Free Essay

It282 Final Project

In:

Submitted By htufail
Words 4089
Pages 17
IT 282 Final Assignment

Introduction
During this training guide, you will see important information provided regarding computer systems and all of the various operation systems extensively used in Datamax. The different segments in this manual will provide: specifics of the Windows operating system, (with more methods for setting up,) maintenance performance and help with troubleshooting situations. Alternate subjects which are in the manual are networking, security of operating systems and data regarding history or other, older operating systems. Information about operating systems entails information which describes the parts, and, the operations in the various operating systems. This part also includes useful information about many different versions of Windows 7. The installation part describes Windows 7 installation procedures. The different ways of supporting this operating systems is included, and the information on how installations might be executed, if required. This guide also includes any extra info on the setting up and maintaining an OS. You will see a main concentration on the significance of networking and security while using an operating system. This part will involve particular problems for example security measures and the essential measures required to protect an operating system from probable risks or viruses. Computer systems are widely used to link to the net. You will see Network information supplied on the variations between the two types of links. There will also be measures provided which will describe how to link a workstation to the net and how your computer will be protected, eventually, from possible network risks. Finally, a part will provide specifics of “legacy” or older operating systems, and, how to support these system types correctly. Information is also provided that regards several possible problems and older operating systems.

Overview of Operating Systems
Entails important information regarding different operating systems used here at Datamax.

Components and functions of operating systems
The shell (Andrews) is a part of the Microsoft Windows graphical user interface. Control Panel allows people to see and adjust basic system settings and controls through applets for example; putting hardware, setting up and eliminating software, controls user accounts and changes several accessibility alternatives. Additional applets can always be around by means of third party software. The Control Panel is a special part of the Microsoft Windows operating system since its 1st release with several of the present applets added to later versions. Starting with Windows 95, the Control Panel is used like a special folder, even though the folder doesn't physically exist. The alternative entails techniques to various applets for example Add or Remove, (Install/Uninstall), Applications and Internet Options.

The kernel (Andrews) is the core part of nearly all computer operating systems; it's a connection between programs and the original data processing finished at hardware stage. The kernel's main duties include handling the system's resources and interaction between hardware and software parts. Generally, like a basic part for an operating system, a kernel might offer the lowest-level abstraction layer for the resources which application software should manage so as to fully execute its function.

The Device Manager (Andrews) is called the Control Panel applet in Microsoft Windows operating systems. It lets people to observe and manage the hardware together with the computer system. When a place of hardware isn't functioning correctly, the defective hardware is pointed out for the user’s consideration, so that they might know precisely where the problem lies. The set of hardware might be arranged by different criteria. The main work of the device manager is to help the user in finding any problems or may also be a helpful resource while troubleshooting.

The Windows Registry (Andrews) is actually an ordered database which holds configuration settings and, alternatives on Microsoft Windows operating systems. It requires different settings for low-level operating system parts and the programs operating on the platform: the kernel, device drivers, services, SAM, user interface and third party programs all use the Registry. The registry also provides a method to access counters for checking system performance.

Versions of Windows 7

Windows 7 Starter
This is the base version of Windows 7 and has limitations on what can be performed on it. It is not very user adjustable and only comes in a 32-bit version. This version is common in OEM environments
Windows 7 Home Basic
This version of windows 7 has Aero as part of itself unlike with Windows 7 Starter. It is also a restricted version of Windows 7 but has more to offer then the started edition.
Windows 7 Home Premium
This version of Windows 7 is featured to a full working OS for users at home and offers extras like windows media center, full Windows Aero support, and allows mouse gestures using multi touch mode.
Windows 7 Professional
This is the first version available for user that need to advanced use out of their operating system. Windows 7 Professional allows to bind their devices to a domain, if the machine is being used in a small business environment. This version also allows users to use Windows XP mode.
Windows 7 Enterprise
The version of Windows 7 is used for enterprise segments. Microsoft sell this version of windows in bulk or high volume. Companies that receive this version of windows 7 have a software assurance contract with Microsoft.
Windows 7 Ultimate
Windows 7 Ultimate is the version of Windows 7 that offers all the features that the previously stated version of Windows 7 have. It offers multilingual support and other features BitLocker which encrypts your drive so that your data is safe.

