...system and may also include accounting software for cost allocation of processor time, mass storage, printing, and other resources. For hardware functions such as input and output and memory allocation, the operating system acts as an intermediary between programs and the computer hardware, although the application code is usually executed directly by the hardware and frequently makes a system call to an OS function or be interrupted by it. Operating systems can be found on many devices that contain a computer—from cellular phones and video game consoles to supercomputers and web servers. Examples of popular modern operating systems include Android, BSD, iOS, Linux, OS X, QNX, Microsoft Windows, Windows Phone, and IBM z/OS.. History 1. Windows - The first Windows system was released in 1985. Originally, it was just a graphical user interface on top of MS-DOS – a state of affairs that lasted until the release of Windows 95, when MS-DOS products were integrated into Windows. Windows 95 was a huge departure from the previous systems and was the first major step in Window’s transition from GUI to operating system. 2. Apple - The Apple Macintosh system is a little older than Windows, having first been released in 1984. From the start, it was an entirely graphical operating system, and from quite an early stage became popular among the earliest computer graphic designers. In 2005, Apple changed the design and structure of Mac OS, moving from...
Words: 1245 - Pages: 5
...NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues A good troubleshooter should be capable of discerning whether the problem is software or hardware related and repair all of these problems. In this lab, you will demonstrate your ability to use the six-step troubleshooting model to fix a networking issue and outline the steps toward a solution. Required Setup and Resources: A computer with access to the Internet Before starting work on Task 1, perform the following steps: 1. Open Internet Explorer. Click the Tools menu and select Internet Options. 2. Click the Connections tab. 3. Click the LAN Settings button. 4. In the Proxy Server section, select Use a proxy server for your LAN. Then, click the Advanced button. 5. In the Proxy Settings window, enter 192.168.100.1 for the HTTP proxy address and port 80 for the port. Note: Remember to reset the proxy settings to their original values when Task 1 is finished. Recommended Procedures Task 1: Network Troubleshooting When you boot your computer and open Internet Explorer, this is what you see: 1 NT1110: Module 6 Troubleshooting and Networks Lab 6.1 Troubleshooting Networking Issues Apply the six-step troubleshooting model to the problem. Document everything associated with each step of the troubleshooting model. 1. Ascertain what the problem is. 2. Write down probable causes of the problem. 3. Determine if theories are correct...
Words: 513 - Pages: 3
...Exploring the Motherboard and Busses Exploring the Motherboard and Busses The motherboard represents the logical foundation of the computer. Everything that makes a computer must be attached to the motherboard. Answer the following questions: 1. What are the major components of the motherboard? Provide a brief description of each component. 1. Processor (CPU): The processor is the brain of the computer and is the chip where all the computing is done. 2. Memory: This is where the computer stores information while it is working on it. 3. Chipset: The chipset is a link between the processor and the outside world, and handles things like controlling the hard drives, the USB ports, the keyboard and mouse, generates the sounds the computer makes, and sometimes even creates the pictures you see on the screen. 4. Expansion Slots: Expansion slots are connectors that allow you to attach additional cards on the computer, such as video cards, sound cards, modems, and add abilities to the computer that the motherboard doesn’t provide. 5. I/O (Inputs/ Outputs): These are a set of connectors that allows you to connect various devices to the computer, such as the keyboard, monitor, mouse, hard drives, flash drives, printers, and connect the computer to a network. 2. Upgrading only the motherboard will give some performance improvement to a computer system. Why? Upgrading the motherboard will definitely give performance improvement to any computer system...
Words: 469 - Pages: 2
...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA formatting. Your report...
Words: 296 - Pages: 2
...NT1110: Module 5 Computer Operation and Security Lab 5.1 Understanding BIOS, POST, and Security Basics In this lab, you will demonstrate your ability to fix issues related to BIOS/POST and secure the computer from viruses and Trojans. Required Setup and Tools A computer with access to the Internet Recommended Procedures Task 1: Understanding BIOS and POST A user boots his or her computer and hears a sequence of six beeps. The computer uses AMI BIOS. What error is indicated by the six beeps? A different user with a computer using Phoenix BIOS hears a sequence of beeps with pauses in between. The sequence is beep - pause - beep beep beep - pause - beep beep beep beep- pause - beep beep beep. What error is indicated by this beep sequence? Task 2: Basic Security Firewalls may be hardware devices or software programs. Hardware firewalls protect an entire network. Software firewalls protect a single computer. Research the Internet for an example of each of these types of firewalls and compare their features. Linksys and Cisco make firewall/routers for home use. The Zone labs are an example of a software firewall. Submission Requirements: Include a references page citing the resources you used from the textbook, ITT Tech Virtual Library, and credible websites to substantiate your answers. All citations should be in APA format. Refer to ITT Tech Virtual Library> Research Help> Research Guides> Grammar, Writing & Style> APA Formatting and Style Guide for help in APA...
Words: 296 - Pages: 2