Premium Essay

Identifying the Operating System

In:

Submitted By Steelerhelp
Words 362
Pages 2
Identifying the Operating System

The operating system that I will be identifying will be from my lab computer. It already comes installed with Windows 7 Enterprise Service Pack 1. Before it can be upgraded to Windows 8.1, the firmware and the USB would need to be updated because it is not compatible. Windows 8.1 is the latest version of Microsoft windows and has a completely new appearance from the prior versions. There are five features that will be discussed that comes with the installed service pack.

The first one will be direct access which allows you to connect to a corporate network that you work at through internet access and without having to be connected to a virtual private network (VPN). It provides increased productivity for mobile work force. Because of this, you are not required to be in the office, you could be at home or traveling somewhere and still is able to have access to your work as if you are at the desk. Even with this access, it doesn’t stop the IT Administrators from being able to update software or policy settings provided by the company.

Another feature is Federated search and enterprise search scopes which enables the user to search files through Windows explorer and be able to open it and work with the file no matter where it is located. Sharepoint portals were created to enable migration of important content to centralized content stores. The App locker provides the ability to control what software can be run which reduces risk of viruses. IT Administrators are able to create rules that works as a background even after an update has been performed.
Language packs allows support to different languages in a single windows master image which means instead of having different disks with one language, this allows all those languages to be read on one. Virtual desktop infrastructure (VDI) is an emerging model for remote

Similar Documents

Premium Essay

Identifying Operating Systems

...Identifying the Operating System Alonzo Colbert ITT Technical Institute NT1110: Computer Structure and Logic_V1.0 Identifying the Operating System Identify the operating system in your home or lab computer. The operating system that I am currently using is Windows 10 Education-Copyright 2015 Microsoft Corporation. There are several features that the Windows 10 operating system features; I will talk about the ones I use most. Personally, the Snap feature is my favorite (Windows 10 Features). I love that I am able to use simple commands to size windows next to each other quickly. This is helpful in school when I need to look at multiple screens at once. The 64-bit support is another useful feature for my school purposes (Windows 10 Features). As a student I will need to be able to access information quickly. According to the Windows website it simply describes the 64-bit system as better equipped to handle information (Windows 10 Features). Cortana feature is a close first place in my favorites (Windows 10 Features). I love the fact that I can use her like SIRI on apple products. There is so much you can do with Cortana (Windows 10 Features). Can ask her just about anything on your personal computer or online and she will find it for you. the new photo feature scheme is something i also enjoy (Windows 10 Features). It makes things so much easier to find. When it comes to my family photos. No more searching around my personal computer to find my photos (Windows 10 Features)...

Words: 635 - Pages: 3

Premium Essay

Identifying the Operating System

...Identifying the Operating System The operating system for my computer is Windows 7 Enterprise. It was installed with Service Pack 1. Some of the features included with Windows 7 are Direct access, Branch Cache, Federated Search, BitLocker and BitLocker To Go, AppLocker, Virtual desktop infrastructure (VDI) optimizations and Multilingual user interface. Here is a list I found on the Microsoft website stated below. * DirectAccess:  Give mobile users seamless access to corporate networks without a need to VPN. * BranchCache:  Decrease the time branch office users spend waiting to download files across the network. * Federated Search:  Find information in remote repositories, including SharePoint sites, with a simple user interface. * BitLocker and BitLocker To Go:  Help protect data on PCs and removable drives, with manageability to enforce encryption and backup of recovery keys. * AppLocker:  Specify what software is allowed to run on a user's PCs through centrally managed but flexible Group Policies. * Virtual desktop infrastructure (VDI) optimizations:  Improved user experience for VDI with multimon and microphone support, which have the ability to reuse virtual hard drive (VHD) images to boot a physical PC. * Multilingual user interface: Create a single OS image for deployment to users worldwide. My computer has the following for processor, ram, and system type, and disc space: * Processor: Intel® Celeron® 2957U @...

Words: 318 - Pages: 2

Premium Essay

Identifying the Operating System

...Identifying the Operating System * NT1110 Module 1 My home computer is a new Dell Inspiron 15 3000 series. It has the Windows 7 edition with a Service Pack 1. The Windows 7 edition brings a more responsive and lively feel, and the start menu is just right. With this edition, Microsoft has also recognized the need for improved desktop responsiveness, which gives the impression that the computer is responding to the user and that they are in control. Compatibility on Windows 7 is definently far better than that of Vista. And many programs that were used on Windows XP did not work immediately and required updates, but with Windows 7 almost all applications that work on Vista should still run. In this regard, Windows Vista has definently paved the way for Windows 7. Lower hardware requirements is also a plus for Windows 7 because due to the reputation that Vista gained, making the more sophisticated hardware seem rather ordinary, will run well on lower end hardware, making the transition from Windows XP less painful. Windows 7 also has an improved search tool, which now rivals Mac OS X’s spotlight to be able to find what you need quickly and easily. For example, typing a word in the start menu will display it and split it up neatly into files, folders and applications, or typing “keyboard” will bring up the keyboard options within the control panel. Taskbar options are a lot more powerful since Vista. The taskbar icons are now larger and items are grouped together...

