Free Essay

Boot and Startup Process of Windows 7

In:

Submitted By robbycollazo2
Words 440
Pages 2
Boot and Startup Process of Windows 7
Arthurs Note: This Paper is being submitted for N127/ CTS1300C Microsoft Windows Workstation Class on October 8, 2012.

Boot and Startup Process of Windows 7
Define and illustrate the boot and startup process of a Windows operating system. It is useful to understand what happens behind the scenes when you switch on your computer from a cold idle machine to an operable and functional system. There are essentially two forms of booting - the soft boot and the hard boot. The cold boot or hard boot involves powering the computer up from an initial zero power supply. A warm boot on the other hand takes place when a software application or operating system triggers the computer to perform a reboot. A successful boot is dependent on 3 conditions - the hardware, BIOS and operating system files to function without errors. When an error occurs, you will be notified by error messages, beeping sounds or in the worst scenario, a blank screen.
Explain the purpose and functionality of Boot Configuration Data Store and Editor. Include in the explanation how to implement BCDEdit. The Bcdedit.exe command-line tool modifies the boot configuration data store. The boot configuration data store contains boot configuration parameters and controls how the operating system is booted. These parameters were previously in the Boot.ini file (in BIOS-based operating systems) or in the nonvolatile RAM entries (in Extensible Firmware Interface-based operating systems). You can use Bcdedit.exe to add, delete, edit, and append entries in the boot configuration data store.
Detail and list 5 types of information the BCD registry file can contain and the various ways the BCD registry file can be modified. BCD was created to provide an improved mechanism for describing boot configuration data. With the development of new firmware models (for example, the Extensible Firmware Interface (EFI)), an extensible and interoperable interface was required to abstract the underlying firmware. This new design provides the foundation for a variety of new features in Windows Vista (for example, the Startup Repair tool and Multi-User Install shortcuts). Depending on what you want to change, you can use the following tools to modify BCD. Start up and Recovery, System Configuration utility (Msconfig.exe), BCD Windows Management Instrumentation provider, BCDEdit.exe and Non-Microsoft tools such as third party software.
Describe and detail two methods that can be implemented to improve the Windows 7 startup performance. Press" Win+R" to Run "Msconfig", select "Startup" tab, uncheck unwanted items. Also you can make modifications in the bios to make sure that your hard disk is pick to boot from first.

Similar Documents

Premium Essay

Collaborative Troubleshooting Operating Systems

...started in a new technical support role within the IT department of a major manufacturing organization. Your first support call is from a client who is using Windows ME® and has encountered stability problems. Discuss the process you would undertake to identify his or her problem and the operating system’s tools that you would use to do so. In order to determine the cause of the instability you may need to probe the client and ask questions to help pinpoint the problem. Did the user receive any error messages? Is the computer just generally running slowly? Did the client recently install additional software or hardware? If the client is unable to help answer questions then a process of troubleshooting steps may need to be taken to solve the instability issue. Start with the booting up the computer and checking for any error messages during Power-On Self-Test or POST and that maybe BIOS related. Sometimes BIOS can let you know that a piece of hardware isn’t being detected properly. You may need to enable a device or setting which can be fixed in the BIOS setup. Check your BIOS settings and see that there are no errors in the configuration. A bad configuration can cause a halt the loading process of the OS. Another type of configuration that may need to be checked if Windows fails to load correctly is the Registry. Windows ME has a built in scanreg utility which automatically makes a backup of the registry every time it is booted successfully. You can try to...

Words: 2433 - Pages: 10

Free Essay

Knowledge Assemsment Text Book

...Knowledge Assessment Matching 1. Remote Desktop E. Based on the former Terminal Services 2. System image backup J. Saves data to a VHD file 3. BranchCache A. Conserves WAN bandwidth 4. Distributed cache mode B. Files cached on each client 5. Volume shadow copies H. Previous versions 6. Incremental backup D. Files changed since the last backup job 7. Windows RE I. Accessible from a Window 7 installation disk 8. Hosted cache mode C. Files cached on a central server 9. Windows Remote Management G. Executes PowerShell commands on remote computers 10. System restore point F. Configuration settings and registry information Multiple Choice 1. Which of the following service priority guidelines are not accurate? D. Departmental issues should be rated according to the function of the department. A problem with a computer belonging to a department that is critical to the organization, such as order entry or a customer service call center, should take precedence over a problem with a computer belonging to a department that can better tolerate a period of down time, such as research and development. 2. Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. B, D, C, A. B: Establishing the symptoms is the first step in troubleshooting any problem to determine exactly what is going wrong. D: Select the most probable cause. Once...