Installation of Windows Operating System
Procedures to install Windows
When a person is operating the Windows Setup application, they are needed to offer important data on the way to add and arrange the operating system. Very careful preparation can verify your set up of Windows to be more effective by assisting a person to avoid probable issues during set up. A clear knowledge of the configuration options will also help in making sure one has correctly designed their system. You might set up Windows by means of many different techniques. All are valid and good but will clearly rely on an individual’s particular requirements and restrictions. Some software might be added by just copying it to a computer system and after that choosing it without additional activities, for example set up procedures, required. A few applications, however, might be provided in a form inappropriate for fast set up and require a step-by-step set up process. A few installations might require people to; unpack provided files which are in a shrunken type and copy them to a proper spot, alter the software to fit the hardware and arrange the user's preferences, provide information regarding the program to the operating system, and so on. The original installer can check for system viability and over-all mass storage space. Some software was created to be added just by copying the files to a selected spot and, then, there aren't any set up procedures. Long ago, this was a normal practice for several different applications which were operating by way of MS-DOS, Mac OS, AtariTOS and AmigaOS. Previous versions of these operating systems are even now usual and, standard in Mac OS X programs and are used in different Windows programs. Versions of some operating systems, that don't need set up, do exist and can be operated straight from a bootable CD, DVD or USB drive without having any type of impact on other operating systems set up but not operating on the system.

Methods of supporting operating systems Assist for file systems differ between latest operating systems, though there are lots of file systems that involve support and drivers for. Operating systems generally differ onfile system support, and, the disk formats which they are installed on. Microsoft
Windows presently covers NTFS(New Technology File System) and FAT(File Allocation Table) file systems, (incorporating FAT16 and FAT32,) together with network file systems which are shared with other computer systems and the ISO 9660 and UDF file systems which are originally used for CDs, DVDs, and optical discs such as Blu-ray. Every file system is generally restricted in use, in Windows, to particular media. CDs should utilize ISO 9660 or UDF, and Windows 7 NTFS is the only file system to which the operating system may be eventually installed on.

Possible concerns when installing and maintaining operating systems
Microsoft supplies regular improvements for its operating systems although several other suppliers offer only regular patches to their software. It’s smart to make frequent checks for software improvements and patches which are generally launched for most computer systems which would really benefit from it. There are several activities which must be carried out on a constant basis to keep Windows running and file systems safe and operating at optimum efficiency:

1. Provide virus safety. 2. Throw out obsolete and unused files frequently and keep available space on hard drives which are used for virtual memory. 3. Scan the storage media for issues and rectify any and all issues. 4. Defragment the hard disk drives regularly. 5. Prepare back-up files and keep updated recovery disks. 6. Frequently check in for improvements and use them accordingly.

Troubleshooting and Maintenance Issues

Troubleshooting techniques for operating system-related problems
Keep Current A good “rule of thumb” to accept, while executing software-related troubleshooting, is to be certain that you own the latest versions of the required programs, drivers and operating system. Usually, this means keeping a stock of any software and hardware that you might have included in your computer system and after that searching sites which belong to organizations that make these items. This is, obviously, to find any kind of improvements, patches, service packages and other types of bug solutions.

Spyware/Internet Pop-Ups
There are several internet “pop-ups” which are included in sites. This eventually implies that they happen if they are linked to the website which you are currently browsing. It is possible to avoid these types of pop-ups, but, they are rather an irritation and may be usually offensive. Some types of pop-ups happen irrespective of the website which you are viewing and can show up even if you aren't in the middle of exploring the net! These kinds of nuisances are due to a computer system getting “infected” with a type of virus referred to as spyware. (Andrews)(Figure A) Shows a clear sign of some sort of virtumonde adware on a computer system.

