* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Ans What is operating system
Windows Phone 8.1 wikipedia , lookup
Copland (operating system) wikipedia , lookup
Plan 9 from Bell Labs wikipedia , lookup
Security-focused operating system wikipedia , lookup
Process management (computing) wikipedia , lookup
Spring (operating system) wikipedia , lookup
Burroughs MCP wikipedia , lookup
Windows NT startup process wikipedia , lookup
SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 1 of 38 Note: This question-bank contains three sections. Section-A contains 1 mark Multiple Choice Objective type questions. Section-B contains 5 marks subjective questions. Section-A contains 10 marks subjective questions. Section – A 1 Marks Questions 1) Round robin scheduling is essentially the preemptive version of ________. 1 FIFO 2 Shortest job first 3 Shortes remaining 4 Longest time first Ans ) 1 2) A page fault occurs 1) when the page is not in the memory 2) when the page is in the memory 3) when the process enters the blocked state 4 when the process is in the ready state . Ans ) 1 3) Which of the following will determine your choice of systems software for your computer ? 1) Is the applications software you want to use compatible with it ? 2) Is it expensive ? 3) Is it compatible with your hardware ? 4) Both 1 and 3 Ans ) 4 4) Let S and Q be two semaphores initialized to 1, where P0 and P1 processes the following statements wait(S);wait(Q); ---; signal(S);signal(Q) and wait(Q); wait(S);---;signal(Q);signal(S); respectively. The above situation depicts a _________ . 1) Semaphore 2) Deadlock 3) Signal 4) Interrupt Ans ) 2 5) What is a shell ? 1) It is a hardware component 2) It is a command interpreter 3) It is a part in compiler 4) It is a tool in CPU scheduling Ans ) 2 6) In the blocked state 1) the processes waiting for I/O are found 2) the process which is running is found 3) the processes waiting for the processor are found 4) none of the above Ans ) 1 7) What is the memory from 1K - 640K called ? 1) Extended Memory 2) Normal Memory 3) Low Memory 4) Conventional Memory Ans ) 4 8) Virtual memory is __________. 1) An extremely large main memory 2) An extremely large secondary memory 3) An illusion of extremely large main memory 4) A type of memory used in super computers. Ans ) 3 9) The process related to process control, file management, device management, information about system and communication that is requested by any higher level language can be performed by __________. 1) Editors 2) Compilers 3) System Call 4) Caching Ans ) 3 10) Multiprogramming systems ________. 1) Are easier to develop than single programming systems 2) Execute each job faster 3) Execute more jobs in the same time 4) Are used only on large main frame computers Ans ) 3 11) Which is not the state of the process ? 1) Blocked 2) Running 3) Ready 4) Privileged Ans ) 4 Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 2 of 38 12) The solution to Critical Section Problem is : Mutual Exclusion, Progress and Bounded Waiting. 1) The statement is false 2) The statement is true. 3) The statement is contradictory. 4) None of the above Ans ) 2 13) The problem of thrashing is effected scientifically by ________. 1 Program structure 2 Program size 3 Primary storage size 4 None of the above Ans ) 1 14) The state of a process after it encounters an I/O instruction is __________. 1 Ready 2 Blocked/Waiting 3 Idle 4 Running Ans ) 2 15) The number of processes completed per unit time is known as __________. 1 Output 2 Throughput 3 Efficiency 4 Capacity Ans ) 2 16) _________ is the situation in which a process is waiting on another process,which is also waiting on another process ... which is waiting on the first process. None of the processes involved in this circular wait are making progress. 1 Deadlock 2 Starvation 3 Dormant 4 None of the above Ans ) 1 17) Which of the following file name extension suggests that the file is Backup copy of another file ? 1 TXT 2 COM 3 BAS 4 BAK Ans ) 4 18) Which technique was introduced because a single job could not keep both the CPU and the I/O devices busy? 1 Time-sharing 2 SPOOLing 3 Preemptive scheduling 4 Multiprogramming Ans ) 4 19) A critical region 1 is a piece of code which only one process executes at a time 2 is a region prone to deadlock 3 is a piece of code which only a finite number of processes execute 4 is found only in Windows NT operation system Ans ) 1 20) The mechanism that bring a page into memory only when it is needed is called _____________ 1 Segmentation 2 Fragmentation 3 Demand Paging 4 Page Replacement Ans ) 3 21) PCB stand for 1 Program Control Block 3 Process Communication Block Ans ) 2 2 Process Control Block 4 None of the above 22) FIFO scheduling is ________. 1 Preemptive Scheduling 2 Non Preemptive Scheduling 3 Deadline Scheduling 4 Fair share scheduling Ans ) 2 23) Switching the CPU to another Process requires to save state of the old process and loading new process state is called as __________. 1 Process Blocking 2 Context Switch Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) 3 Time Sharing Ans ) 2 Page 3 of 38 4 None of the above 24) Which directory implementation is used in most Operating System? 1 Single level directory structure 2 Two level directory structure 3 Tree directory structure 4 Acyclic directory structure Ans ) 3 25) A thread 1 is a lightweight process where the context switching is low 2 is a lightweight process where the context swithching is high 3 is used to speed up paging 4 none of the above Ans ) 1 26) A tree sturctured file directory system 1 allows easy storage and retrieval of file names 2 is a much debated unecessary feature 3 is not essential when we have millions of files 4 none of the above Ans ) 1 27) The high paging activity is called ________. 1 Inter process communication 2 Thrashing 3 Context Switch 4 None of the above Ans ) 2 28) The Hardware mechanism that enables a device to notify the CPU is called __________. 1 Polling 2 Interrupt 3 System Call 4 None of the above Ans ) 2 29) In the running state 1 only the process which has control of the processor is found 2 all the processes waiting for I/O to be completed are found 3 all the processes waiting for the processor are found 4 none of the above Ans ) 1 30) Which of the following is crucial time while accessing data on the disk? 1 Seek time 2 Rotational time 3 Transmission time 4 Waiting time Ans ) 1 31) Process State is a part of 1 Process Control block 3 File Allocation Table Ans ) 1 2 Inode 4 None of the above 32) Who is called a supervisor of computer acitvity ? 1 CPU 2 Operating system 3 Control unit 4 Application Program Ans ) 2 33) Virtual memory is __________. 1 An extremely large main memory 2 An extremely large secondary memory 3 An illusion of extremely large main memory 4 A type of memory used in super computers. Ans ) 3 34) The kernel keeps track of the state of each task by using a data structure called __ 1 Process control block 2 User control block 3 Memory control block 4 None of the above Ans ) 1 Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 4 of 38 35) Which of the following disk scheduling techniques has a drawback of starvation ? 1 SCAN 2 SSTF 3 FCFS 4 LIFO Ans ) 2 36) A binary semaphore 1 has the values one or zero 3 is used only for synchronisation Ans ) 1 2 is essential to binary computers 4 is used only for mutual exclusion 37) _________ page replacement algorithm suffers from Belady's anamoly. 1 LRU 2 MRU 3 FIFO 4 LIFO Ans ) 3 38) _________ is a high speed cache used to hold recently referenced page table entries a part of paged virtual memory 1 Translation Lookaside buffer 2 Inverse page table 3 Segmented page table 4 All the above . Ans ) 1 39) _________ does the job of allocating a process to the processor. 1 Long term scheduler 2 Short term scheduler 3 Medium term scheduler 4 Dispatcher . Ans ) 4 40) In interactive environments such as time-sharing systems, the primary requirement is to provide reasonably good response time and in general, to share system resources equitably. In such situations, the scheduling algorithm that is most popularly applied is ________. 1 Shortest Remaining Time Next (SRTN) Scheduling 2 Priority Based Preemptive Scheduling 3 Round Robin Scheduling 4 None of the above . Ans ) 3 41) In the multi-programming environment, the main memory consisting of _________ number of process. 1 Greater than 100 2 Only one 3 Greater than 50 4 More than one . Ans ) 4 42) In a multithreaded environment _______. 1 Each thread is allocated with new memory from main memory. 2 Main thread terminates after the termination of child threads. 3 Every process can have only one thread. 4 None of the above . Ans ) 2 43) Which of the following statement is not true? 1 Multiprogramming implies multitasking 2 Multi-user does not imply multiprocessing 3 Multitasking does not imply multiprocessing 4 Multithreading implies multi-user . Ans ) 4 44) In one of the deadlock prevention methods, impose a total ordering of all resource types, and require that each process requests resources in an increasing order of enumeration. This voilates the _______________ condition of deadlock 1 Mutual exclusion 2 Hold and Wait 3 Circular Wait 4 No Preemption . Ans ) 3 45) In the ___________ method of data transfer, the participation of the processor is eliminated during data transfer. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) 1 Buffering 3 Direct Memory Access . Ans ) 3 Page 5 of 38 2 Caching 4 Indirect Memory Access 46) A thread is a __________ process . 1 Heavy Weight 2 Mutliprocess 3 Inter Thread 4 Light wieght . Ans ) 4 47) CPU Scheduling is the basis of _________ operating system 1 Batch 2 Real time 3 Multiprogramming 4 Monoprogramming . Ans ) 3 48) Which directory implementation is used in most Operating System? 1 Single level directory structure 2 Two level directory structure 3 Tree directory structure 4 Acyclic directory structure . Ans ) 3 49) Saving the state of the old process and loading the saved state of the new process is called ________. 1 Context Switch 2 State 3 Multi programming 4 None of the above . Ans ) 1 50) The term " Operating System " means ________. 1 A set of programs which controls computer working 2 The way a computer operator works 3 Conversion of high-level language in to machine level language 4 The way a floppy disk drive operates . Ans ) 1 51) Resource locking ________. 1 Allows multiple tasks to simultaneously use resource 2 Forces only one task to use any resource at any time 3 Can easily cause a dead lock condition 4 Is not used for disk drives . Ans ) 2 52) A thread 1 is a lightweight process where the context switching is low 2 is a lightweight process where the context swithching is high 3 is used to speed up paging 4 none of the above . Ans ) 1 53) In the running state 1 only the process which has control of the processor is found 2 all the processes waiting for I/O to be completed are found 3 all the processes waiting for the processor are found 4 none of the above . Ans ) 1 54) The Purpose of Co-operating Process is __________. 1 Information Sharing 2 Convenience 3 Computation Speed-Up 4 All of the above . Ans ) 4 55) The kernel of the operating system remains in the primary memory because ________. 1 It is mostly called (used) 2 It manages all interrupt calls 3 It controls all operations in process 4 It is low level . Ans ) 1 Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 6 of 38 56) Multiprogramming systems ________. 1 Are easier to develop than single programming systems 2 Execute each job faster 3 Execute more jobs in the same time 4 Are used only on large main frame computers . Ans ) 3 57) Multiprocessing ________. 1 Make the operating system simpler 2 Allows multiple processes to run simultaneously 3 Is completely understood by all major computer vendors 4 Allows the same computer to have the multiple processors . Ans ) 4 58) Which is not the state of the process ? 1 Blocked 2 Running 3 Ready 4 Privileged . Ans ) 4 59) A set of resources' allocations such that the system can allocate resources to each process in some order, and still avoid a deadlock is called ________. 1 Unsafe state 2 Safe state 3 Starvation 4 Greeedy allocation . Ans ) 2 60) The principle of locality of reference justifies the use of ________. 1 Virtual Memory 2 Interrupts 3 Main memory 4 Cache memory . Ans ) 4 61) What is the first step in performing an operating system upgrade ? 1 Partition the drive 2 Format the drive 3 Backup critical data 4 Backup old operating system . Ans ) 3 62) The technique, for sharing the time of a computer among several jobs, which switches jobs so rapidly such that each job appears to have the computer to itself, is called ________. 1 Time Sharing 2 Time out 3 Time domain 4 Multitasking . Ans ) 1 63) When two or more processes attempt to access the same resource a _________ occurs. 1 Critical section 2 Fight 3 Communication problem 4 Race condition . Ans ) 4 64) Which technique was introduced because a single job could not keep both the CPU and the I/O devices busy? 1 Time-sharing 2 SPOOLing 3 Preemptive scheduling 4 Multiprogramming . Ans ) 4 65) The degree of Multiprogramming is controlled by 1 CPU Scheduler 2 Context Switching 3 Long-term Scheduler 4 Medium term Scheduler . Ans ) 3 66) The time taken to bring the desired track/cylinder under the head is _________. 1 Seek time 2 Latency time 3 Transfer time 4 Read time . Ans ) 1 Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 7 of 38 67) Replace the page that will not be used for the longest period of time. This principle is adopted by ____________. 1 FIFO Page replacement algorithm 2 Optimal Page replacement algorithm 3 Round robin scheduling algorithm 4 SCAN scheduling algorithm . Ans ) 3 68) The operating system of a computer serves as a software interface between the user and the ________. 1 Hardware 2 Peripheral 3 Memory 4 Screen . Ans ) 1 69) Super computers typically employ _______. 1 Real time Operating system 2 Multiprocessors OS 3 desktop OS 4 None of the above . Ans ) 2 70) A process that is based on IPC mechanism which executes on different systems and can communicate with other processes using message based communication, is called ________. 1 Local Procedure Call 2 Inter Process Communication 3 Remote Procedure Call 4 Remote Machine Invocation . Ans ) 3 71) Round robin scheduling is essentially the preemptive version of ________. 1 FIFO 2 Shortest job first 3 Shortes remaining 4 Longest time first . Ans ) 1 72) A page fault occurs 1 when the page is not in the memory 3 when the process enters the blocked state . Ans ) 1 73) What is a shell ? 1 It is a hardware component 3 It is a part in compiler . Ans ) 2 2 when the page is in the memory 4 when the process is in the ready state 2 It is a command interpreter 4 It is a tool in CPU scheduling 74) In the blocked state 1 the processes waiting for I/O are found 2 the process which is running is found 3 the processes waiting for the processor are found 4 none of the above . Ans ) 1 75) Virtual memory is __________. 1 An extremely large main memory 3 An illusion of extremely large main memory . Ans ) 3 2 An extremely large secondary memory 4 A type of memory used in super computers. 76) Multiprogramming systems ________. 1 Are easier to develop than single programming systems 2 Execute each job faster 3 Execute more jobs in the same time 4 Are used only on large main frame computers . Ans ) 3 77) Which is not the state of the process ? 1 Blocked 2 Running Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) 3 Ready . Ans ) 4 Page 8 of 38 4 Privileged 78) The state of a process after it encounters an I/O instruction is __________. 1 Ready 2 Blocked/Waiting 3 Idle 4 Running . Ans ) 2 79) The number of processes completed per unit time is known as __________. 1 Output 2 Throughput 3 Efficiency 4 Capacity . Ans ) 2 80) Which of the following file name extension suggests that the file is Backup copy of another file ? 1 TXT 2 COM 3 BAS 4 BAK . Ans ) 4 81) The mechanism that bring a page into memory only when it is needed is called _____________ 1 Segmentation 2 Fragmentation 3 Demand Paging 4 Page Replacement . Ans ) 3 82) PCB stand for 1 Program Control Block 3 Process Communication Block . Ans ) 2 2 Process Control Block 4 None of the above 83) The collection of processes on the disk that is waiting to be brought into memory for execution forms the ___________ 1 Ready queue 2 Device queue 3 Input queue 4 Priority queue Ans ) 3 84) Which is not an Operating System ? 1 Windows 95 2 MS-DOS 3 Windows 3.1 4 Windows 2000 Ans ) 3 85) The operating system manages ________. 1 Memory 2 Processor 3 Disk and I/O devices 4 All of the above Ans ) 4 86) It is not the layer of the Operating system. 1 Kernel 2 Shell 3 Application program 4 Critcal Section Ans ) 4 87) Who is called a supervisor of computer acitvity ? 