Words: 369 - Pages: 2

Premium Essay

Identifying the Operating System

...I currently own a Dell laptop computer which currently uses Windows 8.1 for the operating system. There are a few new features to this service pack. From some of the people that I have talked to about this I have been told that there really isn’t much difference but here is what I have found. The Power and Search buttons on the Start screen are now a little bit different. “These buttons appear in the upper-right corner of the Start screen next to your account picture. You'll be able to quickly and easily shut down your PC or search for things right from Start (Some types of PCs don't have the Power button on Start. You can shut down your PC using the Power button in the Settings charm instead.)” (http://windows.microsoft.com/en-us/windows-8/whats-new). “All open and pinned apps appear in the taskbar. If you like using the desktop, you'll see both desktop apps and apps from the Windows Store in your taskbar when they're running. You can also pin any app to the taskbar so you can quickly open or switch between apps from the desktop.” (http://windows.microsoft.com/en-us/windows-8/whats-new). You can also get to the taskbar from anywhere or go to the desktop to sign in instead of the Start screen.” If you spend more time in the desktop, you can sign in (boot) directly to the desktop instead of the Start screen. And if you want to sign in to Start instead, you can change this setting at any time.” (http://windows.microsoft.com/en-us/windows-8/whats-new). One of the other features...

Words: 656 - Pages: 3

Premium Essay

Identifying Diffferent Operating Systems

...Identifying the operating system In this lab I will be discussing how I identified my home PC’s operating system. I will provide different features of my operating system, provide the processor speed, amount of RAM and, disk space on my PC. I will finally determine if I can upgrade my software or not. Now I will identify the processor and speed of my operating system. I currently have a Intel Pentium CPU G645, the speed of the processor runs at 290 GHz. I am currently running Windows 10 home edition which is the latest version, the operating system runs at 64 bits. Next I will provide the amount of RAM in my operating PC. The amount of internal storage that I have is not much its only 4 GB, but I have a 2 TB external hard drive that I run on both my XBOX one and my PC. I don’t believe I can upgrade my operating system anymore due to the fact that I recently did the windows 10 update, I previously had windows 8. Windows 10 is significantly different and has a ton of new features which I will get into a few of them right now. The source where I got the information on the five features that I will discuss is www.windows.microsoft.com. First of the five features that I am discussing is that windows 10 came out with there own browser called Microsoft edge which is far more superior the previous web browser internet explorer. The windows 10 has improved their photo images and made it easier to navigate photo folders and sub folders easier from your hard drive and external...

Words: 503 - Pages: 3

Free Essay

Spur

...Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state vs. magnetic | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Optical drives | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * CD / DVD / RW / Blu-Ray | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Removable storage | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Tape drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Solid state (e.g. thumb drive, flash, SD cards, USB) | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * External CD-RW and hard drive | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices | | * Hot swappable devices and non-hot swappable devices | Personal Computer Components, Storage Devices Installing and Configuring System Components, Install and Configure Storage Devices...

Words: 6966 - Pages: 28

Free Essay

Application Activity 1

...Application Activity 1: Interview someone at the company of your choice who handles network administration or a help desk professional who handles the administration of any of the operating systems identified in this course. It is important to select an individual that has a functional knowledge of identifying types of cyber-attacks, designing and implementing measures to respond to such an event, and understands different forms of malicious code. While an in-person interview is preferred, you can also conduct this interview by phone or e-mail. During your interview be sure to inquire as to the individual’s job title and daily responsibilities. Also, be sure to discuss the problems that exist with monitoring network activity, to include access controls, cryptography, and identifying malicious code. In addition, note the features of operating systems that typically benefit organizations in terms of security benefits. Lastly, inquire as to the career potential that exists in network security and related fields. Feel free to ask many additional questions, as these questions are given to ensure key areas are identified. Once you have concluded your interview, gather your data and draft a report detailing the information gained as a result of the interview. Your report should be a minimum of 5 pages excluding the title page and references. There must be a minimum of 5 peer-reviewed sources included. • Interviewee’s job title and daily responsibilities are included. • What problems...