Words: 746 - Pages: 3

Premium Essay

Client Server

...previous versions of files. Volume Shadow Copies 6) are files changed since the last backup job Incremental Backup 7) is accessible from a Windows 7 instllation disk Windows RE 8) files cached on a central server Hosted Cache Mode 9) executes Power Shell commands on remote computers Windows Remote Management 10)includes configuration settings and registry information System Restore Point 1) What service priority guideline is NOT accurate? Rate issues according to how the issues affect senior management. 2) Place these troubleshooting steps in the correct order, using the procedure described in this lesson as your guide. Establish Symptoms, Most probable cause, Test results, Document Solution 3) Which Windows 7 tool does NOT aid in the network troubleshooting process? User account Control Panel 4) Which Windows 7 tool does NOT aid in the hardware troubleshooting process? Nslookup.exe 5) What operating systems cannot use Branch Cache? (choose all that apply) Windows Vista and Win Serv 2008 6) When you load Win RE from the Windows 7 installation DVD, the system provides you with a choice of recovery tools; what tool is NOT included? Win Easy Transfer 7) Place the following steps of the Windows 7 startup process in their proper order. Post, Initial Startup, Boot Manager, Boot Loader 8) Which Windows XP startup component is no longer needed in Windows 7? Ntdetect.com 9) Branch Cache is a client/server application that supports which of the following two operational...

Words: 324 - Pages: 2

Free Essay

Bitlocker

...73 out of 98 rated this helpful - Rate this topic Applies To: Windows Server 2008, Windows Server 2008 R2, Windows Vista BitLocker Drive Encryption is a data protection feature available Windows Server 2008 R2 and in some editions of Windows 7. Having BitLocker integrated with the operating system addresses the threats of data theft or exposure from lost, stolen, or inappropriately decommissioned computers. Data on a lost or stolen computer is vulnerable to unauthorized access, either by running a software-attack tool against it or by transferring the computer's hard disk to a different computer. BitLocker helps mitigate unauthorized data access by enhancing file and system protections. BitLocker also helps render data inaccessible when BitLocker-protected computers are decommissioned or recycled. BitLocker provides the most protection when used with a Trusted Platform Module (TPM) version 1.2. The TPM is a hardware component installed in many newer computers by the computer manufacturers. It works with BitLocker to help protect user data and to ensure that a computer has not been tampered with while the system was offline. On computers that do not have a TPM version 1.2, you can still use BitLocker to encrypt the Windows operating system drive. However, this implementation will require the user to insert a USB startup key to start the computer or resume from hibernation, and it does not provide the pre-startup system integrity verification offered by BitLocker with a TPM...

Words: 1463 - Pages: 6

Premium Essay

A+ Final

...problem increases your value in the eyes of your coworkers and boss.  Back injury ____, caused by lifting heavy objects, is one of the most common injuries that happen at work.  Least As you solve computer problems, always keep in mind that you don't want to make things worse, so you should use the ____ invasive solution.  False - Copyright laws When someone purchases software from a software vendor that person legally owns the software.  STOP If a problem happens in the kernel mode of Windows, a ____ or blue screen error occurs.  .docx Which file extension indicates a file created by a word processing program in the Office 2007 /2010 suite?  Service A ____ is a program that runs in the background to support or serve Windows or an application.  System Tray The ____ is usually on the right side of the taskbar and displays open services.  Right-click the file and select Properties How do you change file attributes from the Windows Explorer?  Providing a user interface, and Managing hardware The four basic functions of an operating system include managing files, running...

