Download Table of Contents Table of Contents

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Windows RT wikipedia , lookup

Copland (operating system) wikipedia , lookup

Distributed operating system wikipedia , lookup

Spring (operating system) wikipedia , lookup

Windows Phone 8.1 wikipedia , lookup

VS/9 wikipedia , lookup

Criticism of Windows Vista wikipedia , lookup

Mobile operating system wikipedia , lookup

Windows NT startup process wikipedia , lookup

Security-focused operating system wikipedia , lookup

CP/M wikipedia , lookup

OS/2 wikipedia , lookup

OS-tan wikipedia , lookup

Unix security wikipedia , lookup

Windows NT 3.1 wikipedia , lookup

Transcript
Table of Contents
Table of Contents……………………………………………….........................................2
Introduction…………………………………………………………………………………...3
Overview of Operating System
Components and functions of operating systems………………………….........4-5
Different versions of Windows…...………………………………………………...6
Installation of Windows Operating Systems
Procedures to install Windows……………………………………………………..7
Methods of supporting operating systems………………...……………………...8
Possible concerns when installing and maintaining operating systems………..8
Troubleshooting and Maintenance Issues for Operating Systems
Troubleshooting techniques for operating system-related problems…………..9-10
Maintenance issues for operating systems…………..……………………………11
Upgrading an operating system compared with a clean installation………….....12
Networking and Security of Operating Systems
Networking in operating systems……………………………………………..........13
Possible concerns when connecting an operating system to a network ............14
Security Features of Windows 2000, Windows XP and Windows Vista OS…...15
Steps to secure modern Operating Systems.…………………………...………..16
Personal Computers on the Internet
Difference between Internet and Network Connections……...............................17
Steps to connect a workstation to the Internet…………………………………….18
Potential Problem and solutions when connecting an OS to Internet…………...19
Legacy Operating Systems
Features of older Operating Systems….…………………………………..............20
Issues involved with supporting legacy Windows Operating Systems…………..21
Support of older applications in current operating systems………………………22
Introduction
During this training guide, you will see important information provided regarding
computer systems and all of the various operation systems extensively used in
Datamax. The different segments in this manual will provide: specifics of the Windows
operating system, (with more methods for setting up,) maintenance performance and
help with troubleshooting situations. Alternate subjects which are in the manual are
networking, security of operating systems and data regarding history or other, older
operating systems. Information about operating systems entails information which
describes the parts, and, the operations in the various operating systems. This part also
includes useful information about many different versions of Windows.
The installation part describes Windows 2000, Windows XP and Windows Vista. The
different ways of supporting these operating systems is included, and the information on
how installations might be executed, if required. This guide also includes any extra info
on the setting up and maintaining an OS. You will see a main concentration on the
significance of networking and security while using an operating system. This part will
involve particular problems for example security measures and the essential measures
required to protect an operating system from probable risks or viruses.
Computer systems are widely used to link to the net. You will see Network information
supplied on the variations between the two types of links. There will also be measures
provided which will describe how to link a workstation to the net and how your computer
will be protected, eventually, from possible network risks. Finally, a part will provide
specifics of “legacy” or older operating systems, and, how to support these system
types correctly. Information is also provided that regards several possible problems and
older operating systems.
Overview of Operating Systems
Entails important information regarding different operating systems used here at
Datamax. These types of operating systems incorporate Windows 2000, Windows XP
and Windows Vista.
Components and functions of operating systems
The shell is a part of the Microsoft Windows graphical user interface. Control Panel
allows people to see and adjust basic system settings and controls through applets for
example; putting hardware, setting up and eliminating software, controls user accounts
and changes several accessibility alternatives. Additional applets can always be around
by means of third party software. The Control Panel is a special part of the Microsoft
Windows operating system since its 1st release with several of the present applets
added to later versions. Starting with Windows 95, the Control Panel is used like a
special folder, even though the folder doesn't physically exist. The alternative entails
techniques to various applets for example Add or Remove, (Install/Uninstall,)
Applications and Internet Options.
The kernel is the core part of nearly all computer operating systems; it's a connection