1 CPU 2 Operating system 3 Control unit 4 Application Program Ans ) 2 88) Which scheduler controls the degree of multiprogramming? 1 Short term scheduler 2 Long term scheduler 3 Middle term scheduler 4 None of the above Ans ) 2 Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 9 of 38 89) What is the name of the software which can be legally compiled and often used for free? 1 Shareware program 2 Public domain program 3 Firmware program 4 Mind Ware Ans ) 2 90) The problem of fragmentation arises in ________. 1 Static storage allocation 2 Stack allocation storage 3 Stack allocation with dynamic binding 4 Heap allocation Ans ) 4 91) The section of code which accesses shared variables is called as __________. 1 Critical section 2 Block 3 Procedure 4 Semaphore Ans ) 1 92) In memory management , a technique called as paging, physical memory is broken into fixed-sized blocks called ___________. 1 Pages 2 Frames 3 Blocks 4 Segments Ans ) 2 93) The operating system of a computer serves as a software interface between the user and the ________. 1 Hardware 2 Peripheral 3 Memory 4 Screen Ans ) 1 94) What is a shell ? 1 It is a hardware component 3 It is a part in compiler Ans ) 2 2 It is a command interpreter 4 It is a tool in CPU scheduling 95) Process State is a part of 1 Process Control block 2 Inode 3 File Allocation Table 4 None of the above Ans ) 1 96) Virtual Memory is commonly implemented by __________. 1 Segmentation 2 Swapping 3 Demand Paging 4 None of the above Ans ) 3 97) Paging _________. 1 solves the memory fragmentation problem 2 allows modular programming 3 allows structured programming 4 avoids deadlock Ans ) 1 98) Number of CPU registers in a system depends on ____________. 1 Operating system 2 Computer Architecture 3 Computer Organization 4 None of the above Ans ) 2 99) Unix Operating System is an __________. 1 Time Sharing Operating System 2 Multi-User Operating System 3 Multi-tasking Operating System 4 All the Above Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 10 of 38 Ans ) 4 100) Distributed OS works on the ________ principle. 1 File Foundation 2 Single system image 3 Multi system image 4 Networking image Ans ) 2 101) Which file system does DOS typically use ? 1 FAT16 2 FAT32 3 NTFS 4 WNFS Ans ) 1 102) The program is known as _________ which interacts with the inner part of called kernel. 1 Compiler 2 Device Driver 3 Protocol 4 Shell Ans ) 4 103) Which file system does Windows 95 typically use ? 1 FAT16 2 FAT32 3 NTFS 4 LMFS Ans ) 2 104) Identify the odd thing in the services of operating system. 1 Accounting 2 Protection 3 Error detection and correction 4 Dead lock handling Ans ) 3 105) Which of the following is not advantage of multiprogramming? 1 Increased throughput 2 Shorter response time 3 Decreased operating system overhead 4 Ability to assign priorities to jobs Ans ) 3 106) Which of the following is contained in Process Control Block (PCB)? 1 Process Number 2 List of Open files 3 Memory Limits 4 All of the Above Ans ) 4 107) The part of machine level instruction, which tells the central processor what has to be done, is 1 Operation code 2 Address 3 Locator 4 Flip-Flop 5 None of the above Answer 1 108) A system program that combines the separately compiled modules of a program into a form suitable for execution 1.Assembler 2 linking loader 3. cross compiler 4.load and go Answer 3 109) Process is 1 program in High level language kept on disk 3 a program in execution Answer 2 2 Contents of main memory 4 a job in secondary memory 110) Addressing structure 1. defines the fundamental method of determining effective operand addresses 2. are variations in the use of fundamental addressing structures, or some associated actions which are related to addressing. 3. performs indicated operations on two fast registers of the machine and leave the result in one of the registers. 4. all of the above Answer A Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 11 of 38 111) The Memory Buffer Register (MBR) 1 is a hardware memory device which denotes the location of the current instruction being executed. 2 is a group of electrical circuits (hardware), that performs the intent of instructions fetched from memory. 3 contains the address of the memory location that is to be read from or stored into. 4 contains a copy of the designated memory location specified by the MAR after a "read" or the new contents of the memory prior to a "write". Answer 4 112) The strategy of allowing processes that are logically runnable to be temporarily suspended is called 1 preemptive scheduling 2 non preemptive scheduling 3 shortest job first 4 first come first served Answer 1 113) The Storage-to-Storage instructions 1 have both their operands in the main store. 2 which perform an operation on a register operand and an operand which is located in the main store, generally leaving the result in the register, expect in the case of store operation when it is also written into the specified storage location. 3 which perform indicated operations on two fast registers of the machine and have the result in one of the registers 4 all of the above Answer 1 114) The LRU algorithm 1 pages out pages that have been used recently 2 pages out pages that have not been used recently 3 pages out pages that have been least used recently 4 pages out the first page in a given area Answer 3 115) Which of the following systems software does the job of merging the records from two files into one? 1 Security software 2 Utility program 3 Networking software 4 Documentation system Answer 2 116) Translator for low level programming language were termed as 1 Assembler 2 Compiler 3 Linker 4 Loader Ans: 1 117) Shell is the exclusive feature of 1 UNIX 2 DOS 3) System software 4 Application software Ans: 1 Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 12 of 38 LONG ANSWER QUESTIONS (5 MARKS) Q1. Explain the various features of Windows NT Server. Ans. Windows NT server is a complex operating system, which is designed for providing file, print, and application services to clients. Windows NT server uses the NDIS 3.0 standard for supporting various transport protocols. Windows NT enables two important file systems, one is called NTFS and other is called FAT. The various features of Windows NT server are: 1. Extensibility: Extensibility is achieved by adding new subsystems and their features to the existing operating system without affecting the other subsystems. 2. Portability: Windows NT operating system can be easily shifted from one hardware platform to another platform. 3. Security: To ensure system security, Windows NT server utilizes a strong security model, which passes through all levels of the operating system. 4. Compatibility: The compatibility feature of Windows NT allows it to run applications that are written for other operating systems. Compatibility can be obtained by creating a number of individual environment subsystems. 5. Scalability: This feature of Windows NT server allows it to use multiple processors that operate in a single system. Scalability in Windows NT server is obtained by using symmetric Multiprocessing. 6. Reliability: Windows NT Server is a reliable and robust operating system. It ensures reliability by providing a separate memory address space to each subsystem and application. 7. Fault tolerance: The Windows NT Server has numerous characteristic features, which enable different levels of fault tolerance. Examples of such features are Windows NT File System, disk sector sparing, disk mirroring and disk stripping with parity. 8. High performance client-server platform: The Windows NT Server is designed for providing a strong operating system platform that can scale from the simple file and print services network to the largest enterprise network enabling file and print services to numerous users. 9. Built-in backup: The Windows NT server provides a fully featured graphical tape backup utility called NT backup, which helps in avoiding data loss. This utility allows you to provide single backup set for multiple tapes. Q2. Write Steps to Install Novell Netware. Ans. To install Novell Netware, you first need to meet hardware and software requirements of Netware operating system. You need to insert NetWare Installation CD-I in CD drive to start the installation process of NetWare. The NetWare Installation wizard starts. The following steps need to be performed to install NetWare on a computer 1. Accept the default settings on regional settings screen and click continue to display the license agreement. 2. Press the F10 key to accept the license agreement and display the ‘Welcome to the NetWare server installation’ screen in which you can select custom install or express install. 3. Select Express install and accept the default settings and select the continue option to display the ‘prepare boot partition’ screen in which you configure boot partition. 4. Select the modify option to display the screen in which you can enter the size of the boot partition. 5. Enter 2039.5 in the ‘Size in MB’ text box in the ‘Enter new DOS Partition size’ (in MB) section. 6. Select the continue option to display the size of DOS partitions and available free space in the disk. 7. Select the continue option to display the ‘Select the Settings for the server’ screen in which you can edit the server settings. 8. Accept the default settings and select the continue option to copy the driver files from STARTUP to NWSERVER that are the folders created in the C drive to store all the driver files. 9. After completion of copying process of driver files form the STARTUP folder to the NWSERVER folder, a screen appears, which displays Platform support module and Hot plug Support Module and storage adapters. 10. Accept the default settings and click the continue option to display additional drivers detected for NetWare server. 11. Press F10 key to display various storage devices and network boards and their corresponding drivers in the Netware server screen. 12. Select the Continue option to display the “NetWare Installation – NSS Management Utility” screen in which the default settings for SYS Volume are displayed that includes device name, storage space and sys volume size. 13. Accept the default settings and press the Enter key to display the “Choose a Pattern” window containing the “please select the desired pattern to install” list in which you can select a type of NetWare server such as Pre-Migration Server and Basic NetWare File Server. 14. Accept the default settings and click next to display the ‘Components’ window in which you can select various components such as iPrint and MySQL in the ‘Please select the components to install’ list. 15. Click Next to display the ‘Advanced window containing the Config.sys section in which you can modify the configuration of the Config.sys file. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 13 of 38 16. Accept the default settings and click next to display the ‘Encryption’ window in which you select the location of the license directory using browse button. 17. Click the browse button to display the Browser window in which you can expand the R node to display various sub nodes such as License and Install. 18. Select the License sub node and click OK to open the ‘Protocols’ window containing the Protocols section in which you can enter the values in different fields such as IP Address and Subnet Mask. 19. Click next to display the ‘Time Zone’ window in which you can select the appropriate time zone from the ‘Time Zone’ list. 20. Select the ‘Create a new eDirectory tree’ option in the ‘Select your desired eDirectory installation type’ section. 21. Click next to display a window for creating a new tree in which you can add values in the given text boxes such as ‘Tree Name’, ‘Context for server object’ to create a new eDirectory tree. 22. Enter Tree1 in the ‘Tree Name’ text box and O=Lab in the “Context for Server Object’ text box. Enter a password in the ‘Password’ text box and re-enter the password in the ‘Retype Password’ text box. 23. Click Next to display the eDirectory Summary window, which shows the values you have entered in the previous text boxes. 24. Click next to display the ‘Licenses’ window in which you can set the path for license file in the ‘License Location’ text box. 25. Accept the default settings and Click Next to display the ‘iFolder Server Options’ window, which displays various server options such as ‘LDAP Host name or IP’ and ‘User Database Path’ in the iFolder Server Options section. 26. Accept the default settings and click Next to display the ‘Installation Complete’ window, which displays that to complete installation of Netware, remove CD and restart the computer. Q3. Differentiate between Novell NetWare and Windows NT. Ans. Novell NetWare Windows NT Novell Netware is the oldest Network Operating Windows NT is the latest Network Operating system. System. The File system used by Novell is NetWare File Windows NT uses NTFS and FAT file systems. System (NWFS) It has less GUI support. GUI of Windows NT is better than Novell. The minimum hardware requirement for the Windows NT requires more hardware because installation of Novell Netware is less as of more GUI based platform. compared to Windows NT. Novell is based on IPX/SPX. Windows NT uses TCP/IP protocol suite. Q4. How to create a new user in Novell Netware? Ans. Creating a new user using ConsoleOne: To create a new user in NetWare using ConsoleOne, the following steps are performed: 1. Start the ConsoleOne application. 2. In the ConsoleOne window expand the Entire Network by clicking the round icon next to My World icon and search the tree that you want to access. 3. Click the tree icon, which will ask you to login. 4. Login as Admin, by entering the username as Admin and the respective password. 5. To add a new user either click the New User icon on the ConsoleOne toolbar or select File->New>User, to open the New User dialog box. 6. Enter the name of the user in the textbox on the side of the label ‘Name’ and surname in the textbox on the side of the label ‘Surname’ and the click OK button. 7. In the ‘Set Password’ window, enter the password and click OK button. Q5. Explain the difference between local group and global group in Windows NT? Ans. Local Group Global Group Local groups are less powerful as compared to Global groups are more powerful. global groups. Local group members cannot access resources Global group’s members can be allowed to of other domains. access the resources of other domains by forming trust relationships between the different domains. Local groups support local users and local Global groups do not support local users and groups. local groups. Local groups can assign permission to Global groups cannot assign permission to resources. resources. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) A local group created on a Windows NT workgroup workstation is available only on the workstation on which it is created Page 14 of 38 Global groups can be accessed globally on any workstation. Q6. Differentiate between Domain and Workgroup. Ans. Computers on a network can be part of a workgroup or a domain. The main difference between workgroups and domains is how resources on the network are managed. Computers on home networks are usually part of a workgroup, and computers on workplace networks are usually part of a domain. In a workgroup: All computers are peers; no computer has control over another computer. Each computer has a set of user accounts. To use any computer in the workgroup, you must have an account on that computer. There are typically no more than ten to twenty computers. All computers must be on the same local network or subnet. In a domain: One or more computers are servers. Network administrators use servers to control the security and permissions for all computers on the domain. This makes it easy to make changes because the changes are automatically made to all computers. If you have a user account on the domain, you can log on to any computer on the domain without needing an account on that computer. There can be hundreds or thousands of computers. The computers can be on different local networks. Q7. Explain file system of Novel NetWare? Ans. File System in Novel Netware: Novel NetWare uses NetWare File System (NWFS). NWFS is a file system based on a heavily modified version of FAT. It was used in the Novell NetWare operating system. It is the default and only file system for all volumes in versions 2.x through 4.x, and the default and only file system for the SYS volume continuing through version 5.x. Novell developed two varieties of NWFS: 1. 16-bit NWFS 286, used in NetWare 2.x 2. 32-bit NWFS 386, used in NetWare 3.x through NetWare 6.x. Novell Storage Services (NSS, released in 1998) superseded the NWFS format. 