DLL Error
Inside computer systems, there's a dynamic link library (DLL), or, an accumulation of minute applications to which any may be accessed when needed by a bigger application which is operating on the computer system. The smaller application which allows the bigger one to communicate with a particular device, for example a printer or scanner, is frequently called a DLL program. DLL files which back-up specific device operation are known as device drivers. (Figure B)

(Figure B)

Maintenance issues for operating systems
Programs Crash Repeatedly
There are some routes which you might follow while experiencing one of your preferred alternatives consistently failed when using it:
Reboot
The program might be failing since the device is in bad condition. Restarting the computer system will make sure that, the next time that the program is used, the unit will be in a good condition.

Download Updates/Latest Version
You might be associated with a problem which the spyware manufacturer is already conscious of and has followed their initiative to use a repair for. By going to the software corporation's site, a person might search till they find the item update part. Download and abide by the page's set up instructions so as to correctly fix the program. Even if the organization doesn't appear to have the sufficient fix for the problem, they might keep a documented work-around so as to eventually fix the issue.

Upgrading an operating system compared with a clean installation

Upgrading an operating system
Turn on the power to the computer system and instantly enter the boot menu (it could take the install program a great deal of time to load.) As soon as loading is finish, observe the onscreen instructions. It’s quite probable that the installer might request information and facts while it's being installed, but for the most part, the waiting is not very bothersome. To the finish of the set-up, the installer might request you for particular, last-minute, details.
Clean installation
Turn on the computer system and swiftly access the boot menu. Pick any key and navigate through the terms and conditions. Eliminate all the existing partitions. (FigureC)

(Figure C)
Here is where the person decides between a clean install or an upgrade

Networking and Security of Operating Systems
Networking in Operating Systems
Network Operating Systems (NOS) are basically used, to drive computers which work like servers and provide the methods which are important for network operation. They were also developed for buyer computer systems and provide options which make the difference between network operating systems and stand-alone operating systems much less clear. NOS offer the following activities; print and file sharing, account management for different people, safety and backing up information. Generally, NOS prove to be complete operating systems which involve job, task and file administration. In some instances however, (for example with numerous previous operating systems,) there was a separated part, that increased a normal, non-networking operating system by having these networking capabilities.

Possible Concerns While Connecting an OS to a Network
Cable Issue: It's possible that a wire which is being used to link different parts of a network might be cut or even shorted out. A short can take place when a wire conductor is joined with another surface which is also conductive; that adjusts the original route of the electric signal. Wire testers have been developed and are offered for use with different kinds of cable problems. These include; connector issues, cable shorts, interface levels, wrong cable use and broken wires.
Connection Issue: A connection problem might take place with a device in the network on changing the system settings or by a probable break down of a connection part, including; a switch, router or hub.
Software Issue: Network problems can, occasionally, be linked back to the program settings for example; the registry, WINS configuration, DNS configuration, and so on.

Security Features of Windows 7 Operating Systems
There are lots of security and safety characteristics which are relatively recent to Microsoft (MS) Windows and many of them are unavailable in any of the previous Windows operating system launches. In early 2002, Microsoft declared their “Trustworthy Computing Initiative,” that involved applying a good deal of effort for developing Window’s operating system to meet a level of security which exceeded their competitors. In the organization, Windows tailored to a “Security Development Lifecycle,” with the fundamental idea of “secure by development, secure by default and secure in arrangement.” Microsoft also created new coding for Windows 7 which involved utilizing SDL style and any earlier code which existed was both analyzed and refigured so as to supply greatest security for customers. Specific locations where Windows has started these kinds of revolutionary safety and security improvements incorporate; parental handling, user account controlling, Network Access Protection, an integral malware tool and systems which defend from particular digital content. Instances are listed below:

Windows Defender: Microsoft’s best anti-spyware function. MS transformed the title from “Microsoft Anti-Spyware” since it now offers these kinds of characteristics as; system scanning for spyware (just like other free competition products) and “Real Time Security” agents which check many different aspects of Windows for any modifications which may have taken place because of spyware. These types of common areas incorporate; auto-start programs, system configuration configurations, Internet Explorer configurations and downloads and, any add-ons for example “Windows Shell” extensions.
Windows Updates: Security and software upgrading has been made easy since it is currently solely carried out through the control panel. The Windows Mail spam filter and Windows Defender definitions are automatically upgraded through Windows Update. People who finalize to stay with the suggested default for automatic improvements will have the latest drivers set up, available when they attach a latest device.

