Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Copland (operating system) wikipedia , lookup
Distributed operating system wikipedia , lookup
Spring (operating system) wikipedia , lookup
Windows Phone 8.1 wikipedia , lookup
Criticism of Windows Vista wikipedia , lookup
Mobile operating system wikipedia , lookup
Windows NT startup process wikipedia , lookup
Security-focused operating system wikipedia , lookup
Table of Contents Table of Contents……………………………………………….........................................2 Introduction…………………………………………………………………………………...3 Overview of Operating System Components and functions of operating systems………………………….........4-5 Different versions of Windows…...………………………………………………...6 Installation of Windows Operating Systems Procedures to install Windows……………………………………………………..7 Methods of supporting operating systems………………...……………………...8 Possible concerns when installing and maintaining operating systems………..8 Troubleshooting and Maintenance Issues for Operating Systems Troubleshooting techniques for operating system-related problems…………..9-10 Maintenance issues for operating systems…………..……………………………11 Upgrading an operating system compared with a clean installation………….....12 Networking and Security of Operating Systems Networking in operating systems……………………………………………..........13 Possible concerns when connecting an operating system to a network ............14 Security Features of Windows 2000, Windows XP and Windows Vista OS…...15 Steps to secure modern Operating Systems.…………………………...………..16 Personal Computers on the Internet Difference between Internet and Network Connections……...............................17 Steps to connect a workstation to the Internet…………………………………….18 Potential Problem and solutions when connecting an OS to Internet…………...19 Legacy Operating Systems Features of older Operating Systems….…………………………………..............20 Issues involved with supporting legacy Windows Operating Systems…………..21 Support of older applications in current operating systems………………………22 Introduction During this training guide, you will see important information provided regarding computer systems and all of the various operation systems extensively used in Datamax. The different segments in this manual will provide: specifics of the Windows operating system, (with more methods for setting up,) maintenance performance and help with troubleshooting situations. Alternate subjects which are in the manual are networking, security of operating systems and data regarding history or other, older operating systems. Information about operating systems entails information which describes the parts, and, the operations in the various operating systems. This part also includes useful information about many different versions of Windows. The installation part describes Windows 2000, Windows XP and Windows Vista. The different ways of supporting these operating systems is included, and the information on how installations might be executed, if required. This guide also includes any extra info on the setting up and maintaining an OS. You will see a main concentration on the significance of networking and security while using an operating system. This part will involve particular problems for example security measures and the essential measures required to protect an operating system from probable risks or viruses. Computer systems are widely used to link to the net. You will see Network information supplied on the variations between the two types of links. There will also be measures provided which will describe how to link a workstation to the net and how your computer will be protected, eventually, from possible network risks. Finally, a part will provide specifics of “legacy” or older operating systems, and, how to support these system types correctly. Information is also provided that regards several possible problems and older operating systems. Overview of Operating Systems Entails important information regarding different operating systems used here at Datamax. These types of operating systems incorporate Windows 2000, Windows XP and Windows Vista. Components and functions of operating systems The shell is a part of the Microsoft Windows graphical user interface. Control Panel allows people to see and adjust basic system settings and controls through applets for example; putting hardware, setting up and eliminating software, controls user accounts and changes several accessibility alternatives. Additional applets can always be around by means of third party software. The Control Panel is a special part of the Microsoft Windows operating system since its 1st release with several of the present applets added to later versions. Starting with Windows 95, the Control Panel is used like a special folder, even though the folder doesn't physically exist. The alternative entails techniques to various applets for example Add or Remove, (Install/Uninstall,) Applications and Internet Options. The kernel is the core part of nearly all computer operating systems; it's a connection between programs and the original data processing finished at hardware stage. The kernel's main duties include handling the system's resources and interaction between hardware and software parts. Generally, like a basic part for an operating system, a kernel might offer the lowest-level abstraction layer for the resources which application software should manage so as to fully execute its function. The Device Manager is called the Control Panel applet in Microsoft Windows operating systems. It lets people to observe and manage the hardware together with the computer system. When a place of hardware isn't functioning correctly, the defective hardware is pointed out for the user’s consideration, so that they might know precisely where the problem lies. The set of hardware might be arranged by different criteria. The main work of the device manager is to help the user in finding any problems or may also be a helpful resource while troubleshooting. The Windows Registry is actually an ordered database which holds configuration settings and, alternatives on Microsoft Windows operating systems. It requires different settings for low-level operating system parts and the programs operating on the platform: the kernel, device drivers, services, SAM, user interface and third party programs all use the Registry. The registry also provides a method to access counters for checking system performance. Different versions of Windows Windows 2000 is a series of operating