Words: 370 - Pages: 2

Premium Essay

Vulnerability Scanniing

...Vulnerability scanning Lab #2 1. Zenmap is a tool used for scanning remote computers. Zenmap can retrieve the following information from the target machine: Type of operating system List of open ports Mac Address A hacker plans to carry out an attack on a company network. In order to carry out the attack, the attacker will require some basic information about the target machine on the company network. Zenmap could be used to probe the network and target machine and retrieve basic information needed to stage an attack. 2. Nessus 3. Before the reconnaissance step it is important to formulate a plan. You would also require some information such as host IP address in order to probe the target machine using tools like Nessus. 4. CVE listing is a publicly available and free list of standardized identifiers for common computer vulnerabilities. MITRE is a not-for-profit organization responsible for hosting CVE. MITRE operates research and development centers sponsored by the federal government. 5. Zenmap is capable of identifying operating systems that are present on IP server and workstation. This can be achieved by using the Intense Scan option. 6. Knowing that the target host is running Windows XP workstation gives better sense of what kind of vulnerabilities to expect. You can focus the scan on Windows using some plugins in Nessus and concentrate on services that run on the windows workstation. You can also look out for unpatched and outdated...

Words: 493 - Pages: 2

Premium Essay

Alternative Costing Method

...Costing. Activity Based Costing improves a costing system by identifying individual activities as fundamental cost objects. “The development of an ABC costing methodology could typically be analyzed with focus on the following phases: 1. The determination of the significant operational activities. 2. The identification and collection of costs specific to each of these activities. 3. The identification of the cost drivers for each of these activities. 4. The determination of the activity unit costs. 5. The allocation of the costs to the cost objects based on the activity consumption (Buys, Pieter, Green, Kevin)”. It should be understood that an ABC system is not intended to replace the general ledger, but to be viewed as a tool to translate the general ledger. The Activity Based Costing system will identify activities (things the company does) of the value chain, calculate the individual costs of activities, and assign costs to cost objects. The activity-based technique will reach its full potential when it has expanded from Activity Based Costing to Activity Based Management. When looking to adopt the Activity Based Costing system, The Hampshire Company will need identify the activities the company performs. Identifying activities can be difficult and they will need to evaluate the tasks performed and decide which tasks will be classified as separate activities and which will be combined. After identifying the activities, the team will develop a flowchart of all...

Words: 401 - Pages: 2

Premium Essay

Paper

...WILL ANSWER FIVE QUESTIONS. EACH QUESTION SHOULD BE ANSWERED THOROUGHLY TO SHOW YOUR UNDERSTANDING IN DETAIL. CLEARLY LABLE THE QUESTIONS YOU ARE ANSWERING. Question #1 (Ch.1) Your friend Karen, knowing that you are a diligent student studying in the MPAc program, has asked that you enlighten her about Sarbanes-Oxley. a) Describe to Karen the key points of the section 404 of the Sarbanes-Oxley Act. b) Section 404 requires management to make a statement identifying the control framework used to conduct their assessment of internal controls. Describe to Karen the options in selecting a control framework. c) Karen was wondering, if the auditors give a qualified opinion on management’s assessment of internal controls over the financial reporting system, does it mean that the auditor must also give a qualified opinion on the financial statements? Explain how it works. d) In this age of high technology and computer based information systems, Karen was wondering why accountants are concerned about physical (human) controls. Explain. e) Internal control in a computerized environment can be divided into two broad categories. Explain to Karen what they are. Question #2 (Ch.2) You are being interviewed for a job as an internal auditor, and it is the ideal job now that you’ve graduated. The interviewer has asked that you answer the following during the interview process: a) Explain the role of a SAS...

Words: 820 - Pages: 4

Free Essay

English

... procedures  • Listening effectively  • Interviewing; drawing out others' views; probing for information  • Demonstrating skills in the use of language, grammar and punctuation  • Expressing ideas in written form; editing; revising; preparing concise and  logically written materials  • Organizing and presenting ideas effectively for both formal and spontaneous  speeches  • Participating in group discussions  Organizational  • Identifying tasks to be accomplished  • Pulling elements together in an orderly, functional, and structured whole  • Facilitating discussions on program planning processes  • Facilitating brainstorming activities  • Giving constructive feedback on others' work  • Prioritizing tasks; getting most important work done first  Computer  • Identifying and using appropriate software  • Identifying, analyzing, and solving hardware or technical difficulties  • Teaching others to use computer programs  • Understanding different application programs  • Using HTML and other web design tools  • Understanding and using different operating systems like UNIX and Windows  Interpersonal  • Interacting effectively with peers, superiors, and assistants  • Understanding the feelings of others  • Analyzing behavior of self and others in group situations  • Demonstrating effective social behavior in a variety of settings and under  different circumstances  • Maintaining group...