between programs and the original data processing finished at hardware stage. The
kernel's main duties include handling the system's resources and interaction between
hardware and software parts. Generally, like a basic part for an operating system, a
kernel might offer the lowest-level abstraction layer for the resources which application
software should manage so as to fully execute its function.
The Device Manager is called the Control Panel applet in Microsoft Windows operating
systems. It lets people to observe and manage the hardware together with the computer
system. When a place of hardware isn't functioning correctly, the defective hardware is
pointed out for the user’s consideration, so that they might know precisely where the
problem lies. The set of hardware might be arranged by different criteria. The main work
of the device manager is to help the user in finding any problems or may also be a
helpful resource while troubleshooting.
The Windows Registry is actually an ordered database which holds configuration
settings and, alternatives on Microsoft Windows operating systems. It requires different
settings for low-level operating system parts and the programs operating on the
platform: the kernel, device drivers, services, SAM, user interface and third party
programs all use the Registry. The registry also provides a method to access counters
for checking system performance.
Different versions of Windows
Windows 2000 is a series of operating systems created by Microsoft to use on several
business desktops, laptops, and servers. It was launched on February 17, 2000 and
was the successor to Windows NT 4.0. It's also the final launch of Microsoft Windows to
display the "Windows NT" designation. It was initially succeeded by Windows XP,
meant for desktop systems in October, 2001 and Windows Server 2003 for servers in
April, 2003. Four versions of Windows 2000 were made public: Professional, Server,
Advanced Server, and Datacenter Server.
Windows XP is an operating system created by Microsoft, meant for use on PC’s,
including resident and business desktops, notebooks and other media centers. It was
launched in 2001. The name "XP" is an acronym for "eXPerience." XP is the successor
to both Windows 2000 Professional and Windows Me. It's the original, consumeroriented, operating system to be created on the Windows NT kernel and design.
Windows XP was launched on October 25, 2001.
Windows Vista is actually a series of operating systems which was created by
Microsoft to work with home and office desktops, notebooks, tablet PCs, and media
center PCs. Windows Vista entails many alternate changes, and, latest features and
alternatives such as; an updated graphical user interface and visual style named
Windows Aero, a revised search feature, multimedia tools for example Windows DVD
Maker and a renovated networking, audio, print, and display sub-system version. Vista
aim is to better the level of communication between devices on home networks, using
sophisticated peer-to-peer technology so as to enable sharing files and digital media
between computer systems and devices.
Installation of Windows Operating Systems
Procedures to install Windows
When a person is operating the Windows Setup application, they are needed to offer
important data on the way to add and arrange the operating system. Very careful
preparation can verify your set up of Windows to be more effective by assisting a
person to avoid probable issues during set up. A clear knowledge of the configuration
options will also help in making sure one has correctly designed their system.
You might set up Windows by means of many different techniques. All are valid and
good but will clearly rely on an individual’s particular requirements and restrictions.
Some software might be added by just copying it to a computer system and after that
choosing it without additional activities, for example set up procedures, required. A few
applications, however, might be provided in a form inappropriate for fast set up and
require a step-by-step set up process. A few installations might require people to;
unpack provided files which are in a shrunken type and copy them to a proper spot,
alter the software to fit the hardware and arrange the user's preferences, provide
information regarding the program to the operating system, and so on. The original
installer can check for system viability and over-all mass storage space.
Some software was created to be added just by copying the files to a selected spot and,
then, there aren't any set up procedures. Long ago, this was a normal practice for
several different applications which were operating by way of MS-DOS, Mac OS, Atari
TOS and AmigaOS. Previous versions of these operating systems are even now usual
and, standard in Mac OS X programs and are used in different Windows programs.
Versions of some operating systems, that don't need set up, do exist and can be
operated straight from a bootable CD, DVD or USB drive without having any type of
impact on other operating systems set up but not operating on the system.
Methods of supporting operating systems
Assist for file systems differ between latest operating systems, though there are lots of