systems created by Microsoft to use on several business desktops, laptops, and servers. It was launched on February 17, 2000 and was the successor to Windows NT 4.0. It's also the final launch of Microsoft Windows to display the "Windows NT" designation. It was initially succeeded by Windows XP, meant for desktop systems in October, 2001 and Windows Server 2003 for servers in April, 2003. Four versions of Windows 2000 were made public: Professional, Server, Advanced Server, and Datacenter Server. Windows XP is an operating system created by Microsoft, meant for use on PC’s, including resident and business desktops, notebooks and other media centers. It was launched in 2001. The name "XP" is an acronym for "eXPerience." XP is the successor to both Windows 2000 Professional and Windows Me. It's the original, consumeroriented, operating system to be created on the Windows NT kernel and design. Windows XP was launched on October 25, 2001. Windows Vista is actually a series of operating systems which was created by Microsoft to work with home and office desktops, notebooks, tablet PCs, and media center PCs. Windows Vista entails many alternate changes, and, latest features and alternatives such as; an updated graphical user interface and visual style named Windows Aero, a revised search feature, multimedia tools for example Windows DVD Maker and a renovated networking, audio, print, and display sub-system version. Vista aim is to better the level of communication between devices on home networks, using sophisticated peer-to-peer technology so as to enable sharing files and digital media between computer systems and devices. Installation of Windows Operating Systems Procedures to install Windows When a person is operating the Windows Setup application, they are needed to offer important data on the way to add and arrange the operating system. Very careful preparation can verify your set up of Windows to be more effective by assisting a person to avoid probable issues during set up. A clear knowledge of the configuration options will also help in making sure one has correctly designed their system. You might set up Windows by means of many different techniques. All are valid and good but will clearly rely on an individual’s particular requirements and restrictions. Some software might be added by just copying it to a computer system and after that choosing it without additional activities, for example set up procedures, required. A few applications, however, might be provided in a form inappropriate for fast set up and require a step-by-step set up process. A few installations might require people to; unpack provided files which are in a shrunken type and copy them to a proper spot, alter the software to fit the hardware and arrange the user's preferences, provide information regarding the program to the operating system, and so on. The original installer can check for system viability and over-all mass storage space. Some software was created to be added just by copying the files to a selected spot and, then, there aren't any set up procedures. Long ago, this was a normal practice for several different applications which were operating by way of MS-DOS, Mac OS, Atari TOS and AmigaOS. Previous versions of these operating systems are even now usual and, standard in Mac OS X programs and are used in different Windows programs. Versions of some operating systems, that don't need set up, do exist and can be operated straight from a bootable CD, DVD or USB drive without having any type of impact on other operating systems set up but not operating on the system. Methods of supporting operating systems Assist for file systems differ between latest operating systems, though there are lots of file systems that involve support and drivers for. Operating systems generally differ on file system support, and, the disk formats which they are installed on. Microsoft Windows presently covers NTFS(New Technology File System) and FAT(File Allocation Table) file systems, (incorporating FAT16 and FAT32,) together with network file systems which are shared with other computer systems and the ISO 9660 and UDF file systems which are originally used for CDs, DVDs, and optical discs such as Blu-ray. Every file system is generally restricted in use, in Windows, to particular media. CDs should utilize ISO 9660 or UDF, and Windows Vista NTFS is the only file system to which the operating system may be eventually installed on. Windows Included CE 6.0, Windows Vista Service Pack 1 and Windows Server 2008 cover ExFAT, or, a file system which is more effectively suited to flash drives. Possible concerns when installing and maintaining operating systems Microsoft supplies regular improvements for its operating systems although several other suppliers offer only regular patches to their software. It’s smart to make frequent checks for software improvements and patches which are generally launched for most computer systems which would really benefit from it. There are several activities which must be carried out on a constant basis to keep Windows running and file systems safe and operating at optimum efficiency: Provide virus safety. Throw out obsolete and unused files frequently and keep available space on hard drives which are used for virtual memory. Scan the storage media for issues and rectify any and all issues. Defragment the hard disk drives regularly. Prepare back-up files and keep updated recovery disks. Frequently check in for improvements and use them accordingly. Troubleshooting and Maintenance Issues Troubleshooting techniques for operating system-related problems Keep Current A good “rule of thumb” to accept, while executing software-related troubleshooting, is to be certain that you own the latest versions of the required programs, drivers and operating system. Usually, this means keeping a stock of any software and hardware that you might have included in your computer system and after that searching sites which belong to organizations that make these items. This is, obviously, to find any kind of improvements, patches, service packages and other types of bug solutions. Spyware/Internet Pop-Ups There are several internet “pop-ups” which are included in sites. This eventually implies that they happen if they are linked to the website which you are currently browsing. It is possible to avoid these types of pop-ups, but, they are rather an irritation and may be usually offensive. Some types of pop-ups happen irrespective of the website which you