Your Computer Cant Keep Time

A computer needs a certain amount of information to operate; for example, the date and time, the amount of memory installed, the number of drives and their configuration, and so on. In the early days of computers, either the user typed in this information each time the computer started, or it was set using DIP switches and jumpers. Today, computers store this information in a CMOS chip that uses a small battery to retain the information when the computer is shut off.

CMOS (complementary metal oxide semiconductor) is type of chip that consumes very little power; therefore, while the computer is turned off, the battery discharges very slowly. But the battery will totally discharge if you leave your computer turned off for a year or so. Even if you turn your computer on every day, the battery is designed to last only a couple of years. Occasionally a battery will fail prematurely.

Today's plug-and-play computers can detect most of the necessary settings, but if your CMOS battery is dead, your computer will not be able to retain the date and time. The computer will also lose any custom settings, for example, the boot sequence. If you set a password in CMOS, you may be locked out of the computer. If the CMOS battery does fail, you might receive the message "System Configuration Lost" when you start the computer. It would be wise to record all the CMOS settings as a precaution.

To record the CMOS settings, watch for an on-screen prompt when you first start your computer. The prompt tells you to press a key, usually the Del or F2, to enter CMOS. To enter the CMOS configuration utility, you have to press the indicated key while the message is on the screen. After the CMOS configuration screen appears, follow the instructions provided to page through all the screens and record all the settings.

If your computer loses its time setting overnight, the CMOS battery may not be holding a charge. The CMOS battery is located inside the case on the motherboard. Changing the battery is usually a job for a computer technician. In fact, a layman might not even be able to find the battery.

If you want to locate the CMOS battery in your computer, be aware that a static discharge from your hands can damage components inside the case. After taking proper precautions, open the case and look on the motherboard for a battery. If you have a diagram of your motherboard, locate the battery on the diagram first.

Different motherboards use different types of batteries. The battery may be shaped like a barrel or a coin. Some motherboards use a component that resembles a chip which contains the CMOS and the battery (made by DALLAS or Benchmarq). Batteries come in different voltages, so make sure you get an exact replacement.

Sometimes the battery is mounted in a holder. Sometimes it is soldered to the motherboard. De-soldering and re-soldering a battery is usually a job for a computer technician. An inexperienced solderer can cause a lot of damage. If you want to try to do it yourself, first practice on an obsolete circuit board. You may change your mind.

If the CMOS battery has failed because it's too old, this might be an opportunity to upgrade your motherboard. When upgrading a motherboard, the most important considerations are to make sure the new motherboard is the correct form factor for your case, and that the new motherboard has the correct bus connector slots for your expansion boards.

Copyright(C) Bucaro TecHelp

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

Stephen Bucaro

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter visit bucarotechelp.com

monthly home cleaning Buffalo Grove ..
In The News:

Smart home hacking fears overblown? Expert reveals real cybersecurity risks and simple protection tips to keep your connected devices safe from hackers.
MIT develops needle-free glucose monitor using light technology. Revolutionary device could replace painful finger pricks for diabetes management.
The ClickFix campaign disguises malware as legitimate Windows updates, using steganography to hide shellcode in PNG files and bypass security detection systems.
Researchers from Osaka Metropolitan University designed a 21-foot dome that combines aquaculture and hydroponics to create a self-sustaining urban food system.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
ChatGPT data breach exposes personal info of users through partner Mixpanel. OpenAI confirms names, emails compromised in security incident.
Android rolls out Emergency Live Video for 911 calls, letting dispatchers see real-time scenes during emergencies. Great for holiday travel safety.
Malicious Chrome and Edge extensions collected browsing history, keystrokes and personal data from millions of users before Google and Microsoft removed them.
Google's new Call Reason feature lets Android users mark calls as urgent before dialing, displaying an urgent label to recipients using Phone by Google app.
Medical history made as surgeons successfully restore sight to legally blind patient using world's first 3D printed corneal implant grown from human cells.
Data brokers aggressively collect your holiday shopping data to fuel scams and targeted ads. Learn how to delete your digital profile before 2025 starts.
Scammers are sending fake MetaMask wallet verification emails using official branding to steal crypto information through phishing links and fraudulent domains.
Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.

Apache, MySQL & PHP for Windows

Apache, MysQL and PHP for Windows could be a nice... Read More

Cisco Certification: Building Your Home Lab, Part II

In the first part of this home lab tutorial, CCNA... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

Email Management

If you utilize a computer at home or work it... Read More

PC Owners - The Largest Criminal Gang Ever?

The year is 1981. IBM has just released the Personal... Read More

The Advantages of Portable MP3 Players

With their solid-state technology, compact size, and abundant memory, portable... Read More

Have You Invited A Spy Into Your Computer?

Yes, it's true. You may have inadvertently invited a spy... Read More

Why There Are Color Differences in Printing from Your PC

This article describes the basic properties of color, what the... Read More

Three Things You Can Do to Keep Your Computer Running at Maximum Performance

Although there are many things that can affect the performance... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

How to Protect your PC from Spyware in the Cyber Age

Wouldn't you be shocked to find that your personal sensitive... Read More

The Help Desk

When you think of a help desk, what do you... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

How to Use SQLXML to Retrieve Data from SQL Server Database?

Using SQL Server 2000 and above versions you can retrieve... Read More

Upgrading Your PC for Non-experts

IntroOne of the big advantages of PCs over earlier types... Read More

D2X Digital SLRCoolpix 8800 Actually Refers to Two Nikon Cameras

Addressing a D2X Digital SLRCoolpix 8800 search, this article provides... Read More

Bios Term

BIOS - Basic Input Output SystemThe central processing unit of... Read More

How To Increase Computer Speed And Performance - Great Tips & Tricks

Many computer users are worried about their computer's performance. After... Read More

Web Standards

HTTP ProtocolThe web is run on port 80. You are... Read More

The Benefits of the New Firefox Browser

You probably heard of the new Firefox browser version 1.0... Read More

Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

Improve PC Performance - 6 Tips You Must Know

Are you frustrated with your PC?Is it feeling sluggish or... Read More

HTML Explained: Part 1

Want to save money while promoting your web-based business? Of... Read More

scheduled maid service Mundelein ..