual
Life Fitness Treadmill WLE POE S User Manual
Manitowoc Ice Ice Maker QM45 Series User Manual
Master Appliance Blowtorch MT 5 User Manual
Master Lock Air Conditioner B100CEH User Manual
Maytag Washer Dryer MDE MDG21PDA User Manual
Maytag Washer MAF 1260 User Manual
Metrologic Instruments Barcode Reader MS2220 User Manual