Words: 1019 - Pages: 5

Free Essay

Nt1230 Chapter 9,10,11

...Chapter 9, 10,11 NT1230 Chapter 9, 10, and 11. Chapter 9 Authentication: The process of verifying that the identity of the person operating the computer matches that of the user account the person is using to gain access. Authorization; The process of granting an authorized user a specific degree of access. Active Directory: Permissions are user based. Users Rights: are specific O.S. Tasks, such as shut down or allow log in through terminal services. Local and domain users: They are two completely separate user account systems, which user account system windows uses depends on whether it is a member of a workgroup or an Active directory domain Home Group: is a simplified network paradigm that enables users connected to a home network to share content with permissions. Work Group: is a collection of computers that are all peers. Peer Network: is one in which every computer can function as both server by sharing with other computers, and client by accessing shared resources on other computers. Domain: is a collection of computers that utilize a central directory service for authentication and authorization. Domain controller: A Windows server with AD/DS directly service installed with domain in users administrator’s only to have to create one user account for each person. Workgroup Users: require many different account for one person. Local Groups: can only use local groups Only local users from the same computer can be members of a local group....

Words: 593 - Pages: 3

Premium Essay

Windows Operating System

...James Windows Operating System Exercise 3.1 1. Summarize the four phases of the Windows boot process in your own words. 2. Over the years, Microsoft has consistently updated the Windows operating system with new versions. Compare and contrast the features of Windows 7 and Windows Vista. 3. The Windows operating system has specific requirements that must be met in order to install it on a PC or mobile device. Which three most important hardware devices must be considered before you install Windows 8, 7, Vista, or XP on a computer? Explain why these three devices are important in general. 4. Mobile computing is the way of the future and so are mobile operating systems. Describe the features and benefits of the two major mobile operating systems, Android and Apple iOS. 1. The first phase would be to power up the computer by pressing the power button, doing so the power button creates an electrical impulse that instructs the motherboard to power on the power supply to begin the computers boot up sequence. The second phase after your initial startup power sequence is the BIOS activates and runs the power-on self-test (POST) that checks the hardware of the computer such as the CPU, RAM, video interface, hard drives, USB interfaces, and other integrated ports and interfaces, making sure everything is working properly, after that the BIOS displays an option for you to press if you choose to enter into the BIOS settings. The third phase of the computer boot up process...

Words: 1232 - Pages: 5

Premium Essay

Opertaing System

...What is an operating system? An operating system (sometimes abbreviated as "OS") is the program that, after being initially loaded into the computer by a boot program, manages all the other programs in a computer. The other programs are called applications or application programs. The application programs make use of the operating system by making requests for services through a defined application program interface (API). In addition, users can interact directly with the operating system through a user interface such as a command language or a graphical user interface (GUI ). An operating system performs these services for applications: In a multitasking operating system where multiple programs can be running at the same time, the operating system determines which applications should run in what order and how much time should be allowed for each application before giving another application a turn. It manages the sharing of internal memory among multiple applications. It handles input and output to and from attached hardware devices, such as hard disks, printers, and dial-up ports. It sends messages to each application or interactive user (or to a system operator) about the status of operation and any errors that may have occurred. It can offload the management of what are called batch jobs (for example, printing) so that the initiating application is freed from this work. On computers that can provide parallel processing, an operating system can manage how...