16-bit NWFS could handle volumes of up to 256 MB whereas 32-bit NWFS could handle volumes up to 1 TB. Q8. How to delete a user account in Windows NT? Ans. Steps to delete a user account in Windows NT: 1. Click the Start button (usually located on the bottom left-hand corner of your screen). This will bring up a menu. 2. Click on Settings. This will bring up a submenu. 3. Click on Control Panel. This will open the Control Panel window. 4. 5. Click on Users and passwords. The Users and Passwords window will open, showing a list of all user accounts on the computer. 6. Click on the account you would like to delete. This will highlight the account name. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 15 of 38 7. Click on the Remove button. A warning will appear, asking you to confirm that the account should be deleted. 8. If you want to delete the account, click on the Yes button. (If you decide you don't want to delete the account, click on the No button.) Q9. How to rename administrator account in Windows NT? Ans. Steps to rename administrator account in Windows NT: 1. Right-click the "My Computer" icon on the desktop. 2. Click "Manage" from the menu that appears. 3. Click the plus sign to the left of "Local Users and Groups". 4. Click the "Users" folder to display a list of user accounts in the right frame. 5. Locate the account named "Administrator" in the right frame and right-click the account name. 6. Choose "Rename" from the pop-up menu and type a new name in the box beside the Administrator icon. 7. If you have not been using a password to log on to Your Windows NT 4.0 or 2000 computer, right click on the newly renamed Administrator account name and choose "Set Password" from the menu. 8. Enter a strong password in the dialog box that appears. Q10. What do you know about Windows NT registry? Explain. Ans. Windows NT Registry: In Windows NT, configuration information is centrally stored in a single database called the registry. The registry replaces the .ini, .sys, and .com configuration files used in Windows for MS-DOS and Microsoft LAN Manager. Registry Structure The registry is a database organized in an hierarchical structure. The registry is comprised of sub trees and their keys, hives, and value entries. A key can also contain additional sub keys. Registry Hierarchy The registry sub trees are divided into per-computer and per-user databases. The per-computer information includes information about hardware and software installed on the specific computer. The per-user information includes the information in user profiles, such as desktop settings, individual preferences for certain software, and personal printer and network settings. The sub trees in the Windows NT registry The following table identifies and defines the registry sub trees. Root key name Description HKEY_LOCAL_MACHINE Contains information about the local computer system, including hardware and operating system data such as bus type, system memory, device drivers, and startup control data. HKEY_CLASSES_ROOT Contains object linking and embedding (OLE) and file-class association data (equivalent to the registry in Windows for MS-DOS). HKEY_CURRENT_USER Contains the user profile for the user who is currently logged on, including environment variables, desktop settings, network connections, printers, and application preferences. HKEY_USERS Contains all actively loaded user profiles, including HKEY_CURRENT_USER, which always refers to a child of HKEY_USERS, and the default profile. Users who Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 16 of 38 Root key name Description are accessing a server remotely do not have profiles under this key on the server; their profiles are loaded into the registry on their own computers. HKEY_CURRENT_CONFIGContains information about the hardware profile used by the local computer system at startup. This information is used to configure settings such as the device drivers to load and the display resolution to use. Each root key name begins with HKEY_ to indicate to software developers that this is a handle that can be used by a program. A handle is a value used to uniquely identify a resource so that a program can access it. Q11. Discuss file system of Windows NT. Ans. Windows NT file System: Unlike many other operating systems, NT does not have a particular mustbe-resident file system, and several NT file systems can be active at the same time. NTFS: NTFS is the preferred file system for Windows NT because it allows for the use of all NT's security features. A system, however, can use all three of the available file systems at the same time. Of course, only the NTFS partitions will have the advantages. NTFS represents an evolution from the HPFS file system used by OS/2. A major part of the security model that NT offers is based on the NTFS file system. While shared directories can be set up on an NT server regardless of the file system used, it is only with NTFS that individual files can be assigned permissions. These rights, which also include rights to a directory, can be assigned permissions whether or not they are shared. Every attribute of the NTFS is kept as a file. File descriptions on an NTFS volume are stored in a master file table (MFT), which is also a file. Besides the several records that contain data about the MFT itself, the MFT contains a record for each file and directory, and a log file. A mirror of the MFT is also kept, as well as pointers to the MFT and its mirror, which are stored in the boot sector of the disk. A copy of the boot sector is stored in the logical center of the disk. With this many copies of the MFT, data recovery becomes even easier. That is why NTFS is known as a "recoverable file system. When a partition is formatted as NTFS, numerous system files are created that keep track of certain attributes of that partition. Q12. What do you mean by configuring remote access server? Explain. Ans. Configuring RAS Server on Windows NT: RAS must have at least one of TCP/IP, NWLink, or NetBEUI installed as a transport protocol. A different transport protocol may be selected to support each modem or RAS device. 1. Set up one or more of the following service types. o Use the modem applet in the control panel to install modems and configure them to use specific COM ports. o If using ISDN, it may connect straight into a serial port, or use a NT-1 network termination device. This can be on a separate card or may be on your network card. If the NT-1 is used, the RAS server treats the ISDN connection like a network card. The control panel network applet adapters tab is used to install this as though installing a network card. The ISDN adapter must be configured to use the appropriate ISDN protocol. The main ones are: N11 AT&T 5ESS Northern Telcom DMS-100 Set ISDN SPIDs (Service profile IDs) to two for maximum speed and use two telephone numbers. The SPID is a prefix and suffix along with the normal 10 digit phone number. Set the connection to be multipoint to use each channel. o To install X.25, the RAS setup dialog box is usedX.25 PAD button 2. If RAS service is not installed use the Network applet, services tab in the control panel to install it from your CDROM. Select "Remote Access Service". 3. Configure the RAS network protocols - The RAS server will use the PPP data link protocol rather than a protocol like ethernet. It may use PPP or SLIP to dial out. 1. Different modems or RAS devices may be configured to use different network/transport protocols. For example one may use TCP/IP, while another uses NetBEUI. To set the protocol, use the control panel's Network applet, services tab. Any combination of TCP/IP, NWLink, or NetBEUI may be used. 2. Set up each transport protocol and select whether clients can access the entire network or not. Configuration is done using the control panel network applet services tab. Select "Remote Access Service" and properties. Highlight the port to use and click on the network button. A Network Configuration dialog box will appear with the following options: o Dial Out Protocols with selections of NetBEUI, TCP/IP, and IPX. The configure buttons next to the checkboxes allows each protocol to be configured including the ability to use the protocol for dialing out. o Server Settings with: Allow remote clients running: NetBEUI TCP/IP - Options for IP addresses include: Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 17 of 38 Use DHCP to assign remote TCP/IP client addresses Use static address pool - Used when DHCP is not available on the network and IP address are still desired Allow remote clients to request a predetermined IP address - Used when DHCP is not available on the network and RAS clients have a unique IP address assigned. IP address cannot be assigned based on user account. IPX Encyption Settings with: Allow any authentication including clear text. Require encrypted authentication. Require Microsoft encrypted authentication with an additional checkbox, "Require data encryption". Enable Multilink checkbox Q13. How do you set up a shareable file from the Remote Computer? Ans. Setting up a Shareable file on Remote Computer: If the server is named NTSERVER1 and you want the directory to be on the D: drive, you can bring up the administrative share by going to Start->Run and typing \\NTSERVER1\D$. Once the drive is open, choose File->New->Folder, and name the new folder PUBLIC. Now you can share the new directory. Follow these steps: 1. Go to Start->Programs->Administrative Tools->Server Manager. 2. Select the target computer, and choose Computer->Shared Directories. 3. Click New Share, and type the name of the share and the path (for example, D:\Public). 4. Select Permissions, and adjust them accordingly because the default is Full Control for the group Everyone. Q14. Can we integrate Window NT and Netware in our network? If yes, write the different protocols required to do this. Ans. Yes, we can integrate Window NT and Netware in our network. Windows NT Server 4.0 includes several technologies that let it readily integrate with Novell NetWare networks. These technologies address interoperability at the network, data, and management layers. Network NWLink: Windows NT Server includes NWLink (IPX/SPX Compatible Transport Protocol). NWLink lets you add a Windows NT Server to a NetWare 2.x/3.x and 4.x (in bindery emulation mode) network without requiring modifications to other servers or clients. NWLink lets NetWare clients access applications—such as Microsoft Exchange, SQL Server™, or other software—running on a Windows NT Server-based machine. The Microsoft implementations of the IPX/SPX and Novell NetBIOS-compatible protocols can coexist with other protocols on the same network adapter card. That means you can have several networks running independently on the same network hardware connection. NWLink supports Windows Sockets, Novell NetBIOS, and Named Pipes protocols. Client Services for NetWare: Microsoft Windows NT Workstation 4.0 includes Client Services for NetWare (CSNW). This lets Windows NT Workstation-based clients access files and print resources on Novell NetWare 4.x servers. File and Print Services for NetWare (FPNW): Included in the Microsoft Services for NetWare Add-on Pack, FPNW lets users log on to a machine running Windows NT Server and have their interface look the same as if they had logged on to a NetWare 3.x Server. FPNW—which runs as part of the NWLink IPX/SPX-compatible service—enables Windows NT Server to emulate a NetWare file and print server, providing file and print resources using the same dialogs as NetWare servers. The Windows NT Server file and print services can be managed with NetWare tools, eliminating the need for retraining. Plus, using FPNW does not require changes to NetWare clients. For example, a client program that uses NetWare protocols and naming conventions needs no redirection or translation. Gateway Service for NetWare (GSNW): Included with Windows NT Server, GSNW lets Windows NT Server act as a gateway to a NetWare network, allowing you access to all the resources on a NetWare server. Windows NT Workstation-based clients can access NetWare resources using TCP/IP, the native network communication protocol for Windows NT. In addition, GSNW allows Windows NT Server-based network clients to access files on a NetWare server without requiring a NetWare client redirector on an IPX/SPX protocol stack (such as NWLink). These efficiencies reduce the administrative load for each client and improve network performance. Q15. What is the role of protocols in Windows NT? Ans. Role of Protocols: Protocols are required for communication between server and client computers and also between different operating systems. If Windows NT server wants to share data with a NetWare machine, there is a need of protocol. Protocol is necessary at each level of communication. Since Windows NT Server works with numerous protocols, network administrators can choose the protocols they need to support the connectivity and services they require. This array of choices also makes it easier for administrators to minimize the number of different protocols they must support and manage. For example, some administrators would Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 18 of 38 prefer to manage only one protocol. From a functionality perspective, an administrator might choose IPX/SPX as the sole protocol around which to build a local, non-routed network. If the administrator has a larger, widearea network to manage, TCP/IP might be the protocol of choice. Protocols are also required to configure server to perform different roles. Protocols are required so that server can act as: 1. File Server 2. Printer Server 3. Chat Server 4. Mail Server 5. Active Directory Server 6. News Server Q16. Explain the Installation of Windows NT Server. Ans. Steps to Install Windows NT Server: 1. Boot the computer with a DOS floppy that has at least FDISK, FORMAT, and CD-Rom support. Use FDISK to create a 2Gb partition on the fixed disk and set the partition active. When exiting FDISK the computer will reboot to save partition information. 2. After restarting, Format C: Insert Windows NT 4.0 Server CD-Rom and type "D:\i386\winnt /b". This starts the Installation process. 3. Press enter at the Windows NT setup screen. After files have copied you will be asked if you want to reboot. Press Enter. After reboot. Windows NT setup screen Press enter. Press enter. Page down, page down. Press F8 to accept the license agreement. 4. When setup lists the computer information press enter to accept it. Choose the highlighted partition and press enter. Convert the partition to NTFS and press enter. 5. Press "C" to convert the file system. Verify the path to install files (D:\WINNT) and press enter. Let the system do its, oh so exhaustive examination of your computer. Press enter. 6. Remove all disks and press enter to restart. Insert Windows NT 4.0 Server CD-Rom and click [OK] when prompted. Click [Next] at Windows NT Server version 4.0 setup. 7. At the name and organization window, enter what you want. Be Imaginative. Click [Next]. Enter the CD key (040-0048126) and click [Next]. Select "Per server" and increase to 10 connections. Click [Next]. 8. Enter "NT2" for Computer name (Net BIOS name) and specify the Server type "PDC" and click [Next]. Enter the administrator account password and confirm, then click [Next]. Select "no" when asked if you would like to create an emergency repair disk. Click [Next]. 9. Select components you wish to install. Click [Next]. When the Windows NT setup screen appears again, click [Next]. Select "Wired to the network" When asked for a connection option and click [Next]. Uncheck the "Install the Microsoft Internet Information Server (IIS)" and click [Next]. 10. When asked for NIC drivers, insert driver disk #1 in floppy A: and click [Have Disk]. Select "3com Fast Etherlink/ Etherlink XL PCI Bus Master NIC (3C905B-TX) and click [OK]. 