file systems that involve support and drivers for. Operating systems generally differ on
file system support, and, the disk formats which they are installed on. Microsoft
Windows presently covers NTFS(New Technology File System) and FAT(File Allocation
Table) file systems, (incorporating FAT16 and FAT32,) together with network file
systems which are shared with other computer systems and the ISO 9660 and UDF file
systems which are originally used for CDs, DVDs, and optical discs such as Blu-ray.
Every file system is generally restricted in use, in Windows, to particular media. CDs
should utilize ISO 9660 or UDF, and Windows Vista NTFS is the only file system to
which the operating system may be eventually installed on. Windows Included CE 6.0,
Windows Vista Service Pack 1 and Windows Server 2008 cover ExFAT, or, a file
system which is more effectively suited to flash drives.
Possible concerns when installing and maintaining operating systems
Microsoft supplies regular improvements for its operating systems although several
other suppliers offer only regular patches to their software. It’s smart to make frequent
checks for software improvements and patches which are generally launched for most
computer systems which would really benefit from it. There are several activities which
must be carried out on a constant basis to keep Windows running and file systems safe
and operating at optimum efficiency:
Provide virus safety.
Throw out obsolete and unused files frequently and keep available space on hard
drives which are used for virtual memory.
Scan the storage media for issues and rectify any and all issues.
Defragment the hard disk drives regularly.
Prepare back-up files and keep updated recovery disks.
Frequently check in for improvements and use them accordingly.
Troubleshooting and Maintenance Issues
Troubleshooting techniques for operating system-related problems
Keep Current
A good “rule of thumb” to accept, while executing software-related troubleshooting, is to
be certain that you own the latest versions of the required programs, drivers and
operating system. Usually, this means keeping a stock of any software and hardware
that you might have included in your computer system and after that searching sites
which belong to organizations that make these items. This is, obviously, to find any kind
of improvements, patches, service packages and other types of bug solutions.
Spyware/Internet Pop-Ups
There are several internet “pop-ups” which are included in sites. This eventually implies
that they happen if they are linked to the website which you are currently browsing. It is
possible to avoid these types of pop-ups, but, they are rather an irritation and may be
usually offensive. Some types of pop-ups happen irrespective of the website which you
are viewing and can show up even if you aren't in the middle of exploring the net! These
kinds of nuisances are due to a computer system getting “infected” with a type of virus
referred to as spyware.
(Figure A) Shows a clear sign of some sort of virtumonde adware on a computer
system.
DLL Error
Inside computer systems, there's a dynamic link library (DLL), or, an accumulation of
minute applications to which any may be accessed when needed by a bigger
application which is operating on the computer system. The smaller application which
allows the bigger one to communicate with a particular device, for example a printer or
scanner, is frequently called a DLL program. DLL files which back-up specific device
operation are known as device drivers. (Figure B)
Figure B
Maintenance issues for operating systems
Programs Crash Repeatedly
There are some routes which you might follow while experiencing one of your preferred
alternatives consistently failed when using it:
Reboot
The program might be failing since the device is in bad condition. Restarting the
computer system will make sure that, the next time that the program is used, the unit
will be in a good condition.
Download Updates/Latest Version
You might be associated with a problem which the spyware manufacturer is already
conscious of and has followed their initiative to use a repair for. By going to the software
corporation's site, a person might search till they find the item update part. Download
and abide by the page's set up instructions so as to correctly fix the program. Even if the
organization doesn't appear to have the sufficient fix for the problem, they might keep a
documented work-around so as to eventually fix the issue.
Upgrading an operating system compared with a clean installation
Upgrading an operating system
Turn on the power to the computer system and instantly enter the boot menu (it could
take the install program a great deal of time to load.) As soon as loading is finish,
observe the onscreen instructions. It’s quite probable that the installer might request
information and facts while it's being installed, but for the most part, the waiting is not
very bothersome. To the finish of the set up, the installer might request you for
particular, last-minute, details
Clean installation
Turn on the computer system and swiftly access the boot menu. Pick any key and
navigate through the terms and conditions. Eliminate all the existing partitions. (Figure
C)
(Figure C)
Here is where the person decides between a clean install or an upgrade