are viewing and can show up even if you aren't in the middle of exploring the net! These kinds of nuisances are due to a computer system getting “infected” with a type of virus referred to as spyware. (Figure A) Shows a clear sign of some sort of virtumonde adware on a computer system. DLL Error Inside computer systems, there's a dynamic link library (DLL), or, an accumulation of minute applications to which any may be accessed when needed by a bigger application which is operating on the computer system. The smaller application which allows the bigger one to communicate with a particular device, for example a printer or scanner, is frequently called a DLL program. DLL files which back-up specific device operation are known as device drivers. (Figure B) Figure B Maintenance issues for operating systems Programs Crash Repeatedly There are some routes which you might follow while experiencing one of your preferred alternatives consistently failed when using it: Reboot The program might be failing since the device is in bad condition. Restarting the computer system will make sure that, the next time that the program is used, the unit will be in a good condition. Download Updates/Latest Version You might be associated with a problem which the spyware manufacturer is already conscious of and has followed their initiative to use a repair for. By going to the software corporation's site, a person might search till they find the item update part. Download and abide by the page's set up instructions so as to correctly fix the program. Even if the organization doesn't appear to have the sufficient fix for the problem, they might keep a documented work-around so as to eventually fix the issue. Upgrading an operating system compared with a clean installation Upgrading an operating system Turn on the power to the computer system and instantly enter the boot menu (it could take the install program a great deal of time to load.) As soon as loading is finish, observe the onscreen instructions. It’s quite probable that the installer might request information and facts while it's being installed, but for the most part, the waiting is not very bothersome. To the finish of the set up, the installer might request you for particular, last-minute, details Clean installation Turn on the computer system and swiftly access the boot menu. Pick any key and navigate through the terms and conditions. Eliminate all the existing partitions. (Figure C) (Figure C) Here is where the person decides between a clean install or an upgrade Networking and Security of Operating Systems Networking in Operating Systems Network Operating Systems (NOS) are basically used, to drive computers which work like servers and provide the methods which are important for network operation. They were also developed for buyer computer systems and provide options which make the difference between network operating systems and stand alone operating systems much less clear. NOS offer the following activities; print and file sharing, account management for different people, safety and backing up information. Generally, NOS prove to be complete operating systems which involve job, task and file administration. In some instances however, (for example with numerous previous operating systems,) there was a separated part, that increased a normal, non-networking operating system by having these networking capabilities. Possible Concerns While Connecting an OS to a Network Cable Issue: It's possible that a wire which is being used to link different parts of a network might be cut or even shorted out. A short can take place when a wire conductor is joined with another surface which is also conductive; that adjusts the original route of the electric signal. Wire testers have been developed and are offered for use with different kinds of cable problems. These include; connector issues, cable shorts, interface levels, wrong cable use and broken wires. Connection Issue: A connection problem might take place with a device in the network on changing the system settings or by a probable break down of a connection part, including; a switch, router or hub. Software Issue: Network problems can, occasionally, be linked back to the program settings for example; the registry, WINS configuration, DNS configuration, and so on. Security Features of Windows; 2000, XP and Vista Operating Systems There are lots of security and safety characteristics which are relatively recent to Microsoft (MS) Windows and many of them are unavailable in any of the previous Windows operating system launches. In early 2002, Microsoft declared their “Trustworthy Computing Initiative,” that involved applying a good deal of effort for developing Window’s operating system to meet a level of security which exceeded their competitors. In the organization, Windows tailored to a “Security Development Lifecycle,” with the fundamental idea of “secure by development, secure by default and secure in arrangement.” Microsoft also created new coding for Vista which involved utilizing SDL style and any earlier code which existed was both analyzed and refigured so as to supply greatest security for customers. Specific locations where Windows has started these kinds of revolutionary safety and security improvements incorporate; parental handling, user account controlling, Network Access Protection, an integral malware tool and systems which defend from particular digital content. Instances are listed below: Windows Defender: Microsoft’s best anti-spyware function. MS transformed the title from “Microsoft Anti-Spyware” since it now offers these kinds of characteristics as; system scanning for spyware (just like other free competition products) and “Real Time Security” agents which check many different aspects of Windows for any modifications which may have taken place because of spyware. These types of common areas incorporate; auto-start programs, system configuration configurations, Internet Explorer configurations and downloads and, any add-ons for example “Windows Shell” extensions. Windows Updates: Security and software upgrading has been made easy since it is currently solely carried out through the control panel. The Windows Mail spam filter and Windows Defender definitions are automatically upgraded through Windows Update. People who finalize to stay with the suggested default for automatic improvements will have the latest drivers set up, available when they attach a latest device. Windows Firewall: Advanced significantly so as to handle