11. Select the Protocols to be installed (NetBEUI, IPX/SPX, TCP/IP) and click [Next]. Insert disk #2 when prompted and click [OK]. Select "No" when asked if a DHCP server will be used. 12. When the TCP/IP properties window appears provide the following: a. IP address = 172.16.102.3 b. Subnet Mask = 255.255.254.0 c. Default gateway = 172.16.102.1 (NOTE YOUR IP ADDRESS MAY BE DIFFERENT THAN WHAT IS SHOWN HERE) 13. Click [OK]. Click [Next] to start the network. Enter the domain (TM2) and click [Next]. Click [Finish] 14. Select time zone and date and click [OK]. Click [OK] to accept display adapter. Click [OK] to save settings. Click [OK] 15. When the "Installation Complete" screen appears. Remove all disks and click [Restart Computer]. Q17. What is Remote Access Service (RAS)? Explain. Ans. Remote Access Service: Remote access is the ability to get access to a computer or a network from a remote distance. In corporations, people at branch offices, telecommuters, and people who are traveling may need access to the corporation's network. Home users get access to the Internet through remote access to an Internet service provider (ISP). Dial-up connection through desktop, notebook, or handheld computer modem over regular telephone lines is a common method of remote access. Remote access is also possible using a dedicated line between a computer or a remote local area network and the "central" or main corporate local area network. A dedicated line is more expensive and less flexible but offers faster data rates. Integrated Services Digital Network (ISDN) is a common method of remote access from branch offices since it combines dial-up with faster data rates. Wireless, cable modem, and Digital Subscriber Line (DSL) technologies offer other possibilities for remote access. A remote access server is the computer and associated software that is set up to handle users seeking access to network remotely. Sometimes called a communication server, a remote access server usually includes or is associated with a firewall server to ensure security and a router that can forward the remote access request to another part of the corporate network. A remote access server may include or work with a modem pool Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 19 of 38 manager so that a small group of modems can be shared among a large number of intermittently present remote access users. A remote access server may also be used as part of a virtual private network (VPN). Q18. Write a procedure to create a Network Boot Disk using the Window NT client Administrator. Ans. If you have an NT workstation you may skip to "Network Client Administrator Execution". Windows 2000 does not include an equivalent tool, however you may use the Windows NT version of the tool on a Windows 2000 system by performing the following steps: 1. Create a folder called C:\Ncadmin. 2. Create a subfolder called C:\Ncadmin\Clients 3. Copy the following files from the I386 folder on the Windows NT Server 4.0 CD-ROM to the folder you created: Ncadmin.cn_ Ncadmin.ex_ Ncadmin.hl_ 4. At a command prompt, change to the C:\Ncadmin folder, and then type the following command: "expand -r ncadmin.* 5. Double-click Ncadmin.exe to launch the utility. 6. Once launched, select the Make Network Installation Startup Disk from the menu and press the Continue button to begin. 7. You are requested to provide a path to the client installation files. Enter C:\Ncadmin\Clients as the path if you followed the steps above (or the appropriate directory if running from an existing NT Server installation), select the Share Files radio button and press OK. This will share the "C:\Ncadmin\Clients" folder as clients, which you may feel to remove after your network boot disk has been created. 8. The next dialog prompts you to choose what type of floppy, network client, and network card driver you wish to create the boot disk for. Choose Network Client v3.0 for MS-DOS and Windows as your network client. Select your network card from the list and press OK to continue. 9. The next dialog will prompt you for startup disk configuration information including Computer Name, User Name (must be unique on the network), Domain, and Protocol and (if necessary) IP information. Select TCP/IP Protocol from the protocol dropdown list, it may appear that there is only one item to select- look closely and you should see a very small scroll bar in the dropdown list (push the down arrow to see TCP/IP Protocol). 10. Next the boot disk itself will actually be created. You will need to provide a blank, formatted system disk (bootable) for the files to be placed on. Windows NT/2000 cannot do this for you, as there is no DOS equivalent operating system present to place on the floppy. Go to a DOS or Windows 9x machine and format the disk with the /s option to create the blank, formatted system disk. This should NOT be a Windows NT formatted diskette. Q19. What is MAC address? How do you find your MAC address? Ans. MAC Address: A Media Access Control address (MAC address) is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies including Ethernet. MAC addresses are most often assigned by the manufacturer of a network interface card (NIC) and are stored in its hardware, the card's read-only memory, or some other firmware mechanism. If assigned by the manufacturer, a MAC address usually encodes the manufacturer's registered identification number and may be referred to as the burned-in address. It may also be known as an Ethernet hardware address (EHA), hardware address or physical address. A network node may have multiple NICs and will then have one unique MAC address per NIC. Finding MAC address of a Machine: To find the MAC address of a machine, follow the following steps: 1. Click Start ->Run 2. Type cmd and press Enter 3. On dos prompt, type ipconfig/all, and press enter 4. This command will display the MAC addresses of all the Ethernet cards attached to the PC. Q20. How can you grant access rights to users in Novell NetWare? Ans. Setting up a Novell eDirectory user account involves creating a User object and setting properties to control login and the user’s network computing environment. You can use a template object to facilitate these tasks. You can create login scripts to cause users to be connected automatically to the files, printers, and other network resources they need when they log in. If several users use the same resources, you can put the login script commands in container and profile login scripts. Setting Up a User's Network Computing Environment 1. Right-click the User or Template object that you want to set up the network computing environment for > click Properties. Use a Template object if you haven't created the User object yet. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 20 of 38 2. On the General tab, select the Environment page. 3. Fill in the property page. Click Help for details. 4. Click OK. Setting Up Extra Login Security for a User 1. Right-click the User or Template object that you want to set up login security for > click Properties. Use a Template object if you haven't created the User object yet. 2. On the Restrictions tab, fill in the property pages you want. Click Help for details on any page. Page Use to Password Set up a login password. Restrictions Address Restrict the locations the user can log in from. Restrictions Time Restrictions Restrict the times when the user can be logged in. If the user will log in remotely, see Section 3.4, Login Time Restrictions for Remote Users. Login Restrictions o Limit the number of concurrent login sessions. o Set a login expiration and lockout date. 3. Click OK. 4. To set up intruder detection for all the User objects in a container: 1. Right-click the container > click Properties. 2. On the General tab, select the Intruder Detection page. 3. Fill in the property page. Click Help for details. 4. Click OK. Setting Up an Accounting of a User's NetWare Server Usage 1. Right-click the User or Template object that you want to set up the accounting for > click Properties. Use a Template object if you haven't created the User object yet. 2. On the Restrictions tab, select the Account Balance page. 3. Fill in the property page. 4. Click OK. 5. Use NetWare Administrator to set up one or more NetWare servers to charge for network services. Q21. Describe workgroups and domain Controller in Novell Netware. Ans. Workgroups: For convenience and security the network can be divided into workgroups, each containing one or more NetWare servers. A workgroup consists of a number of users who require the same access to certain information. Rather than making a file or directory available to any user on the network, you can make it available to the members of a workgroup only. Every user has an account in each workgroup of which they are a member. You connect to a workgroup, NetWare servers and/or a NetWare Directory Services tree by logging in. This involves typing your account's username and, if necessary, your password. Each workgroup has a user called SUPERVISOR who has workgroup administrator privileges. Other users can be given workgroup administrator privileges as well, allowing them to create new user accounts and workgroups and perform other administrative functions. A NetWare server has an owner who can change the server's settings. Anyone else to whom the owner has granted the right (such as the SUPERVISOR) can also do this. Server settings include the rights of all or specific users to access each shared resource belonging to that server. Domain Controller: The Primary Domain Controller on NetWare® functionality provides the capability to make a Novell® CIFS server a Windows NT 4 style Primary Domain Controller (PDC) in a network running the Microsoft CIFS protocol. While acting as a PDC, a Novell CIFS server will replace and become the Primary Domain Controller in a CIFS network. There are three main advantages of this new feature: Instead of having to create separate Microsoft domain and eDirectory user accounts (as was previously the case), user accounts now need to be created only once in eDirectory. The other CIFS workstations and CIFS servers in the network will function as if they were part of an NT4 domain. All CIFS clients will authenticate to a Novell CIFS server using eDirectory. Q22 What are the various modes of Windows NT? Explain. Ans. Windows NT operates in two different modes: 1. User Mode 2. Kernel Mode Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 21 of 38 1. User Mode: The user mode is made up of subsystems which can pass I/O requests to the appropriate kernel mode drivers via the I/O manager (which exists in kernel mode) Two subsystems make up the user mode layer of Windows NT: the Environment subsystem and the Integral subsystem. The environment subsystem was designed to run applications written for many different types of operating systems. None of the environment subsystems can directly access hardware, and must request access to memory resources through the Virtual Memory Manager that runs in kernel mode. Also, applications run at a lower priority than kernel mode processes. 2. Kernel Mode: Windows NT kernel mode has full access to the hardware and system resources of the computer and runs code in a protected memory area. It controls access to scheduling, thread prioritization, memory management and the interaction with hardware. The kernel mode stops user mode services and applications from accessing critical areas of the operating system that they should not have access to; user mode processes must ask the kernel mode to perform such operations on their behalf. Q23. How can you manage user accounts in Windows NT? Ans. User Account: A user account is used to represent an individual in the domain. Domain is the fundamental building block of the Windows NT server. A domain is a logical grouping of network resources including, server, printers, groups and user accounts. A user account consists of an account name, a password and a unique identifier. Types of User Accounts 1. Local user accounts 2. Domain User accounts 3. Built-in accounts 1. Local user Accounts: Local user accounts are stored in the local database of a computer and are primarily used to administer a computer or to allow several people to share a single computer, which is not a member of the domain. Each user account is unique to the local computer, therefore, any type of account maintenance activities such as changing passwords and user names are performed multiple times. Local user accounts are created and administered using the local users snap-in tool. The local users snap-in tool can be added to any custom Microsoft Management Console. 2. Domain User Accounts: Domain user accounts allow central administration of network resources. A user with a domain account can logon to any computer in the domain if the users are not specifically restricted from the computer. The domain user account is used throughout the network and managed on a domain controller. 3. Built-in Accounts: By default, several accounts are created with the installation of Windows NT server. The Windows NT server has two built-in accounts, one is called the administrator account and the other is called the guest account. Creating a User Account You need to perform the following steps to create a user account: 1. Select Start -> Programs ->Administrative Tools -> User Manager for Domains to open the ‘User Manager’ window. 2. Select User New User to create a new user account. 3. Enter user name such as Anurag in the ‘Username’ text box and full name of the user in the ‘Full Name’ text box. 4. Enter description in the ‘Description’ text box to specify the type of user account. 5. Enter Password in the ‘Password’ text box to specify the password of the user. 6. Enter same password in the ‘Confirm Password’ text box to confirm the password of the user. 7. Click the ‘Add’ button to apply the settings. Q24. How Policies can be managed in Windows NT? Ans. Policies: Policies are used for defining the legitimate actions and settings for users and computers in domain. The following are the built-in user rights in Windows NT Server: 1. System Policy 2. Account Policy 3. User-right Policy 4. Audit Policy 1. System Policy: It is an aggregate of user and computer settings, which manages the working environment of a user. System policies find application in aggregating a user profile with a computer profile. The system policy is kept in a file called NTConfig.pol, located in the Netlogon folder of the Primary Domain Controller (PDC). The system policy gives a means to ensure a uniform and consistent policy for all users. 2. Account Policy: The account policy specifies a method to handle passwords for all use accounts. It manages the global log on parameters. An account policy can be used in conjunction with system policy to Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 22 of 38 provide full control over the login behavior. To administer account policy you need to perform the following steps: a. Open the User Manager Window. b. Select Policies Account to display the ‘Account Policy’ dialog box. The account policy dialog box has the following fields: 1. Maximum Password age 2. Password uniqueness 3. Minimum Password age 4. Minimum Password Length 5. Reset Count after 6. No Account Lockout 7. Account Lockout 3. User Right Policy: The Windows NT Server operating system is responsible for defining user rights for the built-in groups. User rights are different from permissions, which are used for denoting usage policies for network resource like a directory or a file. You can administer the user right policy by selecting Policies User Right in the ‘User Manager’ Window. 4. Audit Policy: The audit policy permits you to keep track of the tasks carried out by the users by forming security log entries. The audit policy can be used to determine the categories of security events that have been saved in the security log. Each domain has identical audit policy. To administer the audit policy, you need to select Policies Audit in the ‘User Manager’ window. Q25. How can you install RAS components of Windows NT? Ans. Remote Access Service (RAS): You need to install and configure RAS in Windows NT Server for allowing your computer to connect to network computers. For installing RAS, you need the administrative privileges, you also need to check the availability of some specific hardware requirements, which are needed for installing RAS. The basic hardware requirements are: 1. A Network Adapter Card (NAC), which has a certified Network Driver Interface Specification (NDIS) driver. 2. One or more modems having hardware compatibility and one available COM port. 3. A multiport adapter card that helps in working with multiple remote connections. 4. An X.25 start card, in case you are using X.25 network. 5. An ISDN card or modem when you are using an ISDN line. To install RAS, you need to perform the following tasks: 1. Select Start Settings Control Panel to display the Control Panel window. 2. Click the Network icon available in the ‘Control Panel’ to open the network dialog box. By default, the Identification tab is selected in the Network dialog box. 3. Click the Services tab to display the Service tabbed page of the Network dialog box, which specifies various network services such as Gateway Service for Netware, NetBIOS Interface and Microsoft Internet Information Server 2.0. 4. Click the Add button for displaying the select Network Service dialog box, which holds the different network services and also allows you to add new network services. 5. Select the Remote Access Service option from the Network Service list and click OK. This prompts for the path to the distribution files. 