Windows Firewall: Advanced significantly so as to handle several issues related to the flexibility of Windows Firewall in a company atmosphere.

Steps to Secure Modern Operating Systems
The best way for a person to completely try to avoid harmful action is to effectively password defend any and all user accounts by having a firewall software. This software program or hardware part may prevent distant access to an individual’s computer system, and does so by closing down all slots leading to different data; until the original communication is arriving from inside the actual firewall itself, first. Setting up reliable and trustworthy antivirus software, (through an antivirus software program for example McAfee or Norton Antivirus,) will also successfully avoid a person from viruses and for full protection; it is important to incorporate a spyware program for locating a removal tool. There are an uncountable quantity of individuals who have devoted a huge period of time and energy creating this kind of free software so as to get rid of or avoid harmful scenarios.

Personal Computers on the Internet
Differences between Internet and Network Connections A “Network Operating System” (Andrews) is called an operating system which requires applications and parts which allow a person on a network to accept requests from alternate computer systems for information and provide access to given recourses for example file systems and printers. 1. Include, control and take away users that try to use different resources on the network. 2. Let users the entry to info on the network. This info is generally found on the server. 3. Let users the entry to hardware which is linked to the network. 4. Get information and services which is found on the network. 5. Let’s the person to give documents on the attached network.

A network operating system (NOS) incorporates different protocol stacks, and, device drivers for network hardware.

Internet Connection An “Internet Connection” is described as a general method of unified computer networks which use the general “Internet Protocol Suite” (IPS) to serve billions of people throughout the world. An IPS is a huge network which is developed by several other networks composed of public and private, company, educational and government networks which are on a regional to international length which are adjoined to a wide range of optical and electric networking systems. The Internet gives a wide selection of information services and resources, (most significantly the inter-linked hypertext files of the “World Wide Web” (WWW) and the design which offers “Electronic Mail” (E-mail).
Steps to Connect a Workstation to the Internet
Step One: (Allowing networking on a workstation)-Connect to the router through your browser,
Step Two: Allow encryption on the access point,
Step Three: Program the router access security password,
Step Four: Modify the Service Set Identifier, (network identification or SSID,) from the computer system default to something unique, (something individually secret; name, birthday and so on.) Don't disable the “SSID Broadcast.”
Step Five: Lastly, turn off distant access and cordless administrating.

Potential problems and solutions when connecting an OS to the internet
Cable Issue: It's possible that a wire which is used to link different regions of a network might be cut and even shorted out. A short can take place if a wire conductor is joined with another surface which is also conductive; that changes the original route of the electric signal. Cable testers have been developed and are offered for use with different kinds of cable problems. These include; connector issues, cable shorts, interface levels, wrong wire use and broken wires. Make sure that all of the utilized cables are in the proper, functioning order and placed in such a manner that they are out of the way of traffic, pinch scenarios etc.

Connection Issue: A connection problem might take place with a device in the network on changing the system settings or by a probable break down of a connection part, for example; a switch, router or hub.
Use the “ping” or “path-ping” command-line tools to check regular connectivity. Apply ping command-line in order to segregate network hardware issues and incompatible configurations.
Software Issue: Network problems may, occasionally, be linked back to the software settings for example; the registry, WINS settings, DNS settings, and so on.
Be sure to properly update all of the given software accordingly

Features of Older Model Operating Systems
Legacy Operating Systems
“Windows Fundamentals for Legacy PCs” (WinFLP) is actually a little client operating system from Microsoft which is based on “Windows XP Embedded” however increased for the benefit of older and less commanding hardware. WinFLP was made public during July of 2006 and wasn't promoted to be a whole and full-blown, normal OS; although it is able to carrying out a lot of the jobs which are commonly associated with one. It requires the particular efficiency for local workloads only, for example; administration, safety and relevant document observing jobs.

