Your Computer Cant Keep Time

A computer needs a certain amount of information to operate; for example, the date and time, the amount of memory installed, the number of drives and their configuration, and so on. In the early days of computers, either the user typed in this information each time the computer started, or it was set using DIP switches and jumpers. Today, computers store this information in a CMOS chip that uses a small battery to retain the information when the computer is shut off.

CMOS (complementary metal oxide semiconductor) is type of chip that consumes very little power; therefore, while the computer is turned off, the battery discharges very slowly. But the battery will totally discharge if you leave your computer turned off for a year or so. Even if you turn your computer on every day, the battery is designed to last only a couple of years. Occasionally a battery will fail prematurely.

Today's plug-and-play computers can detect most of the necessary settings, but if your CMOS battery is dead, your computer will not be able to retain the date and time. The computer will also lose any custom settings, for example, the boot sequence. If you set a password in CMOS, you may be locked out of the computer. If the CMOS battery does fail, you might receive the message "System Configuration Lost" when you start the computer. It would be wise to record all the CMOS settings as a precaution.

To record the CMOS settings, watch for an on-screen prompt when you first start your computer. The prompt tells you to press a key, usually the Del or F2, to enter CMOS. To enter the CMOS configuration utility, you have to press the indicated key while the message is on the screen. After the CMOS configuration screen appears, follow the instructions provided to page through all the screens and record all the settings.

If your computer loses its time setting overnight, the CMOS battery may not be holding a charge. The CMOS battery is located inside the case on the motherboard. Changing the battery is usually a job for a computer technician. In fact, a layman might not even be able to find the battery.

If you want to locate the CMOS battery in your computer, be aware that a static discharge from your hands can damage components inside the case. After taking proper precautions, open the case and look on the motherboard for a battery. If you have a diagram of your motherboard, locate the battery on the diagram first.

Different motherboards use different types of batteries. The battery may be shaped like a barrel or a coin. Some motherboards use a component that resembles a chip which contains the CMOS and the battery (made by DALLAS or Benchmarq). Batteries come in different voltages, so make sure you get an exact replacement.

Sometimes the battery is mounted in a holder. Sometimes it is soldered to the motherboard. De-soldering and re-soldering a battery is usually a job for a computer technician. An inexperienced solderer can cause a lot of damage. If you want to try to do it yourself, first practice on an obsolete circuit board. You may change your mind.

If the CMOS battery has failed because it's too old, this might be an opportunity to upgrade your motherboard. When upgrading a motherboard, the most important considerations are to make sure the new motherboard is the correct form factor for your case, and that the new motherboard has the correct bus connector slots for your expansion boards.

Copyright(C) Bucaro TecHelp

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

Stephen Bucaro

To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter visit bucarotechelp.com

licensed cleaning services Park Ridge ..
In The News:

Scammers create fake Evite invitations that mimic legitimate event emails, requiring users to verify senders and use antivirus software for protection.
The new Apple Watch hypertension feature passively monitors blood pressure patterns over 30 days using sensors to detect chronic high blood pressure signs.
Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.
Protect your home network by enabling proper encryption, creating strong passwords, checking connected devices and using VPN and antivirus software.
The Navy's solar-powered Skydweller drone flew nonstop for 73 hours in Mississippi, proving renewable energy can power long-endurance military missions.

Get Ahead When You Build Your Own Computer

If you've been kicking around the idea of building your... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

MobiTV and Visual Stimulation Imput for Personal Cognitive Performance

Stimulus thru Caffiene or Visual Input?It appears that the Mobi... Read More

MCSE 70-290 Certification Primer

Microsoft Certifications are one of the most widely acclaimed, pursued,... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

5 Minute Guide to Video Editing for Beginners

Getting started with video editing is very simple you only... Read More

Buying a Personal Computer (PC)

For many people the computer industry is a seeming unsolvable... Read More

Looking For an MP3 Player?

If you don't have an mp3 player, and even if... Read More

The Advantages of Portable MP3 Players

With their solid-state technology, compact size, and abundant memory, portable... Read More

Refurbished Computers on the Internet

What is a Refurbished Computer?Refurbished Computers. Remanufactured Computers. Reconditioned Computers.... Read More

Reliable File and Folder Sharing in Windows Xp

This tip is on sharing files and folders on a... Read More

Desktop Security Software Risks - Part 2

This is the third in a series of articles highlighting... Read More

Your Affiliate Business - Peripherals, Software, Computers

I have always been interested in computers, but in the... Read More

Some Thoughts on Choosing a Flash MP3 Player

Flash mp3 players come with an exciting array of features,... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

Uninstall Windows Media Player 10 and Start Enjoying Your Media Again

Windows Media Player 10 has been full of bugs from... Read More

A Lesson in HTML

As the owner of a Country Mall and Top Site... Read More

The Benefits of Open Source

If you are a building a website or a forum,... Read More

COOKIES - What Are They!!

Cookies, not the kind that Mom makes, but the computer... Read More

Image Formats: GIF, JPEG, BMP

When browsing the internet you are likely to come across... Read More

Web Standards

HTTP ProtocolThe web is run on port 80. You are... Read More

What Are You Looking For In A Cheap MP3 Player?

Are you stymied by the vast offerings in cheap mp3... Read More

Improve PC Performance - 6 Tips You Must Know

Are you frustrated with your PC?Is it feeling sluggish or... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

on demand house cleaning Arlington Heights ..