6. Type the path and click OK for copying the RAS files onto your computer and to display the Add RAS Device, which contains a list of all ports accessible to Windows NT for RAS. 7. Select the port that you need to use for RAS and click OK to display the Remote Access Setup dialog box. 8. Select the port in the ‘Remote Access Setup’ dialog box and click the Configure button to open the Configure Port Usage dialog box. The various options available in the ‘Port Usage’ section of the Configure Port Usage dialog box are: a. Dial out only: It specifies that your computer system can only be an RAS client. b. Receive Calls only: It specifies that your computer system can only be an RAS server. c. Dial out and Receive calls: It specifies that your computer system can be both client and server. 9. Select the option of your choice from the ‘Port Usage’ section and click OK to display the ‘Remote Access Setup’ dialog box. 10. Click the Network button on the ‘Remote Access Setup’ dialog box to open the ‘Network Configuration’ dialog box, which allows you to configure network-wide settings of RAS. 11. Click the Continue button on the Remote Access Setup dialog box after setting the network configuration to open the RAS Server TCP/IP configuration dialog box. 12. Select the appropriate configuration and click OK to display the Network dialog box. 13. Click OK to close the Network dialog box and restart your computer system to apply the changes made to RAS. Q26. How disk resources can be managed in Windows NT Server? Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 23 of 38 Ans. Managing Disk Resources: A user can perform disk related tasks such as creating partitions and formatting disk using the disk administrator utility provided by ‘Windows NT Server’. Disk Administrator helps to manage disk resources by displaying all the drives of the system with their types and capacity. Windows NT has a utility named ‘Disk Administrator’ to manage and understand partitioning the disk resources. Using Disk Administrator: To use the disk administrator 1. Select Start Programs Administrator Tool Disk Administrator to display the disk configuration view of the Disk Administrator. 2. Select Options Disk Display to control the size of the disk. 3. Accept the default settings and select Options Region Display to show the relationship among partitions of the disk and control logical drive display. 4. Select the Size regions based on equal size option and click the OK button to apply the changes. 5. Select Options Customize Toolbar to customize the toolbar of ‘Disk Administrator’. 6. Select a button such as ‘Separator’ from the available buttons list to add a button to the ‘Disk Administrator’ toolbar. 7. Click the ‘Add’ button to add the ‘Separator’ button to the Toolbar buttons list. Q27. How can you add and remove Windows NT components? Ans. Windows NT components can be added or removed by following steps 1. Click Start Settings Control Panel 2. Click on Add or remove program icon. 3. Add or remove programs window will open up. Click on Add/remove windows components icon present on the left hand side of the window. 4. After clicking on ‘Add/remove windows components’ a new window will open up. 5. This window will display all the components currently installed in the system and other components, which can be installed. 6. Select the component by checking the check box. 7. Click on ‘OK’ button and insert Windows NT Server CD to install the respective components. 8. If you want to uninstall any component then uncheck the check box for the respective component and click OK. 9. It will uninstall the components from the computer. Q28. Explain the Client-Server computing. Ans. Client-Server Computing: The client–server model of computing is a distributed application that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients.[1] Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server machine is a host that is running one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers, which await incoming requests. The client–server characteristic describes the relationship of cooperating programs in an application. The server component provides a function or service to one or many clients, which initiate requests for such services. Functions such as email exchange, web access and database access, are built on the client–server model. Users accessing banking services from their computer use a web browser client to send a request to a web server at a bank. That program may in turn forward the request to its own database client program that sends a request to a database server at another bank computer to retrieve the account information. The balance is returned to the bank database client, which in turn serves it back to the web browser client displaying the results to the user. The client–server model has become one of the central ideas of network computing. Many business applications being written today use the client–server model. So do the Internet's main application protocols, such as HTTP, SMTP, Telnet, and DNS. The interaction between client and server is often described using sequence diagrams. Sequence diagrams are standardized in the Unified Modeling Language. Specific types of clients include web browsers, email clients, and online chat clients. Specific types of servers include web servers, ftp servers, application servers, database servers, name servers, mail servers, file servers, print servers, and terminal servers. Most web services are also types of servers. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 24 of 38 Q29. Difference between NT4.0 vs 95/98 Ans There are so many differences between window NT vs 95/98 like :A number of advantages are associated using the NTFS which included automatic backup of master files tables and security. Window NT 1) Window NT we can’t open or access the win NT operating system without any password. 2) Where as win2k professional use FAT16.FAT32 and NTFS file system 3) But win NT provide both encrypt and compression 4) NT provide Searching option 5) It can control file folder and program 6) Window NT provide Active directory concept to create domain. 7) It providing much greater stability. 8) Window NT is fully plug and play Q30. Ans Window 95/98 1) Security:- win95/98 we have password protection against the system and files but that is not sufficient because we can start the win95/98 without any password with the escape and cancel button 2) File System :-Win95/98 use a fat and fat32 file system which store 2GB file in a database in the boot sector of hard disk. 3) 95/98 doesn’t provide compression and encrypting. 4) Where as 95/98 provide find option. 5) But it doesn’t provide folder and program. 6) Where as 95/98 doesn’t provide this concept. 7) It is not stable. 8) But window 95/98 is not fully plug and play. What is operating system also define basic concept What is operating system Operating system is a large collection of software that manages resources of the computer such as memory, Processor, file system and I/O devices. It acts as a interface between the user and the hardware of the computer system. Basic concept of operating system An operating system is a set of instructions stored on a storage device such as hard disk, compact disk read only memory or floppy disk. When you switch on a computer, the power on routine and a set of power on routine activities is performed. These powers on routine activities verify the devices attached to the CPU, such as keyboard, hard disk floppy disk, CD ROM and printers for their proper functioning. The instruction for these powers on routine activities is stored in the ROM. ROM The read only memory as the name may suggest contains information that can only be read. you can’t write on this type of memory. It is non-volatile or permanent in nature. It is basically used to store permanent programs such as program for the functioning of the monitor. It stores data even when the power is switched off. However ROM stores only a few kilobytes. RAM The random access memory is a read write memory i.e. information can be read as well as written into this type of memory. It is volatile in nature, i.e., the information it contains is lost as soon as the system is shut down unless 'saved' for further usage by users. It is basically used to store programs and data during the computer’s operation. Q31 How to install network service Ans Installing a network service You might need to be logged on as an administrator or a member of the Administrators group in order to perform some tasks. Network services provide features such as file and printer sharing. For example, the File and printer Sharing for Microsoft Networks service allows other computers to access resources on your computer using a Microsoft network. The procedure below describes how to add a network service to your computer. To add a network service to your computer 1. Open Networkms-its:C:WINDOWSHelpEXEC=,control.exe,netconnections CHM=ntshared.chm FILE=alt_url_windows_component.htm::/ Connection. 2. Under LAN or High-Speed Internet, click Local Area Connection. 3. On the File menu, click Properties. 4. In the Local Area Connection Properties dialog box, click Install. 5. In the Select Network Component Type dialog box, click Service, and then click Add. 6. In the Select Network Service dialog box, click the service you want to install, and then click OK. To open Network Connections, click Start, click Control Panel, and then double-click Network Connections. For information about using Network Connections, click the Help menu in Network Connections. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 25 of 38 Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 26 of 38 Long questions (10 marks) Q 1 Explain file system Ans FAT FAT started being used with DOS and there are now three different versions of the File Allocation Table file system - FAT12, FAT16 and FAT 32. The numbers used in these versions designate the number of bits used to identify a cluster. FAT12: The earliest version the file system, FAT12 allows a partition to contain up to 4096 (212)clusters. Since it supports clusters of one to sixteen sectors, the maximum partition size is 32MB. Windows 2000 uses FAT12 for floppy disks and for partitions of 16MB or smaller. FAT16: FAT16 provides a sixteen-fold expansion in the number of clusters it identifies, supporting volumes containing 65,536 (216)clusters. It also expands the maximum cluster size to 128 sectors (64KB) and maximum volume size to 4GB. FAT32: To address the need for even larger storage capacity, Microsoft introduced FAT32 with Windows 95 OS. Following the pattern of the earlier versions of the file system, it uses 32 bits to designate a cluster. However the last four bits are reserved. Each volume, therefore, can contain up to nearly 270 million (228)clusters which theoretically translates into a 8 Terabyte volume comprised of 32KB clusters. In practice, however, while Windows NT will manage larger volumes created in other operating systems, it limits the size of new FAT32 volumes to 32GB since the file system becomes quite inefficient beyond that size. If you do want to create a larger volume, you can dual boot the system into either Windows 95 or 98, establish the volume using that OS, and then manage the volume using Windows NT. The above types of FAT file system have key architectural elements in common. Several sections actually comprise a FAT volume, starting with the boot sector. Following this up are the file allocation table and, for protection, a duplicate file allocation table. Next comes the root directory and finally any other directories and files of the volume. FAT32 also stores a duplicate copy of the boot sector for added reliability. The FAT boot sector starts with three bytes containing a jump instruction telling the CPU that the next several bytes are not executable. After that is an eight byte OEM ID which identifies the operating system that formatted the volume. Next comes the BIOS Parameter Block, which lists the parameters of the volume. These include such items as the number of bytes per sector, sectors per cluster, number of reserved sectors, number of file allocation table copies (generally two), number of possible entries in the root directory and number of sectors in the volume. Each cluster in the volume has an entry in the file allocation table which indicates whether the cluster is bad, whether it contains a file and, if so, if that is the last cluster for that file. If the cluster contains a file which is continued in another cluster, the file allocation table entry will contain the number of that cluster. If the entire cluster is contained in a single cluster, or if that cluster is the final one for a file spanning multiple clusters, the entry will contain the value "0xfff" indicating that it is the last cluster. In FAT12 and FAT16, the root directory or root folder contains 512 entries, each one being 32 bytes. FAT32 permits an unlimited number of entries in the root directory, and that directory can be located anywhere on a hard disk. Each entry begins with the file name in 8.3 format. Following this is the attribute byte which contains six binary flags indicating whether the file has been archived, if the entry is a directory or a file, if it is read-only, whether it is a hidden file, if it is a system file and if it is a volume label. Next come eleven bytes telling when the file was created, last accessed and last modified. After that are two bytes identifying the location of the first cluster in the file (The locations of the rest of the clusters are stored in the file allocation.) The entry finishes a four byte number giving the size of the file in bytes, yielding a maximum file size of 4GB (232). This root directory structure only natively supports file names using the 8.3 format. For long file names it uses a truncated version of the file name (e.g., FILENA~1.EXE) for the main entry and assigns additional lines in directory to list the long names using Unicode. Since FAT12 and FAT16 have a limit to the size of the root directory, this will reduce the total number of files or directories that can be listed in the root. This is not a problem with FAT32, however, since it doesn't have this directory-size limitation. NTFS While each of the FAT versions represents an incremental improvement over its predecessor, NTFS takes a completely different approach to the way that data is organized. It grew out of Microsoft's desire to increase its share of the corporate marketplace. FAT was a very simple system which worked for PCs, but it lacked the management and security features needed to compete with UNIX in a high-end, networked environment. The first attempt at a newer file system was the High Performance File System (HPFS) introduced with OS/2 Version 1.2. When the IBM/Microsoft partnership that created OS/2 fell apart, and Microsoft decided to create Windows NT, it incorporated some of the features of HPFS into its New Technology File System (NTFS). NTFS is the native file system for Windows NT 4.0, 2000 and XP operating systems. While these O/S can operate with FAT, many of their features only work with NTFS, so NTFS should be used whenever possible. Fortunately, if you have one or more FAT partitions running on one of these operating systems, it is a simple matter to convert them to NTFS without losing any data. NTFS, a log-based file system, addresses FAT's reliability and recoverability problems. Theoretically this system would allow access to 16 exabytes (16 billion GB) which far exceeds current storage needs. For now, Windows 2000 limits volumes to 128 Terabytes, but later operating systems could take advantage of even larger storage capacities. Like FAT, it sets a default cluster size depending on the size of the partition, Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 27 of 38 assigning a size of 4KB for anything over 2GB. Also like FAT, administrators can override the defaults and use drop-down box to specify sizes up to 64KB. An NTFS partition is divided into four sectors: the Partition Boot sector, Master File Table, Filesystem Data and a backup copy of the Master File Table. The partition boot sector consists of two sections and occupies the first sixteen sectors. The first section holds the BIOS parameter block containing information on the layout of the volume and the structure of the file system similar to what is laid out above for FAT. The boot code to load Windows NT/2000/XP resides in the second section. NTFS considers two types of attributes - resident and non-resident - that can be used to describe a record. Resident attributes are ones that fit within the MFT, while non-resident attributes are ones too large to fit in the MFT record. Q2 Explain feature of NTFS Ans Additional NTFS Features In addition to supporting larger volumes than FAT, NTFS contains other features that