Download IT Essentials v4.1 Chapter 12

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
IT Essentials PC Hardware
and Software 4.1
Instructional Resource
Chapter 12: Advanced
Operating Systems
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
1
Chapter 12: Objectives
 Select the appropriate operating system based on customer needs.
 Install, configure, and optimize an operating system.
 Describe how to upgrade operating systems.
 Describe preventive maintenance procedures for operating systems.
 Troubleshoot operating systems.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
2
Chapter 12: Critical Concepts
 What is this chapter about and why is it important?
 This chapter dives into the more intricate operations and functions of the operating
system. On the new certification, Windows 2000 Professional, Windows XP, and
Windows Vista are covered. Another challenge is that Windows 7 is being deployed
in the corporate environment. Computer boot problems, determining which operating
system is the best to install based on the customer’s needs, reloading the operating
system, customizing the operating system, and tweaking the operating system for
optimum performance are all part of teaching advanced operating systems.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
3
Chapter 12: Activities
 What activities are associated with this chapter?
12.2.2 Lab: Advanced Installation of Windows XP
12.2.2 Optional Lab: Advanced Installation of Windows Vista
12.2.3 Lab: Create a Partition in Windows XP
12.2.3 Optional Lab: Create a Partition in Windows Vista
12.2.4 Lab: Customize Settings in Windows XP
12.2.4 Optional Lab: Customize Settings in Windows Vista
12.2.5 Optional Lab: Install an Alternate Browser
12.4.1Lab: Schedule Task Using GUI and “at” Command in Windows XP
12.4.1 Optional Lab: Schedule Task Using GUI and “at” Command in Windows
Vista
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
4
Chapter 12: Activities (continued)
 What activities are associated with this chapter?
12.4.2 Lab: Restore Points in Windows XP
12.4.2 Optional Lab: Restore Points in Windows Vista
12.5.3 Lab: Fix Operating System Problem
12.5.3 Lab: Remote Technician: Fix an Operating System Problem
12.5.3 Lab: Troubleshooting Operating System Problems in Windows XP
12.5.3 Optional Lab: Troubleshooting Operating System Problems in Windows
Vista
Chapter 12 Quiz
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
5
Chapter 12: New Terms
 What terms are introduced in this chapter?
Presentation_ID
American Standard Code for Information Interchange (ASCII )
12.2.6
answer file
12.2.2
C: drive
12.2.3
CHKDSK
12.2.4
cookie
12.2.5
default installation
12.2.2
disk management
12.2.3
Disk Operating System (DOS)
12.5.2
drive letter
12.2.3
format
12.2.9
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
6
Chapter 12: New Terms
 What terms are introduced in this chapter?
Presentation_ID
icon
12.2.4
installation CD
12.2
Master Boot Record (MBR)
12.5.2
MSCONFIG
12.2.9
Multipurpose Internet Mail Extensions (MIME)
12.2.6
Network Operating System (NOS )
12.1.2
network server
12.1.2
NT Loader (NTLDR)
12.5.2
primary partition
12.2.3
registry
12.4.2
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
7
Chapter 12: New Terms
 What terms are introduced in this chapter?
Presentation_ID
Remote Installation Services (RIS)
12.2.2
resolution
12.2.7
restore point
12.4.2
Simple Mail Transfer Protocol (SMTP)
12.2.6
System Restore
12.2.4
Task Manager
12.2.4
unattended installation
12.2.2
virtual memory
12.2.4
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
8
Chapter 12: Changes
 What has changed from the previous version (4.0) of ITEPC?