Networking and Security of Operating Systems
Networking in Operating Systems
Network Operating Systems (NOS) are basically used, to drive computers which work
like servers and provide the methods which are important for network operation. They
were also developed for buyer computer systems and provide options which make the
difference between network operating systems and stand alone operating systems
much less clear. NOS offer the following activities; print and file sharing, account
management for different people, safety and backing up information. Generally, NOS
prove to be complete operating systems which involve job, task and file administration.
In some instances however, (for example with numerous previous operating systems,)
there was a separated part, that increased a normal, non-networking operating system
by having these networking capabilities.
Possible Concerns While Connecting an OS to a Network
Cable Issue: It's possible that a wire which is being used to link different parts of a
network might be cut or even shorted out. A short can take place when a wire conductor
is joined with another surface which is also conductive; that adjusts the original route of
the electric signal. Wire testers have been developed and are offered for use with
different kinds of cable problems. These include; connector issues, cable shorts,
interface levels, wrong cable use and broken wires.
Connection Issue: A connection problem might take place with a device in the network
on changing the system settings or by a probable break down of a connection part,
including; a switch, router or hub.
Software Issue: Network problems can, occasionally, be linked back to the program
settings for example; the registry, WINS configuration, DNS configuration, and so on.
Security Features of Windows; 2000, XP and Vista Operating Systems
There are lots of security and safety characteristics which are relatively recent to
Microsoft (MS) Windows and many of them are unavailable in any of the previous
Windows operating system launches. In early 2002, Microsoft declared their
“Trustworthy Computing Initiative,” that involved applying a good deal of effort for
developing Window’s operating system to meet a level of security which exceeded their
competitors. In the organization, Windows tailored to a “Security Development
Lifecycle,” with the fundamental idea of “secure by development, secure by default and
secure in arrangement.” Microsoft also created new coding for Vista which involved
utilizing SDL style and any earlier code which existed was both analyzed and refigured
so as to supply greatest security for customers. Specific locations where Windows has
started these kinds of revolutionary safety and security improvements incorporate;
parental handling, user account controlling, Network Access Protection, an integral
malware tool and systems which defend from particular digital content. Instances are
listed below:
Windows Defender: Microsoft’s best anti-spyware function. MS transformed the title
from “Microsoft Anti-Spyware” since it now offers these kinds of characteristics as;
system scanning for spyware (just like other free competition products) and “Real Time
Security” agents which check many different aspects of Windows for any modifications
which may have taken place because of spyware. These types of common areas
incorporate; auto-start programs, system configuration configurations, Internet Explorer
configurations and downloads and, any add-ons for example “Windows Shell”
extensions.
Windows Updates: Security and software upgrading has been made easy since it is
currently solely carried out through the control panel. The Windows Mail spam filter and
Windows Defender definitions are automatically upgraded through Windows Update.
People who finalize to stay with the suggested default for automatic improvements will
have the latest drivers set up, available when they attach a latest device.
Windows Firewall: Advanced significantly so as to handle several issues related to the
flexibility of Windows Firewall in a company atmosphere.
Steps to Secure Modern Operating Systems
The best way for a person to completely try to avoid harmful action is to effectively
password defend any and all user accounts by having a firewall software. This software
program or hardware part may prevent distant access to an individual’s computer
system, and does so by closing down all slots leading to different data; until the original
communication is arriving from inside the actual firewall itself, first. Setting up a reliable
and trustworthy antivirus software, (through an antivirus software program for example
MacAfee or Norton Antivirus,) will also successfully avoid a person from viruses and for
full protection; it is important to incorporate a spyware program for locating a removal
tool. There are an uncountable quantity of individuals who have devoted a huge period
of time and energy creating this kind of free software so as to get rid of or avoid harmful
scenarios.
Personal Computers on the Internet
Differences between Internet and Network Connections
A “Network Operating System” is called an operating system which requires
applications and parts which allow a person on a network to accept requests from