Issues involved with supporting Legacy Windows Operating Systems
WinFLP, as the title puts forward, entails a smaller set of features than that of a whole Windows XP set up. For example, program like “Outlook Express” isn't obtainable, even in the situation which requires a complete set up. There are also many system tools which are eliminated from WinFLP, although they aren't usually used elements and are seldom used; plus, they may be reinstated with free tools or probably with files from a full XP set up. Additionally, the operation system doesn't involve full support for terminal-based links. One more restriction proves to be the ultimate nonexistence of the Compatibility tab which would generally live in the properties section for executable files. WinFLP won't also normally supply many different programs; for example particular games or MSPaint. It does, however, contain the basic programs such as the calculator, WordPad and Notepad.

Support of Older Applications in Current Operating Systems
WinFLP is selectively accessible to Microsoft Software Assurance customers, as it was intended to be a less-expensive advancement option for organizations which include having several Windows9x computer systems, but lacks the hardware required in order to support the modern version of Windows. It can't be found available through stores or from OEM channels. For clients who use Legacy Microsoft items which aren't backed by MBSA 2.1, there is always Microsoft Update

Conclusion
We have made it to the finish we have reviewed different important data regarding Windows Operating systems. At this point if the principle has been correctly, pursued people will be capable to set up, update, carry out repair and trouble-shooting problems, networking, safety of operating systems, and data relating to legacy and older operating systems. Through this guide, we have covered some important descriptions that will allow people to be capable to start correct set up in operating systems. Below I have offered a few of those descriptions for rapid referrals.

Key Terms Antivirus
- is software utilized to avoid, find, and eliminate malware, including computer viruses, worms and Trojan horses.
Device Manager
- Control Panel applet in Microsoft Windows operating systems. This permits users to see and manage the hardware linked to the computer system.
Firewall
- is a component of a computer system or network which is developed to stop unauthorized access while allowing approved communications
Kernel
- is the main part of computer operating systems actually the link between applications and the actual data processing carried out at the hardware stage.
Malware
- harmful software, is software developed to covertly access a computer system without the owner's informed approval.
Network
- is a set of computer systems and devices connected by communications means which help communications among users and permit users to share sources.
Operating System
- software, composed of programs and data that operates on computer systems and controls the computer hardware and gives usual services for efficient performance of different application software.
Shell
- piece of software which offers an interface for users of an operating system that provides entry to the services of a kernel.
Spyware
- kind of malware which can be set up on computer systems and gathers little pieces of information simultaneously regarding users without their information.
Windows registry
- database which saves configuration settings and options on Windows operating systems.

References

For further information and assistance, refer to Andrews, J. (n.d.). A+ guide to managing and maintaining your pc (Adobe Digital Editions version), doi: 9781435429185

Similar Documents

Premium Essay

It282 Final Project

...Final Assignment Maintenance and training manual John Kroll IT282 1-22-2012 Final Assignment Maintenance and training manual  Overview of Operating Systems There are several versions of windows that I have used in my life since becoming infatuated with computers at an early age. My first memory of using a computer and was when bought a computer from the local Montgomery Ward’s company in the early 90s, it was the brand name Wang and came state of the art with windows 3.1 and a 28.8 KB/sec dial up modem. I was in grade school maybe middle school using windows 3.1 and familiarizing myself with the program manger and the different ways to do things from clicking on the icons to running programs from ms dos prompt. This was my first computer and loved every bit of it. I remember when my mom brought it home from the store I took my time and connected everything the way it said in the manual. This was my first steps towards an eventual career in the IT field. We owned that computer for a few years and eventually upgraded. The next computer I owned in my life was a little newer Compaq it had the new and improved version of windows. Windows 95 opened the doors towards innovation and a new and improved windows experience. With the new features included in Windows 95 it was a breakthrough and an innovation towards the way modern windows versions are used today. With the advent of the start menu and the new way to use your computer with a customizable desktop and an adaptable...

Words: 2959 - Pages: 12