make it better for corporate operations: Reliability. A drawback to using FAT is that if a computer goes down, it can be difficult to repair the file system. To make speed recovery, NTFS maintains a log of every transaction that affects the file system. These actions are logged before they are performed. Then, when there is a problem, any incomplete transactions can be completed or changes can be rolled back. Mount Points - All Windows versions assign a different drive letter to each partition or volume on a disk, which limits the number of accessible volumes to the 26 letters of the alphabet. Mount Points let the administrator attach other partitions to an empty directory within an already mounted NTFS volume. Rather than being limited to NTFS volumes, these additional volumes can also be using FAT16, FAT32, CDFS or UDF which expands the functionality of this feature. Access Control - The Security Descriptor function provides hierarchal access control for each file or directory in an NTFS volume. It is important to understand that the security features built into Windows NT/2000/XP only work with NTFS. If you use FAT, you lose all security functionality and place the organization at risk. Disk Quotas - NTFS permits assigning of storage quotas on a per-user basis. It does this by tracking the Security ID (SID) of anyone who creates a file or directory. When the limit is exceeded, the system sends a "Disk Full" error report and logs it in the Event Log. Encryption - When the computer is running Windows 2000, NTFS includes Microsoft's Encrypting File System (EFS) which automatically encrypts and decrypts files without user intervention. This is particularly useful for remote users, since laptops are frequently lost or stolen and one can't rely on users to remember to encrypt their files. These and other features are not available with FAT. Optical Disk Formats In addition to the magnetic disk formats, Windows 2000 also supports two different optical file formats - CDFS and UDF. CD-ROM File System (CDFS) is based on ISO 9660, a read-only file system standard written by an industry group called High Sierra. The group got that name from its initial meeting in 1985 at Del Webb's High Sierra Hotel and Casino at Lake Tahoe, Nevada, where company representatives began cooperation on developing an non-proprietary file system format for CD-ROM. The initial standard was called by the name of the group, High Sierra, but the International Organization for Standardization (ISO) requested that an international version of the standard be released and this was formalized as ISO 9660--Volume and File Structure of CD-ROM for Information Interchange. MacIntosh, DOS, Windows, UNIX and Linux all support the standard which calls for 2048-byte physical sectors. In CDFS Level 1, like MS-DOS, follows the 8.3 file name format. Directories are limited to eight-character names and eight nested levels. Levels 2 and 3 permit longer file and directory names, up to thirty-two characters, and allow use of lower case letters. Microsoft developed an extension to ISO 9660, called Joliet, which is supported in Windows 95/98/2000/Me/NT4.0/.NET. as well as Mac and Linux. Joliet allows the use of Unicode characters in filenames of up to 64 characters. Universal Disk Format (UDF) is a later standard created in 1995 by the Optical Storage Technology Association and defined in ISO 13346. It permits 255 character names with a maximum path length of 1023 characters and can be used with CD-ROMs, CD-Rs, CD-RW and DVD-ROMs. While ISO 9660 calls for data to be written continuously to the disk, UDF utilizes packet writing. Windows 98 and later versions of Windows support the UDF format, although only for reading, not writing, files. To write to CDs or DVDs requires additional software. Partitioning Strategies With earlier file systems, partitioning was a means of avoiding the inherent size limits. If one is still using a version of FAT on a large disk, this can still pose a problem, and partitioning is a way of addressing that. With NTFS supporting huge multi-disk volume that is no longer a consideration. There are, however, other reasons to partition. These include: Multiple OS Support: This can include supporting multiple versions of Windows, or adding a boot partition for Linux or another OS. Separating the OS from the Data Files: Putting these two in separate partitions can make it easier to administer. By limiting access to the drive containing the OS to those with administrative privileges, while letting Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 28 of 38 the users save and access the data files can eliminate the problems connected with users accessing files they shouldn't. Optimizing Cluster Sizes: Having the right sized clusters for the type of files can improve overall performance. When you have some both large and small files residing on the same partition it is hard to find a correct size cluster that optimizes performance. A large database or graphics file, for example, could benefit from using 64KB clusters since that would mean fewer read/write operations and less fragmentation. A bunch of text files, on the other hand would do better with small clusters since they would waste most of the space in a large file. Putting these in separate partitions, with appropriate cluster sizes, would boost system performance for both types of operations. Q3. Classification of computer explain any four Ans-Classification of operating system All operating system consist of similar component and perform almost similar function. But the method and procedures for performing these function are different. Operating system are classified into many parts. Single user operating system Multi user operating system Batch user operating system Multiprogramming operating system Multitasking operating system Parallel operating system Distributed system Real time operating system Single user operating system Single user-: Single user mean single user access a computer at a time. These computer have single process and execute single program. The resources such as CPU and I/O devices are constantly available to the user in a single user operating system for operating the system. Multi user operating system -:It allow various users to access the different resources of a computer simultaneously. The access is provided using a network that consists of various personal computers attached to a mainframe computer. These computer send and receive information to a multi user mainframe computer. Therefore the mainframe computer acts as a server and the other computer act as client for that server. Unix and Linux is truly multi user operating system. The advantage of using multi user operating system is that it facilitates the sharing of data and information among different users. Hardware resources such as printers and modems are also shared using the multi user operating system. Batch processing operating system The batch processing operating system places then users jobs on an input queue and these jobs are stored as a batch. The batch monitor executes these batch at a definite interval of time. The batch monitor accepts the command for initializing, processing and terminating a batch. These jobs are executed through interaction with the hardware and the operating system gives the output back to different users. The batch processing user intervention during the processing of jobs. It has high turn around time. The turn time taken between submitting the job and getting the output, which includes the information related to the job included in a batch. The turn around time is reduced using high speed storage access devices such as magnetic disk. The batch monitor executes the batches based on the process of job scheduling that sequences different jobs on FCFS Multiprogramming-: Multiprogramming allows multiple users to execute multiple programs using a single CPU. The multiprogramming operating system executes different processes concurrently using a time multiplexed CPU. By implementing the concept of CPU slicing between them. CPU slicing enables operating system to execute multiple jobs concurrently. The CPU switching between the programs is so fast that the response time for users is fraction seconds. The operating system uses an interactive computer system that provides shared access to different resource. Multitasking operating system-: Multitasking have the ability to handle a number of tasks or job simultaneously. Multitasking operating system also called time sharing system with the multiprogramming feature. Time sharing system contains multiple user terminals that are connected to the same system to work simultaneously. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Q4 Page 29 of 38 Installation step of window NT Ans 1. Insert your Windows NT 4.0 CD and Disk 1 of your 3 NT Workstation setup disks 2. Once this is done boot up system. 2) The following "Hardware Configuration" will appear and Windows NT will detect your hardware configuration. 3) Soon you will be prompted to Insert NT setup disk, does this and hit enter. 4) Now the "Welcome to Setup" menu will appear, press "ENTER" to start Install. 5) You will be now prompted to search for mass storage devices (CD-Rom in most cases), press enter to continue or "S" if you have a SCSI device. 6) Now insert disk 3 of your Win NT Workstation setup. 7) Windows has found a CD-Rom. Press enter to continue. If you have SCSI devices you will have to hit "S" to specify. 8) Now the NT License agreement, Click on page down until you get to the bottom 9) Now the "Components" menu. The standard setting that NT now picks should be ok, make changes if needed else hit "ENTER" to continue. 10) Win NT has now detected your hard drive. This, if it has been setup before will have to be deleted if you are looking to install a Fresh operating system. Press "D" to delete the partition that is highlighted. 11) You are now given your last chance to not delete a partition. To continue Press "ENTER" 12) Now the partition menu appears, Press C to create a partition.. 13) You will now be asked size of Hard drive, default is Max space on your hard drive. 14) As we are going to use FAT16 you will set up the drive to any size below 2048mb. Click enter when happy with size. 15) The partition is setup. We recommend that you leave any remaining space until later, when in windows, otherwise you can setup the remaining space by following the steps we just did for the main drive. 16) You will now be asked how you wish the drive to be formatted, we recommend FAT for most users, for more security use NTFS. 17) Setup will now format your Hard drive partition 18) You will now be asked where you wish NT to be installed, unless doing a parallel install leave the default and hit "ENTER" 19) Setup will then copy files 20) Part of setup is now complete. You will now remove any CD's in the drives and "ENTER" to reboot your system 21) Click enter to continue from the startup menu. 22) You will now be prompted for the NT CD again, please insert and when drive is ready click "OK" 23) NT will copy more files.... 24) Then when the "Windows NT Setup" screen appears click "NEXT" to continue.... 25) Now your setup options, for normal users select typical and for laptop users select portable, then click next 26) Now fill in your name and organization, click on next to continue... 27) Now enter your certificate of Authenticity, click enter to continue 28) And now enter the name by which you wish the computer to be known, click on enter to continue... 29) And now the all important Admin password, enter it and then enter it again to confirm it, make sure you don't forget it or you'll not get into windows. Or you could leave it blank, then you will not need it for entering windows then click ok. 30) Windows NT will now prompt you to make Emergency Repair Disk. It is up to you if you wish to create these, make your selection and click next. 31) The "NT Network" menu shall appear, we recommend you select "do not connect" option and hit next, you are best setting up networks when NT is installed. 32) Now select your time zone, click apply and close when finished. 33) Now your display adapter, don't install until you get into windows, so click on "OK" and then "OK" again. 34) NT will then continue to copy files and finally completed, click on "RESTART COMPUTER" to continue, remove any CD. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Keyboard Page 30 of 38 Mouse Operating System Hard disk Monitor Application Printer Q5 What is register explain its keys Ans Registry: Registry is the operating system database on each Windows NT-based computer, which contains information that is needed for network management and other devices of the computer. When we make any changes to the operating system the registry settings gets changed automatically. It is actually a database used by the operating system to manage the computer efficiently and stores information regarding different users and different devices. Or Registry is a database that contains all the information regarding configuration setting on your system. Every thing from user account application and any kind of document they create to properties setting modems and other Hardware. These entries are update automatically by win NT operating system. When they receive a request from one of the control penal. Step to open the register 1.Click start menu go to run 2. Then write regedit Enter 3.Registry will invoke with the following given option in the left penal of the register will see the sub tree. HKEY_CLASSES _ROOT Contain information on file association data. HKEY_CURRENT_USER Contains information about the user currently logged. HKEY_LOCAL_MACHINE Stores information about the user current available on your computer as well as device drivers setting along with network and hardware profiles. HKFY_USER Store information about users and their preferences along with network and desktop setting. HKEY_CURRENT_CONFIG Contains information about the currently active hardware configuration Q6 What do you mean by local group and global group? Ans Local Group: A local group is local to the security system in which it is created. A local group created on a Windows NT workgroup workstation is available only on the workstation on which it is created. A local group on a Windows NT workstation can contain user accounts created on the workstation, users and global groups from Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 31 of 38 the workstation's domain and users and groups from domains trusted by the workstation's domain. Global Group: Global groups contain user accounts from one domain grouped together as one group name. A global group cannot contain another global group or a local group. The default global groups on an Advanced Server are the Domain Admins and the Domain Users groups. A Windows NT workstation does not define any default global groups. However, because a global group can be a member of a local group, a local group defined on a Windows NT workstation can contain a global group from the domain. A local group can also contain a global group from another domain by passing through trust relationships. Local groups cannot traverse trust relationships. Q7. What is remote access Ans With Remote Desktop on Windows NT, you can have access to a Windows session that is running on your computer when you are at another computer. This means, for example, that you can connect to your work computer from home and have access to all of your applications, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you can see your desktop at work displayed on your home computer, with the same programs running. When you connect to your computer at work, Remote Desktop automatically locks that computer so no one else can access your applications and files while you are gone. When you come back to your computer at work, you can unlock it by typing CTRL+ALT+DEL. Remote Desktop also allows more than one user to have active sessions on a single computer. This means that multiple users can leave their applications running and preserve the state of their Windows session even while others are logged on. With Fast User Switching, you can easily switch from one user to another on the same computer. For example, suppose you are working at home and have logged on to the computer at your office to update an expense report. While you are working, a family member needs to use your home computer to check for an important email message. You can disconnect Remote Desktop, allow the other user to log on and check mail, and then reconnect to the computer at your office, where you see the expense report exactly as you left it. Fast User Switching works on standalone computers and computers that are members of workgroups. Remote Desktop enables a variety of scenarios, including: Working at home - Access work in progress on your office computer from home, including full access to all local and access devices. Collaborating - Bring your desktop to a colleague's office to debug some code, update a Microsoft PowerPoint slide presentation, or proofread a document. Sharing a console - Allow multiple users to maintain separate program and configuration sessions on a single computer, such as at a teller station or a sales desk. To use Remote Desktop, you need the following: A computer running Windows NT ("Remote " computer) with a connection to a Local Area Network or the Internet. A second computer ("home" computer) with access to the Local Area Network via network connection, modem, or Virtual Private Network (VPN) connection. This computer must have Remote Desktop Connection, formerly called the Terminal Services client, installed. Appropriate user accounts and permissions. Q8. Classification of computer define any five Ans-: Classification of operating system All operating system consist of similar component and perform almost similar function. But the method and procedures for performing these functions are different. Operating systems are classified into many parts. Single user operating system Multi user operating system Batch user operating system Multiprogramming operating system Multitasking operating system Parallel operating system Distributed system Real time operating system Single user operating system Single user mean single user access a computer at a time. These computer have single process and execute single program. The resources such as CPU and I/O device are constantly available to the user in a single user operating system for operating the system. Multi user operating system It allows various users to access the different resources of a computer simultaneously. The access is provided using a network that consists of various personal computers attached to a mainframe computer. These computers send and receive information to a multi user mainframe computer. Therefore the mainframe computer acts as a server and the other computer act as client for that server. Unix and Linux is truly multi user operating system. