SlideShare a Scribd company logo
1 of 15
Download to read offline
VG-PRUCAS-PENNAGARAM
Fundamental Operating Systems
The Purpose of an Operating System
ī‚ˇ The operating system (OS) controls almost all functions on a computer.
ī‚ˇ All computers rely on an operating system (OS) to provide the interface for interaction between
users, applications, and hardware.
ī‚ˇ The operating system boots the computer and manages the file system.
Characteristics of Operating Systems
ī‚ˇ The operating system has four main functions:
o Control hardware access
o Manage files and folders
o Provide user interface
o Manage applications
ī‚ˇ Control hardware access
o The operating system manages the interaction between applications and the hardware
o OS automatically discovers and configures (Plug and Play)PnP hardware
o To communicate with the hardware, the operating system installs a device driver for
each hardware component.
o A device driver is a small program written by the hardware manufacturer
ī‚ˇ File and folder management
o The operating system creates a file structure on the hard disk drive to allow data to be
stored
o A file is a block of related data
o Program and data files are grouped together in a directory
ī‚ˇ User interface
ī‚ˇ The operating system enables the user to interact with software and hardware. There are two
types of user interfaces:
o Command line interface (CLI)
o Graphical user interface (GUI)
ī‚ˇ Application management
ī‚ˇ The operating system locates an application and loads it into the RAM of the computer.
ī‚ˇ Applications are software programs, such as word processors, databases, spreadsheets,games,
and many other applications.
ī‚ˇ An application programming interface (API) is a set of guidelines used by programmers to ensure
that the application they are developing is compatible with an operating system.
ī‚ˇ Two examples of APIs are:
o Open Graphics Library (OpenGL)
o DirectX
Operating Systems concepts
To understand the operating system, it is important to understand some basic terms.
The following terms are often used when comparing operating systems:
ī‚ˇ Multi-user – Two or more users can work with programs and share peripheral devices, such as
printers, at the same time.
VG-PRUCAS-PENNAGARAM
ī‚ˇ Multi-tasking – The computer is capable of operating multiple applications at the same time.
ī‚ˇ Multi-processing – The computer can have two or more central processing units (CPUs) that
programs share.
ī‚ˇ Multi-threading – A program can be broken into smaller parts that can be loaded as needed by
the operating system.
ī‚ˇ Multi-threading allows individual programs to be multi-tasked.
Modes of Operation
ī‚ˇ All modern CPUs can run in different modes of operation
ī‚ˇ The mode of operation refers to the capability of the CPU and the operating environment.
ī‚ˇ The four common modes of operation are as follows:
o Real mode
o Protected mode
o Virtual real mode
o Compatible mode
Real Mode
ī‚ˇ Executes only one program at a time
ī‚ˇ Addresses only 1 MB of system memory at a time
ī‚ˇ Directly accesses memory and hardware
ī‚ˇ Subject to crashes
ī‚ˇ Available to all modern processors
ī‚ˇ Only used by DOS and DOS applications
ī‚ˇ Program Code directly controls PC hardware.
ī‚ˇ PC hardware can be interrupted by bad code.
Protected Mode
ī‚ˇ Has access to all memory
ī‚ˇ Can manage multiple programs simultaneously
ī‚ˇ Allows the system to use virtual memory
ī‚ˇ Provides 32-bit access to memory, drivers, and I/O transfers
ī‚ˇ Each program is assigned a space in memory
ī‚ˇ Computer is protected from program errors
Virtual Real Mode
ī‚ˇ Allows a real-mode application to run within a protected-mode operating system
ī‚ˇ Creates virtual machines for each program that runs in real mode
ī‚ˇ Each virtual machine receives 1 MB of memory and access to hardware
ī‚ˇ In the event of a program error, only the virtual machine is affected
ī‚ˇ OS provides virtual machine to host the code and protect the PC
Compatibility Mode
ī‚ˇ Compatibility mode creates the environment of an earlier operating system for applications that
are not compatible with the current operating system.
Compare Operating Systems
There are two distinct types of operating systems:
VG-PRUCAS-PENNAGARAM
ī‚ˇ Desktop operating systems: A desktop operating system is intended for use in a small
office/home office (SOHO) with a limited number of users.
ī‚ˇ Network operating systems: A network operating system (NOS) is designed for a corporate
environment serving multiple users with a wide range of needs.