Words: 2126 - Pages: 9

Premium Essay

The Right to Die

...answers the question. ____B 1. Upgrading to a better edition of Vista can easily be accomplished by using the ____ feature. a. | Windows Anywhere Upgrade | c. | Windows Anyplace Upgrade | b. | Windows Anytime Upgrade | d. | Windows Automatic Upgrade | ____C 2. Use ____ to find out which devices are installed in your XP system. a. | Computer Manager | c. | Device Manager | b. | User Manager | d. | System Manager | ____C 3. A(n) ____ installation is performed by storing the answers to installation questions in a text file or script that Windows calls an answer file. a. | scripted | c. | unattended | b. | attended | d. | replacement | ____D 4. The Windows utility ____ is used to remove configuration settings, such as the computer name that uniquely identifies the PC. a. | msconfig.exe | c. | w32prep.exe | b. | msprep.exe | d. | sysprep.exe | ____C 5. A ____ computer is software that simulates the hardware of a physical computer. a. | real | c. | virtual | b. | logical | d. | functional | ____D 6. To convert a FAT32 volume to an NTFS volume, first back up all important data on the drive and then use this command at a command prompt: ____, where D: is the drive to be converted. a. | convntfs D: | c. | convfs D: /FS:NTFS | b. | convert D: /FS:NTFS /OFS:FAT | d. | convert D: /FS:NTFS | ____D 7. To protect a system against malicious attack, you need to verify that ____ software is configured to scan the system regularly and that...

Words: 1091 - Pages: 5

Premium Essay

Nt1230 Final

...1. Which is an object that is not listed in the library that is included with Windows 7? Movies 2. Designed to replace VB Script for scripting and performing actions at the command line? PowerShell 3. Windows 7 edition that can be added to an Active Directory domain? Windows 7 Professional 4. Replaced the MS-DOS boot disks for fixing and troubleshooting a wide range of boot problems on a Windows Vista or 7 system. Windows PE 5. Series of folders associated with a specific user that contains personal documents, user-specific registry settings, Internet favorites, and other personalized information. User profile 6. What program do you use to determine if your machine can be upgraded to Windows 7? Upgrade Advisor 7. What is the default partition style used in Windows 7? MBR 8. Maximum number of primary partitions that MBR supports. 4 9. What type of volume supports is based on RAID-0? Striped volume 10. The preferred file system used in Windows 7? NTFS 11. Which layer of the OSI model covers the cabling and electrical signaling? Physical 12. Which layer of the OSI model is IPv4 Addressing included? Network 13. What is used to specify which bits of an IPv4 address are used for the network identifier and which bits are used for the host identifier? Subnet mask 14. What address is assigned to a computer that fails to locate a DHCP server? APIPA 15. The process of verifying the identity of the person operating the computer? Authentication 16. Enables users to perform specific...

Words: 842 - Pages: 4

Premium Essay

Networking Final

...1.Which of the following is not a library that is included w/ Win 7? Movies 2.In Win 7, what is designed to replace VB Script for scripting & performing actions at the command line? PowerShell 3.Which of the following editions of Win 7 can be added to an Active Domain Directory domain? Professional 4.What replaced the MS-DOS boot disks for fixing & troubleshooting a wide range of boot problems on a Win Visa or 7 system? Windows PE 5.A User Profile is a series of folders associated w/ a specific user that contains personal documents, user-specific registry settings, Internet favorites, & other personalized info. 6.What program do you use to determine if your machine can be upgraded to Win 7? Upgrade Advisor 7.What is the default partition style used in Windows 7? MBR 8.What is the maximum number of primary partitions that MBR supports? 4 9.What type of volume support is based on RAID0? Striped Volume 10.Which is the preferred file system used in Win 7? NTFS 11.Which layer of the OSI model covers the cabling & electrical signaling? Physical 12.Which layer of the OSI model is IPv4 addressing included? Network 13.What is used to specify which bits of an IPv4 address are used for the network identifier & which bits are used for the host identifier? Subnet Mask 14.What address is assigned to a computer that fails to locate a DHCP server? APIPA 15.Which of the following is the process of verifying the identity of the person operating the computer? Authentication...

Words: 904 - Pages: 4

Premium Essay

Operating Systems

...pre-installation tasks, install and upgrade widows 2000, window XP, and window Vista, troubleshoot installation problems, indentify and post-installation taks, structures created during the installation process, indentify certain common input/output devices on a PC, and describe how certain specialty input/output devices work on a PC. Hardware requirements, making you’re your computer meets the recommended minimums for CPU, RAM, free hard disk space, video adapter, display, and other components. Check the windows logo’d Product list or the windows compatibility center at the Microsoft web site to verify that the windows version you’re installing supports the hardware and application software your will run. A clean OS installation takes place on a new hard drive or one that has been reformatted and repartitioned. You must reinstall all applications and reconfigure user preferences. In an upgrade installation, the new OS is installed in the directory where the old OS retains the hardware and software settings of the old OS, including user preferences. Before you upgrade, backup any data that the user has saved on the local hard drive. You can install window 2000 with floppy diskettes or a CD-ROM. Window XP does not create a set of setup boot disk and does not use a floppy disk by default you’re your install from the CD, you must add an optical drive to your PC’s boot sequence and boot directly to the windows 2000 or windows XP CD-ROM. During installation, you will be prompted for...