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 32 of 38 •The advantage of using multi user operating system is that it facilitates the sharing of data and information among different users. Hardware resources such as printers and modems are also shared using the multi user operating system. Batch processing operating system The batch processing operating system places then users jobs on an input queue and these jobs are stored as a batch. The batch monitor executes these batches at a definite interval of time. The batch monitor accepts the command for initializing, processing and terminating a batch. These jobs are executed through interaction with the hardware and the operating system gives the output back to different users. The batch processing user intervention during the processing of jobs. •It has high turn around time. The turn time taken between submitting the job and getting the output, which includes the information related to the job included in a batch. The turn around time is reduced using highspeed storage access devices such as magnetic disk. The batch monitor executes the batches based on the process of job scheduling that sequences different jobs on FCFS Multiprogramming Multiprogramming allows multiple users to execute multiple programs using a single CPU. The multiprogramming operating system executes different processes concurrently using a time multiplexed CPU. By implementing the concept of CPU slicing between them. CPU slicing enables operating system to execute multiple jobs concurrently. The CPU switching between the programs is so fast that the response time for users is fraction seconds. The operating system uses an interactive computer system that provides shared access to different resource. Multitasking operating system Multitasking have the ability to handle a number of tasks or job simultaneously. Multitasking operating system also called time sharing system with the multiprogramming feature. Time-sharing system contains multiple user terminals that are connected to the same system to work simultaneously. Q9. How to install printer Ans To install new or updated printer drivers You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure. Open printers and fax. 1. Right-click the printer for which you want to change drivers, and then click Properties. 2. On the Advanced tab, click New Driver to install a new or updated version of the msits:C:WINDOWSHelpHELP=glossary.hlp TOPIC=GLS_PRINTER_DRIVER::/ printer driver using the Add Printer Driver Wizard. 3. Click Next, and then do one of the following: o Click the appropriate printer manufacturer and printer model if the new or updated driver is on the list. o Click Have Disk if the printer driver is not included in the list or if you have received a new or updated driver on CD or diskette from the printer manufacturer, type the path where the driver is located, and then click OK. 4. Click Next, and then follow the instructions on the screen to finish installing the printer driver. To open Printers and Faxes, click Start, click Control Panel, and then double-click Printers and Faxes. You can also open printer properties in Printers and Faxes by clicking a printer, and then clicking Set printer properties under Tasks on the left side of the window. This option is available only if folders are set to look like a Web page and a printer is selected. For more information, click Related Topics. When using NT, you may be able to install new or updated printer drivers when logged on as a member of the Power Users group, depending on the components required by the printer driver. If the printer driver you want to use already exists on the print server, you can install it by selecting it from the Driver list. Q10. Export Quota settings to another volume Ans Open My Computer. 1. Right-click the volume from which you want to export quota settings, and then click Properties. 2. In the Properties dialog box, click the Quota tab. 3. On the Quota properties page, click the Quota tab, make sure the Enable quota management check box is selected, and then click Quota Entries. 4. Click the user quota records you want to export. 5. On the quota menu, click Export. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 33 of 38 6. In the Export Quota Settings dialog box, specify a destination folder, type in a file name for the saved settings, and then click Save. To open My Computer, click Start, and then click My Computer. If the volume is not formatted with the NTFS file system, or if you are not a member of the Administrators group, the Quota tab is not displayed in the volume's Properties dialog box. Alternatively, you can open two instances of the Quota Entries window: one for the source disk volume from which you want to export quota records, and one for the destination volume into which you are exporting the quota records. Then you can drag quota records from the source volume's Quota Entries window to the destination volume's Quota Entries window. For entries that already exist on the destination volume, the settings transferred are the user's disk space limit and quota warning level values. If the entries do not exist, new entries are created. Disk quota settings are saved in a file format that is exclusive to the Disk Quotas utility and that is used only for importing and exporting quota settings from one volume to another. The Export Quota Settings dialog box does not reveal the file name extension for the settings file, even if the folder that contains it shows file name extensions for all files. You can drag a selected quota setting to a folder where an export file is automatically created Q11. Discuss the evolution of operating system. How many types of operating systems are there? Ans. 1) Simple batch system: It has a single processor, runs a single programming at a time and interacts with single user at a time. To speed up processing, jobs with similar needs were batched together and were run through the computer as a group. Thus the programmers would leave their programs into batches with similar requirements and, as the computer became available, would run each batch. The output from each job would be sent back to the appropriate programmers. 2) Batch processing system:. In batch processing programs, data and system commands are submitted to computer in the form of a job. It takes several jobs in a queue and automatically keeps executing one job to next job in the queue. There may be little or no interaction between the user and executing program. The batch monitor does all the functions of the batch processing system. Batch monitor are permanently stored on the lower part of the memory and the rest part of memory is left for the execution of current job. 3) Multiprogramming operating system: When more than one program is executing in the system then it is called multiprogramming. The operating system that supports more than one program to execute simultaneously is called multiprogramming operating system. Multitasking or multiprogramming operating system supports concurrent execution of two or more programs (at the same time). Multiprogramming increases CPU utilization by organizing jobs in several ways such that the CPU always has one job to execute. The idea behind this is -- As the operating system keeps several jobs in the memory at a time, some jobs are kept in the job queue. The operating system picks and executes one of the jobs. This job may have to wait for some task, then operating system switches to and executes another job. When that job needs to wait, the CPU switches to another job and so on. When first job finishes waiting then it gets CPU back. Hence there is always some job to execute, so CPU will never sit idle. 4) Time sharing system: A time-shared operating system allows many users to share the computer simultaneously. As each process in the time-shared system is very short so only little CPU time is needed for each user. As the system switches rapidly from one user to another the user thinks that he is the only user working in the system whereas actually many users share the computer. Time-sharing system sets the time for every process. Therefore it requires round robin scheduling. In this system, every job is allocated a time slice. If time of one job is completed but job is not finished then this job is placed at the end of queue of waiting program. 5) Parallel system: Most systems today are single processor systems, that means they have only one main CPU.A system containing more than one processor is multiprocessor system. Such systems have more than one processor in close communication, sharing the computer bus, the clock and sometimes memory and peripheral devices. These systems are referred to as tightly coupled system. 6) Distributed system: A recent trend in computer system is to distribute computation among several processors. In this scheme the processors do not share memory or clock, instead every processor has its own memory and clock chip. The processors can communicate with one another through various communication lines. These systems are usually referred to as loosely coupled systems or distributed systems. The processors in this scheme are referred to by a number of different names like sites, nodes, computers and so on. 7) Real time system: Real time operating system is used in an environment where a large number of events, must be accepted and processed in a short time. It has well defined fixed time constraints. Processing must be done within he defined Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 34 of 38 constraints, or the system will fail. Such application includes telephone switching equipment, flight control and real time simulation. Q12. What are the different components of an O.S. Explain each of them briefly. Ans. The different components of operating system are : 1) Process management: The various activities of this component are: a) creation and deletion of both system and user processes. b) Suspension and resumption of processes c) The facility of methods for process synchronization d) The facility of methods for process communication e) The facility of methods for deadlock handling 2) Memory management: The various activities of this component are: a) Keeps track of which parts of memory are currently being used and by whom b) Decides which processes are to be loaded into memory when memory space becomes available. c) Allocates and deallocates memory space as required 3) File management: The various activities of this component are : a) Helps in creation and deletion of files b) Helps in creation and deletion of directories c) Backup of files on storage media 4) I/O system management: This component includes: a) Memory management component including buffering, caching and spooling b) Device driver interface c) Drivers for specific hardware devices. 5) Secondary storage management: The various activities of this component are : a ) free space management b ) storage management c ) disk scheduling 6) Networking: A distributed system is a collection of processors that do not share memory or peripheral devices. Each processor has its own local memory and the processors communicate with each other in various communication lines such as telephone lines. Access to a shared resource allows computation speed up, increased data availability and increased reliability. 7) Protection systems: If a computer system has multiple users and allows concurrent execution of multiple processes then the various processes must be protected from one another. For this purpose methods are provided to ensure that files , memory segments, CPU and other resources can be operated only by those process that have taken proper authorization from the operating system. 8) Command interpreter system: It is one of the most important system programs for an operating system. It is an interface between the user and the operating system. When a new job is started or when a user logs on to a time-shared system a program that reads and interprets control statement is executed automatically. This program is known as command line interpreter or shell. Q13. Discuss the need of process scheduling & types of schedulers Ans. Scheduling is the process of bringing the processes to the ready queue and then sending them to the processor. The processes are residing in the ready queue and are given to the CPU one by one according to the scheduling algorithm used. Scheduler A scheduler is a module of operating system, which gives the time to each process. It refers to a set of policies and mechanisms supported by Operating System that controls the order in which the work has to be done. All computer resources and processes are scheduled before use and executes. SCHEDULING TECHNIQUES / TYPES OF SCHEDULERS / LEVELS OF SCHEDULING Basically there are 3 types of scheduler which may co-exists in the complex Operating System: 1.Long-term schedule 2.Medium-term scheduler 3.Short-term scheduler Long-Term Scheduler (LTS) The job of LTS is to take a process from job queue and place it in the ready queue. It is also known as job scheduler. It executes much less frequently as short time scheduler because it has to decide which process to place in the ready queue. As it controls the degree of multiprogramming. It makes a careful selection of process, which may be a mix of I/O bound process, and CPU bound process. If all process is I/O bound then all come in suspended state. Short-Term Scheduler /CPU Scheduler (STS) The job of STS is to take a process from ready queue and allocate CPU to them. Ready queue is not necessary implemented as FIFO queue. It depends on various scheduling algorithm. The ready queue may be implemented as a FIFO queue, a priority queue, a tree or simply an unordered linked list. The short-term Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 35 of 38 scheduler is also known as CPU scheduler. The short-term scheduler selects a new process for the CPU quite frequently. Medium Term Scheduler (MTS) When a process has to wait for some event to occur then Operating System switches the CPU to other process. The previous or waiting process is swapped out and the new or ready process is swapped in to the ready queue. Medium term scheduler does the process of swapping-in and swapping-out. Some processes are suspended and some processes are brought into memory. The job of swapping out and in is done by M.T.S. This is done so that the memory may be available for new processes. Explain process scheduling. What are scheduling queues, schedulers and context switch Ans. The objective of multiprogramming is to have some process running at all times, so to maximize