Page 12.1.3 Windows OS directory structures
• User file locations
• System file locations
• Fonts
• Temporary Files
• Program Files
• Offline fFles and Folders
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
9
Chapter 12: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 12.2.3 Create, view, and manage disks, directories, and files
• Disk Structure
•Active, primary, extended, and logical partitions
•Mount points
•Mounting a drive
• FAT32 and NTFS
• Drive Status
•Foreign
•Healthy
•Initializing
•Missing
•Not Initialized
•Online
•Online (Errors)
•Offline
•Unreadable
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
10
Chapter 12: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 12.2.4 Identify procedures and utilities that are used to optimize the
performance of operating systems
• Hard drive management tools
•Disk Error-Checking Tool
•Disk Defragmenter
• System Information
• Remote Desktop
•Remote Assistance
• Administrative tools
•Event Viewer
•Computer Management
•Services
•Performance Monitor
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
11
Chapter 12: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 12.2.4 Identify procedures and utilities that are used to optimize the
performance of operating systems (continued)
• Device Manager
•Enable
•Disable
•Warnings
•Indicators
• Task Manager
•Process list
•Resource usage
•Process priority
•Termination
• System Monitor
• Regional and Language Options
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
12
Chapter 12: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 12.2.9 Windows CLI commands
• MSCONFIG
• DIR
• CHKDSK
• EDIT
• COPY
• XCOPY
• FORMAT
• HELP
• SFC
• MD / CD / RD
Page 12.4.1 Schedule automatic tasks and updates
• CLI Scheduled Tasks
• Windows Automatic Updates
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
13
Chapter 12: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 12.4.2 Set restore points
• System Restore utility
Page 12.5.1 Review the troubleshooting process
• Identify the Problem
• Establish a Theory of Probable Causes
• Determine an Exact Cause
• Implement a Solution
• Verify Solution and Full System Functionality
• Document Findings
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
14
Chapter 12: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 12.5.2 Identify common problems and solutions
• Boot Error Messages and Conditions
• The computer displays an Invalid Boot Disk error
• The computer displays an Inaccessible Boot Device error
• The computer displays a Missing NTLDR error
• Operational problems
•A service fails to start
•A device fails to start
•The computer continually restarts
•The computer displays a BSOD error
•The computer locks up
•An application fails to install, start, or load
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
15
Chapter 12: Changes (continued)
 What has changed from the previous version (4.0) of ITEPC?
Page 12.5.2 Identify common problems and solutions.
• Error Messages and Conditions
•System Performance and Optimization
• Aero does not run
• The search feature takes a long time
• The UAC no longer works
• The sidebar is empty
• The computer is running slowly
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
16
Chapter 12: Classroom Management
 Provide the students with as much hands-on experience as possible with the
computers so that they become familiar with the operating system tools, boot
menus, control panels, and command-line tools.
 If a lab demonstrates a GUI tool, have the students research and bring up the same
tool using a command from a prompt.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
17
Chapter 12: Teaching Analogies
 All parts of the computer must work together for efficient production. A desk is like
RAM. The person at the desk is like the CPU. The filing cabinet is like the hard
drive. When working at a desk, a person uses the papers and information on the
desk to do the task at hand. When more information is needed, the person looks
inside the filing cabinet to retrieve information and bring it to the desk where it is
used. Upgrading your RAM is like making the desk space bigger, and upgrading the
hard drive is similar to getting a bigger filing cabinet.
 A computer with a dual operating system is like having two cars to drive. However,
you can only use one at a time.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
18
Chapter 12: Suggested Class Discussions




Presentation_ID
Why are command-line utilities important for technicians to use with deployments
and troubleshooting?
What are the situations in which a dual-boot operating system would most likely
be used?
What are some methods for deploying a corporate operating system and
applications image?
What are some methods for deploying corporate updates?
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
19
Chapter 12: Best Practices
 Have the students create at least one partition as FAT or FAT32 and save a file to
the partition. Students should use the convert.exe command from a prompt to
convert the partition with the file intact.
 On a flat panel monitor, demonstrate different resolutions and how the concept of
native resolution is important on laptops and flat panel monitors.
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
20
Chapter 12: Outside Reading
Microsoft Windows
http://www.microsoft.com/windows/default.aspx
Apple OS X
http://www.apple.com/macosx/
Linux
http://www.linux.com/
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
21
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
22
Presentation_ID
© 2008 Cisco Systems, Inc. All rights reserved.
Cisco Confidential
23
Related documents