alternate computer systems for information and provide access to given recourses for
example file systems and printers.
 Include, control and take away users that try to use different resources on the
network.
 Let users the entry to info on the network. This info is generally found on the
server.
 Let users the entry to hardware which is linked to the network.
 Get information and services which is found on the network.
 Lets the person to give documents on the attached network.
A network operating system (NOS) incorporates different protocol stacks, and, device
drivers for network hardware.
Internet Connection
An “Internet Connection” is described as a general method of unified computer networks
which use the general “Internet Protocol Suite” (IPS) to serve billions of people
throughout the world. An IPS is a huge network which is developed by several other
networks composed of public and private, company, educational and government
networks which are on a regional to international length which are adjoined to a wide
range of optical and electric networking systems. The Internet gives a wide selection of
information services and resources, (most significantly the inter-linked hypertext files of
the “World Wide Web” (WWW) and the design which offers “Electronic Mail” (E-mail).
Steps to Connect a Workstation to the Internet
Step One: (Allowing networking on a workstation)-Connect to the router through your
browser,
Step Two: Allow encryption on the access point,
Step Three: Program the router access security password,
Step Four: Modify the Service Set Identifier, (network identification or SSID,) from the
computer system default to something unique, (something individually secret; name,
birthday and so on.) Don't disable the “SSID Broadcast.”
Step Five: Lastly, turn off distant access and cordless administrating.
Potential problems and solutions when connecting an OS to the internet
Cable Issue: It's possible that a wire which is used to link different regions of a network
might be cut and even shorted out. A short can take place if a wire conductor is joined
with another surface which is also conductive; that changes the original route of the
electric signal. Cable testers have been developed and are offered for use with different
kinds of cable problems. These include; connector issues, cable shorts, interface levels,
wrong wire use and broken wires.
Make sure that all of the utilized cables are in the proper, functioning order and placed in
such a manner that they are out of the way of traffic, pinch scenarios etc.
Connection Issue: A connection problem might take place with a device in the network
on changing the system settings or by a probable break down of a connection part, for
example; a switch, router or hub.
Use the “ping” or “path-ping” command-line tools to check regular connectivity. Apply ping
command-line in order to segregate network hardware issues and incompatible
configurations.
Software Issue: Network problems may, occasionally, be linked back to the software
settings for example; the registry, WINS settings, DNS settings, and so on.
Be sure to properly update all of the given software accordingly.
Features of Older Model Operating Systems
Legacy Operating Systems
“Windows Fundamentals for Legacy PCs” (WinFLP) is actually a little client operating
system from Microsoft which is based on “Windows XP Embedded” however increased
for the benefit of older and less commanding hardware. WinFLP was made public
during July of 2006 and wasn't promoted to be a whole and full-blown, normal OS;
although it is able to carrying out a lot of the jobs which are commonly associated with
one. It requires the particular efficiency for local workloads only, for example;
administration, safety and relevant document observing jobs.
Issues involved with supporting Legacy Windows Operating Systems
WinFLP, as the title puts forward, entails a smaller set of features than that of a whole
Windows XP set up. For example, program like “Outlook Express” isn't obtainable, even
in the situation which requires a complete set up. There are also many system tools
which are eliminated from WinFLP, although they aren't usually used elements and are
seldom used; plus, they may be reinstated with free tools or probably with files from a
full XP set up. Additionally, the operation system doesn't involve full support for
terminal-based links. One more restriction proves to be the ultimate nonexistence of the
Compatibility tab which would generally live in the properties section for executable
files. WinFLP won't also normally supply many different programs; for example
particular games or MSPaint. It does, however, contain the basic programs such as the
calculator, WordPad and Notepad.
Support of Older Applications in Current Operating Systems
WinFLP is selectively accessible to Microsoft Software Assurance customers, as it was
intended to be a less-expensive advancement option for organizations which include
having several Windows9x computer systems, but lacks the hardware required in order
to support the modern version of Windows. It can't be found available through stores or
from OEM channels. For clients who use Legacy Microsoft items which aren't backed by
MBSA 2.1, there is always Microsoft Update.