CPU utilization. Time - sharing is to switch the CPU among processes so frequently that users can interact with each program while it is running. A uniprocessor system can have only one running process. If more processes exist, the rest must wait until the CPU is free and can be rescheduled. Scheduling Queues: - As processes enter the system, they are put into a job queue. This queue consists of all processes in the system. The processes that are residing in main memory and are ready and waiting to execute are kept on a list called the ready queue. The list of processes waiting for a particular I/O device called a device queue. A new process is put in the ready queue. It waits in the ready queue until it is selected for execution. Once the process is assigned to the CPU and is executing, one of several events could occur: The process could issue an I/O request, and then be placed in an I/O queue. The process could create a new sub process and wait for its termination. Scheduler A scheduler is a module of operating system, which gives the time to each process. It refers to a set of policies and mechanisms supported by Operating System that controls the order in which the work has to be done. All computer resources and processes are scheduled before use and executes. SCHEDULING TECHNIQUES / TYPES OF SCHEDULERS / LEVELS OF SCHEDULING Basically there are 3 types of scheduler which may co-exists in the complex Operating System: 1.Long-term schedule 2.Medium-term scheduler 3.Short-term scheduler Long-Term Scheduler (LTS) The job of LTS is to take a process from job queue and place it in the ready queue. It is also known as job scheduler. It executes much less frequently as short time scheduler because it has to decide which process to place in the ready queue. As it controls the degree of multiprogramming. It makes a careful selection of process, which may be a mix of I/O bound process, and CPU bound process. If all process is I/O bound then all come in suspended state. Short-Term Scheduler /CPU Scheduler (STS) The job of STS is to take a process from ready queue and allocate CPU to them. Ready queue is not necessary implemented as FIFO queue. It depends on various scheduling algorithm. The ready queue may be implemented as a FIFO queue, a priority queue, a tree or simply an unordered linked list. The short-term scheduler is also known as CPU scheduler. The short-term scheduler selects a new process for the CPU quite frequently. Medium Term Scheduler (MTS) When a process has to wait for some event to occur then Operating System switches the CPU to other process. The previous or waiting process is swapped out and the new or ready process is swapped in to the ready queue. Medium term scheduler does the process of swapping-in and swapping-out. Some processes are suspended and some processes are brought into memory. The job of swapping out and in is done by M.T.S. This is done so that the memory may be available for new processes. Q15 How to install domain controller Ans Installing a domain controller Domain provide network users and computers with the Active Directory service, which stores and replicates directory data and manages user interactions with the domain, including user logon processes, authentication, and directory searches. Every domain must contain at least one domain controller. You install a domain controller by installing Active Directory on any member or stand-alone server (except those with restrictive license agreements). When you install the first domain controller in your organization, you are creating the first domain (also called the root domain and the first forest. You can add additional domain controllers to an existing domain to provide fault tolerance, improve service availability, and balance the load of existing domain controllers. You can also install a domain controller to create a new child domain or new domain tree Create a new child domain when you want a new domain that shares a contiguous namespace with one or more domains. This means that the name of the new domain contains the full name of the parent domain. For example, sales.microsoft.com would be a child domain of microsoft.com. Create a new domain tree only when you need a domain whose Domain Name System (DNS) namespace is not related to the other domains in the forest. This Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 36 of 38 means that the name of the new domain tree’s root domain (and all of its children) does not contain the full name of the parent domain. A forest can contain one or more domain trees. Before installing a new domain controller, you will need to consider pre-NT compatible security levels and identify the DNS name of the domain. For more information, see Checklist: Creating an additional domain controller. The most commonly performed tasks when installing a domain controller are creating a new domain in a new forest, creating a new child domain in an existing domain tree, creating a new domain tree in an existing forest, and adding a domain controller to an existing domain. For information about important decisions you need to make when installing a domain controller, see Using the Active Directory Installation Wizard. To create a new domain in a new forest 1. Open the Active directory installation wizard 2. On the domain Controller Type page, click domain controller for a new domain, and then click Next. 3. On the Create New domain page, click domain in a new forest, and then click Next. 4. On the New domain Name page, type the full DNS name for the new domain, and then click Next. 5. On the NetBIOS domain Name page, verify the NetBIOS name, and then click Next. 6. On the Database and Log Folders page, type the location in which you want to install the database and log folders, or click Browse to choose a location, and then click Next. 7. On the Shared System Volume page, type the location in which you want to install the Sysvol folder, or click Browse to choose a location, and then click Next. 8. On the DNS Registration Diagnostics page, verify if an existing DNS server will be authoritative for this forest or, if necessary, choose to install and configure DNS on this server by clicking Install and configure the DNS server on this computer, and set this computer to use this DNS server as its preferred DNS server, and then click Next. 9. On the Permissions page, select one of the following: o Permissions compatible with pre-NT server operating systems o Permissions compatible only with NT or Windows Server 2003 operating systems 10. Review the Summary page, and then click Next to begin the installation. Restart the computer. Q16 User and computer accounts Ans Active Directory user accounts and computer accounts represent a physical entity such as a computer or person. User accounts can also be used as dedicated service accounts for some applications. User accounts and computer accounts (as well as groups) are also referred to as security principals. Security principals are directory objects that are automatically assigned security IDs (SIDs), which can be used to access domain resources. A user or computer account is used to: Authenticate the identity of a user or computer. A user account enables a user to log on to computers and domains with an identity that can be authenticated by the domain. For information about authentication, see Access control in Active Directory. Each user who logs on to the network should have his or her own unique user account and password. To maximize security, you should avoid multiple users sharing one account. Authorize or deny access to domain resources. Once the user has been authenticated, the user is authorized or denied access to domain resources based on the explicit permissions assigned to that user on the resource. For more information, see Security information for Active Directory. Administer other security principals. Active Directory creates a foreign security principal object in the local domain to represent each security principal from a trusted external domain. For more information about foreign security principals, see when to Create an external trust. Audit actions performed using the user or computer account. Auditing can help you monitor account security. For more information about auditing, see Auditing overview. Q17. Explain User accounts and its types The users container located in Active Directory Users and Computers displays the three built-in user accounts: Administrator, Guest, and HelpAssistant. These built-in user accounts are created automatically when you create the domain. Each built-in account has a different combination of rights and permissions. The Administrator account has the most extensive rights and permissions over the domain, while the Guest account has limited rights and permissions. The table below describes each default user account on domain controllers running Windows Server 2003. Default user account Description The Administrator account has full control of the domain and can assign user rights and Administrator account access control permissions to domain users as necessary. This account must be used Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 37 of 38 only for tasks that require administrative credentials. It is recommended that you set up this account with a strong password. The Administrator account is a default member of the Administrators, domain Admins, Enterprise Admins, Group Policy Creator Owners, and Schema Admins groups in Active Directory. The Administrator account can never be deleted or removed from the Administrators group, but it can be renamed or disabled. Because the Administrator account is known to exist on many versions of Windows, renaming or disabling this account will make it more difficult for malicious users to try and gain access to it. The Administrator account is the first account created when you set up a new domain using the Active Directory Installation Wizard. Important When the Administrator account is disabled, it can still be used to gain access to a domain controller using Safe Mode. The Guest account is used by people who do not have an actual account in the domain. A user whose account is disabled (but not deleted) can also use the Guest account. The Guest account does not require a password. Guest account You can set rights and permissions for the Guest account just like any user account. By default, the Guest account is a member of the built-in Guests group and the domain Guests global group, which allows a user to log on to a domain. The Guest account is disabled by default, and it is recommended that it stay disabled. The primary account used to establish a Remote Assistance session. This account HelpAssistant account is created automatically when you request a Remote Assistance session and has (installed with a Remote limited access to the computer. The HelpAssistant account is managed by the Assistance session) Remote Desktop Help Session Manager service and will be automatically deleted if no Remote Assistance requests are pending.. Q18. What are user profiles in Windows NT? Explain. Ans. User Profiles: A profile is a collection of settings, which are stored in a special type of registry file. The Windows NT user profiles are used to enable the user’s desktop settings and operating parameters. The user profiles specify the rights of a user for controlling certain types of changes that a user can do to his working environment. Windows NT Server operating system reads from the registry file the profile of the user and sets the desktop setting according to the settings that are stored in registry profile. There are four types of user profiles: 1. Personal Profile: It allows a user to alter his profile and save the changes for future logon sessions. The user can change his personal profile from one logon session to another. 2. Mandatory Profile: It allows a user to make changes to his profile and but does not allow the user to save these changes in his profile for future logon sessions. The administrator can update the mandatory profile. 3. Default Profile: If there is no defined profile for the user then in that case the Windows NT Server operating system makes use of a default profile for the logon workstation of the user and it is copied and saved as the personal profile of the user so that they can be used for future logon sessions. 4. Roaming Profile: It ensures that the users can use specific settings and preferences to access all the computers of a particular domain. The roaming profile is created when a user accesses multiple computers in the domain. The roaming profile creates the ntuser.dat file and loads the file on the domain computer, which is accessed by the user. The settings and preferences in the ntuser.dat file are updated when the user logs off. Q19. Write a note on configuration protocols and bindings in Windows NT? Ans. Configuration Protocols: Entering Network Setup 1. Click on the Start button, point to Settings and then click on Control Panel. The Control Panel window will appear. 2. Double click on the Network icon. The Network Setup Box window will appear. The Network Setup Box has five main panels (or tabs): When you are done making modifications in the Network Setup Box, click the OK box in the lower right-hand part of the panel. If you made any changes, you will be asked to reboot your machine in order for your changes to take effect. Restarting Your Computer for the First Time If you installed Client Service for NetWare and the NWLink IPX/SPX protocols during this setup, you will be asked to select a preferred server when you log back into your Windows NT machine. Enter the name of the NetWare Server that you log into (or NONE) and press the OK button. If you need to change the preferred server in the future, use the CSNW utility in the Control Panel. Identification Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100 SUBJECT: ‘Handling Operating System’ (BCA – 6) Page 38 of 38 Computer Name - This is name of your machine. Make sure that your computer has a unique name. If you aren't sure if the name you have given your computer is unique, contact your systems administrator. Domain Name - This is the domain your computer belongs to. If you aren't sure what domain your computer belongs to, contact your systems administrator. Services Make sure the following Network Services are installed on your computer. A list of services currently installed on your machine is located in the Network Services box. Client Service for NetWare (if access to a NetWare server is necessary) Computer Browser Microsoft TCP/IP Printing NetBIOS Interface Network Monitor Agent (only for Windows NT Servers) RPC Configuration Server SNMP Service Workstation Adding a Network Service Click the Add button. A list of Network Services will appear. Click the service you want to install and click OK. You may be prompted to insert the Windows NT Server or Workstation CD-ROM in to the CD-ROM drive. Some Network Services need to be configured in order for them to work properly. Protocols A list of protocols currently installed on your machine is located in the Network Protocols box. Make sure that ONLY NWLink IPX/SPX Compatible Transport, NWLink NetBIOS and TCP/IP Protocol are installed. The settings for each protocol is discussed below. To view and modify the setting for a particular protocol, click on it and then click the Properties button. TCP/IP Protocol 1. Click on the IP Address tab at the top of the window. Make sure the Obtain an IP address from a DHCP Server box is checked. 2. Click on the DNS tab at the top of the window. Aside from the Host Name box, which should have the name of your machine, all other boxes should be empty. 3. Click on the WINS Address tab at the top of the window. Click on the Enable LMHOSTS Lookup box. Make sure the the Primary WINS Server and Secondary WINS Server boxes are empty. 4. For NT 4.0 Servers ONLY: Click on the DHCP Relay tab at the top of the window. Make sure the Second Threshold and Maximum Hop fields are set to 4. 5. Click on the Routing tab at the top of the window. Make sure the Enable IP Forwarding Box is NOT checked. 6. Click on the OK button at the bottom of the window to return to the Network Setup window. Bindings By clicking on the Bindings tab, Windows NT will rebuild the machines Bindings database. When complete, you should see a list of Network Services. Go into each service (click on the plus sign to the left of the computer icon) and make sure that ONLY the WINS Client (TCP/IP) protocol is being used. The only exception to this is with the Client Service for NetWare binding. This has to be set to IPX/SPX. To disable a protocol, click on it and then click the Disable button. When you are done, click the Close button. Prepared By: - Vaishnoo Maa Computers, SCO 145, Chotti Baradari, Patiala. Ph. 0175-2205100, 2215100