Words: 529 - Pages: 3

Premium Essay

Operating System

...Identifying the Operating System RAM (random access memory) is a temporary holding area for data, application program instructions, and the operating system. The RAM information can be found in the control panel. RAM holds the data on the computer until the user process that data so it can be stored permanently on a hard disk, CD or flash drive. A hard disk drive is a storage device and can retrieve digital information. Optical disk drivers contains a spindle that rotates the disc over a laser lens. An optical disk drive is a disk drive that use a laser light so it can read or write data on an optical disk. Optical disk are CD, DVD, and Blu-ray the data on any optical disk can be stored into the RAM. My home laptop use Windows 7 home premium I will view the RAM to see if it is able to be upgraded to Windows 8.Sevice pack 1. The rating: 3.7 Windows experience index. Processor: AMD E- 450 with Radeon™ HD Graphics 1.65GHz. Installed memory (RAM): 4.00GB (3.60GB usable) system type: 64-bit operating system. Pen and touch: No pen or touch input is available for this display. Hard disk drive space 128GB. The requirements for Window 8 are process: 1 gigahertz (GHz) or faster with support of PAE, and SSE2.RAM:1 gigabyte (GB) (32bit) or 2GB (64-bit). Hard disk space: 16GB (32-bit) or 20GB (64bit) Graphics card: Microsoft X9 graphics device with WDDM driver. My home laptop meet all the requirement to be upgraded to Windows 8. The requirements for Window 7 are the same as Windows 8. My...

Words: 534 - Pages: 3

Free Essay

Operarting Systems

...Operating Systems Section A Part one 1. a. Heap 2. c. An execution of program 3. a. without a break irrespective of size 4. C. Page replacement 5. b. To execute a procedure in another compute in the distributed system 6. b. High performance by serving several processes simultaneously 7. b. To execute a procedure in another compute in the distributed system 8. c. Multi-site transaction 9. c. Both a & b 10. d. 1 or more CPU True and False 1. false 2. True 3. True 4. True 5. True 6. True 7. False 8. False 9. False 10. True Section B Answer 1) It is a secure means to recognize a user when accessing government services online. The user remains anonymous, and the authentication process just confirms that the credential is valid and is in the hands of the owner of the credential. Credential authentication does not reveal or confirm identity to the government website. It receives only a message confirming that your credential (username/password) was successfully validated by your bank or by the government. Answer 2) File system a. Directory system for convenient grouping of files b. Protection of files against illegal access c. File sharing semantics d. Reliable storage of files IOCS a. Effecient operation of I/O devices b. Effecient access to records in file c. Invokes facilities through kernel d. Perform I/O operations without knowing the...

Words: 2202 - Pages: 9

Premium Essay

Riordan Manufacturing

...people with projected earnings of $46 billion operating in Albany, Georgia, Pontiac Michigan, Hangzhou China, and their headquarters in San Jose, California. With their mission to remain the industry leader in identifying customer trends, Riordan Manufacturing is looking at ways to maximize its operating efficiency within the company by designing and implementing a new system in accordance with System development Life Cycle (SDLC). The Chief Operating Officer (COO) Hugh McCauley sent a memorandum to the Human Resources Integration Product Manager approving a project proposal for Human Resource department. This project will integrate state-of-the-art technology with Human Resource department to support Human Resources functions. A review and system analysis of the Human Resources system is as follows. System Analysis When a company such as Riordan request for the addition of a newly integrated system, a system analysis will aid one to answer some of the most basic questions such as how this new system will work, who would use it, and how the company current system handles the work are some of the important aspects to consider. Integrating technological tools into the Human Resources, systems will enable Riordan to perform basic functions such as keeping track of employee information such as resumes, performance reviews, polices, and financial data. The main objective of system analysis and design is to improve organizational systems, typically through applying software that...

Words: 1216 - Pages: 5

Premium Essay

Layered Security in Plant Control Environments

...ABSTRACT Process control vendors are migrating their plant control technologies to more open network and operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. Migrating plant controls to open network and operating environments exposes all layers of the computing environment to unauthorized access. Layered security can be used to enhance the level of security for any computing environment. Layered security incorporates multiple security technologies in each computing layer to provide resistance to unauthorized intrusion, while reducing the risk of failure from a single technology. Layered security requires acceptance of a model, development of an access control plan, compartmentalization of the network, and implementation of core security products that address examination, detection, prevention, and encryption. Layered security is considered a “best practice” in any computing environment, and should be widely used in critical control environments. INTRODUCTION Plant control environments have traditionally been built on proprietary technology. This proprietary technology provided a reasonable level of security from unauthorized access due to its “closed” nature, and lack of connection to business networks and the Internet. However, vendors are beginning to migrate their plant control technology to more open network and operating environments such as Unix, Linux, Windows, Ethernet, and the Internet Protocol. In some instances, plant control...

Words: 2711 - Pages: 11