Words: 1028 - Pages: 5

Free Essay

How to Build a Box

...What is the purpose of the command interpreter? Why is it usually separate from the kernel? Answer: It reads commands from the user or from a file of commands and executes them, usually by turning them into one or more system calls. It is usually not part of the kernel since the command interpreter is subject to changes. 2.6 What system calls have to be executed by a command interpreter or shell in order to start a new process? Answer: In Unix systems, a fork system call followed by an exec system call need to be performed to start a new process. The fork call clones the currently executing process, while the exec call overlays a new process based on a different executable over the calling process. 2.7 What is the purpose of system programs? Answer: System programs can be thought of as bundles of useful system calls. They provide basic functionality to users so that users do not need to write their own programs to solve common problems. 2.8 What is the main advantage of the layered approach to system design? What are the disadvantages of using the layered approach? Answer: As in all cases of modular design, designing an operating system in a modular way has several advantages. The system is easier to debug and modify because changes affect only limited sections...

Words: 1012 - Pages: 5

Premium Essay

Windows8

...WINDOWS 8 Windows 8  is the current release of the Windows Operating System produced by Microsoft for use on personal computers, including home and business desktops, laptops, tablets, and home theater PCs and is now the trending topic now in the internet world. Recently Microsoft releases Windows 8 .  Windows 8 having more features to compare with windows 7. Particularly  in Windows 8 your entire PC is cloud-connected. You’ll have new Mail, Calendar,Microsoft SkyDrive, Photos, People, and Messaging apps that are connected to the services you use, just by adding them to your Microsoft account. Windows 8 introduces significant changes to the operating system's platform, primarily focused towards improving its user experience on mobile devices such as tablets to rival other mobile operating systems (such as Android and iOS),taking advantage of new and emerging technologies (such as USB 3.0, UEFIfirmware, near field communications, cloud computing, and the low-power ARM architecture), new security features (such as malware filtering, built-in antivirus software, and support for secure boot, a controversial UEFI feature which requires operating systems to be digitally signed to prevent malware from infecting the boot process), along with other changes and performance improvements. Windows 8 also introduces a new shell and user interface based on Microsoft's"Metro" design language, featuring a new Start screen with a grid of dynamically updating tiles to represent applications...

Words: 931 - Pages: 4

Free Essay

Comp-Tia a+ Testing 801 and 802

...modem/network card combo. 3.5 inch floppy drive Size of all modern floppy disk drives; format was introduced in 1986. 2.1 speaker system Speaker setup consisting of 2 stereo speakers combined with a subwoofer. 34 pin ribbon cable Type of cable used by floppy disk drives. 3-D graphics Video technology that attempts to create images with the same depth and texture as objects seen int he real world. 40 pin ribbon cable PATA cable used to attach EIDE devices (such as hard drives) ATAPI devices (such as optical drives) to a system 5.1 speaker system Speaker setup sonsisting of 4 satellite speakers plus a center speaker and subwoofer. 64 bit processing Atype of processing that can run a compatable 64 bit operating system, such as Windows 7, and 64 bit applicatins. 64 bit PCs have a 64 bit wide address bus enabling them to use more than 4GB of RAM. 8.3 naming system File naming convention that specified a maximum of 8 characters for a file name, followed by a 3 character file extension. Has been replaced by LFN (long filename) support. 80 wire ribbon cable PATA cable used to attach fast EIDE devices (such as ATA/100 hard drives) or ATAPI devices (such as optical drives) to a system. 802.11a Wireless networking standard that...

Words: 3658 - Pages: 15