several issues related to the flexibility of Windows Firewall in a company atmosphere. Steps to Secure Modern Operating Systems The best way for a person to completely try to avoid harmful action is to effectively password defend any and all user accounts by having a firewall software. This software program or hardware part may prevent distant access to an individual’s computer system, and does so by closing down all slots leading to different data; until the original communication is arriving from inside the actual firewall itself, first. Setting up a reliable and trustworthy antivirus software, (through an antivirus software program for example MacAfee or Norton Antivirus,) will also successfully avoid a person from viruses and for full protection; it is important to incorporate a spyware program for locating a removal tool. There are an uncountable quantity of individuals who have devoted a huge period of time and energy creating this kind of free software so as to get rid of or avoid harmful scenarios. Personal Computers on the Internet Differences between Internet and Network Connections A “Network Operating System” is called an operating system which requires applications and parts which allow a person on a network to accept requests from alternate computer systems for information and provide access to given recourses for example file systems and printers. Include, control and take away users that try to use different resources on the network. Let users the entry to info on the network. This info is generally found on the server. Let users the entry to hardware which is linked to the network. Get information and services which is found on the network. Lets the person to give documents on the attached network. A network operating system (NOS) incorporates different protocol stacks, and, device drivers for network hardware. Internet Connection An “Internet Connection” is described as a general method of unified computer networks which use the general “Internet Protocol Suite” (IPS) to serve billions of people throughout the world. An IPS is a huge network which is developed by several other networks composed of public and private, company, educational and government networks which are on a regional to international length which are adjoined to a wide range of optical and electric networking systems. The Internet gives a wide selection of information services and resources, (most significantly the inter-linked hypertext files of the “World Wide Web” (WWW) and the design which offers “Electronic Mail” (E-mail). Steps to Connect a Workstation to the Internet Step One: (Allowing networking on a workstation)-Connect to the router through your browser, Step Two: Allow encryption on the access point, Step Three: Program the router access security password, Step Four: Modify the Service Set Identifier, (network identification or SSID,) from the computer system default to something unique, (something individually secret; name, birthday and so on.) Don't disable the “SSID Broadcast.” Step Five: Lastly, turn off distant access and cordless administrating. Potential problems and solutions when connecting an OS to the internet Cable Issue: It's possible that a wire which is used to link different regions of a network might be cut and even shorted out. A short can take place if a wire conductor is joined with another surface which is also conductive; that changes the original route of the electric signal. Cable testers have been developed and are offered for use with different kinds of cable problems. These include; connector issues, cable shorts, interface levels, wrong wire use and broken wires. Make sure that all of the utilized cables are in the proper, functioning order and placed in such a manner that they are out of the way of traffic, pinch scenarios etc. Connection Issue: A connection problem might take place with a device in the network on changing the system settings or by a probable break down of a connection part, for example; a switch, router or hub. Use the “ping” or “path-ping” command-line tools to check regular connectivity. Apply ping command-line in order to segregate network hardware issues and incompatible configurations. Software Issue: Network problems may, occasionally, be linked back to the software settings for example; the registry, WINS settings, DNS settings, and so on. Be sure to properly update all of the given software accordingly. Features of Older Model Operating Systems Legacy Operating Systems “Windows Fundamentals for Legacy PCs” (WinFLP) is actually a little client operating system from Microsoft which is based on “Windows XP Embedded” however increased for the benefit of older and less commanding hardware. WinFLP was made public during July of 2006 and wasn't promoted to be a whole and full-blown, normal OS; although it is able to carrying out a lot of the jobs which are commonly associated with one. It requires the particular efficiency for local workloads only, for example; administration, safety and relevant document observing jobs. Issues involved with supporting Legacy Windows Operating Systems WinFLP, as the title puts forward, entails a smaller set of features than that of a whole Windows XP set up. For example, program like “Outlook Express” isn't obtainable, even in the situation which requires a complete set up. There are also many system tools which are eliminated from WinFLP, although they aren't usually used elements and are seldom used; plus, they may be reinstated with free tools or probably with files from a full XP set up. Additionally, the operation system doesn't involve full support for terminal-based links. One more restriction proves to be the ultimate nonexistence of the Compatibility tab which would generally live in the properties section for executable files. WinFLP won't also normally supply many different programs; for example particular games or MSPaint. It does, however, contain the basic programs such as the calculator, WordPad and Notepad. Support of Older Applications in Current Operating Systems WinFLP is selectively accessible to Microsoft Software Assurance customers, as it was intended to be a less-expensive advancement option for organizations which include having several Windows9x computer systems, but lacks the hardware required in order to support the modern version of Windows. It can't be found available through stores or from OEM channels. For clients who use Legacy Microsoft items which aren't backed by MBSA 2.1, there is always Microsoft Update.