Desktop Operating System
o Supports a single user
o Runs single-user applications
o Shares files and folders
o Shares peripherals
o Used on a small network
ī‚ˇ Desktop operating systems:
o Microsoft Windows: Windows XP
o Macintosh: Mac OS X
o Linux: Fedora, Ubuntu, and others
o UNIX
Network Operating Systems (NOS)
o Supports multiple users
o Runs multi-user applications
o Is robust and redundant
o Provides increased security
o Used on a network
o Provides increased security compared to desktop operating systems
ī‚ˇ Common NOS include:
o Novell Netware
o Microsoft Windows Server
o Linux
o UNIX
Determine Proper Operating System
ī‚ˇ To select the proper operating system:
o Create an accurate profile of our customer by analyzing the daily, weekly, and monthly
computer activities
o Select appropriate software and hardware to satisfy
What Does Our Customer Require?
ī‚ˇ Office applications
o word processing, spreadsheets, or presentation software
ī‚ˇ Graphics applications
o Photoshop or Illustrator
ī‚ˇ Animation applications
o Flash
ī‚ˇ Business applications
o accounting, contact management, sales tracking or database
VG-PRUCAS-PENNAGARAM
Identify Minimum Hardware Requirements
ī‚ˇ Customer may need to upgrade or purchase additional hardware to support the required
applications and OS.
ī‚ˇ A cost analysis will indicate if purchasing new equipment is a better idea than upgrading.
ī‚ˇ Common hardware upgrades:
o RAM capacity
o Hard drive size
o Processor speed
o Video card memory and speed
Hardware Compatibility List (HCL)
ī‚ˇ Most operating systems have an HCL.
ī‚ˇ HCLs can be found on the manufacturer's website.
ī‚ˇ HCL includes list of hardware that is known to work with the operating system.
Installing the Operating System
ī‚ˇ Reasons to perform a clean installation of an OS:
o When a computer is passed from one employee to another
VG-PRUCAS-PENNAGARAM
o When the operating system is corrupted
o When a new replacement hard drive is installed in a computer
ī‚ˇ Before performing a clean installation:
o Back up all data first
o Explain to the customer that existing data will be erased
o Confirm that all needed data has been successfully transferred
Hard Drive Setup Procedures
Operating system setup methods:
o Install an OS over a network from a server
o Install from a copy of the OS files stored on the hard drive
o Install from OS files stored on CDs or DVDs
ī‚ˇ Partitioning and Formatting
o Hard drive must be logically divided (partitioned)
o File system must be created on the hard drive
o During the installation phase, most operating systems will automatically partition and
format the hard drive
ī‚ˇ The following terms are used when referring to hard drive setup:
o Primary partition: This partition is usually the first partition. A primary partition cannot
be subdivided into smaller sections. There can be up to four partitions per hard drive.
o Active partition: This partition is the partition used by the operating system to boot the
computer. Only one primary partition can be marked active.
o Extended partition: This partition normally uses the remaining free space on a hard
drive or takes the place of a primary partition. There can be only one extended partition
per hard drive, and it can be subdivided into smaller sections called logical drives.
o Logical drive: This drive is a section of an extended partition that can be used to
separate information for administrative purposes.
o Formatting: This process prepares a file system in a partition for files to be stored.
o Cluster: A cluster is also called a file allocation unit. It is the smallest unit of space used
for storing data.
o Track: A track is one complete circle of data on one side of a hard drive platter. A track is
broken into groups of 512 bytes, called sectors.
o Cylinder: A cylinder is a stack of tracks lined up one on top of another to form a cylinder
shape.
o Drive mapping: Drive mapping is a letter assigned to a physical or logical drive
Prepare the Hard Drive
ī‚ˇ The first portion of the installation process deals with formatting and partitioning the hard drive.
ī‚ˇ The second portion prepares the disk to accept the file system.
ī‚ˇ The file system provides the directory structure that organizes the user's operating system,
application, configuration, and data files.
ī‚ˇ Examples of file systems:
o The FAT32 file system
VG-PRUCAS-PENNAGARAM
o The New Technology File System (NTFS)
Install the Operating System
ī‚ˇ During the Windows XP installation the user must provide:
o Define currency and numerals
o Text input language
o Name of user
o Name of company
o Product key
o Computer name
o Administrator password
o Date and time settings
o Network settings
o Domain or workgroup information
Create Administrator Account
ī‚ˇ Setup creates the administrator account with the user name “administrator”
o Change this name to keep the administrator account secure
o Only use the administrator account occasionally for critical system changes
ī‚ˇ Create a fictitious user account to use as a template
ī‚ˇ Use secure passwords
o These should be a minimum of 7 characters, containing at least one of each (letter,
number, and symbol)
Complete the Installation
ī‚ˇ When Windows XP installation completes:
o Computer will reboot
VG-PRUCAS-PENNAGARAM
o Log in for the first time
o Register Windows XP and verify that we are using a legal copy of the OS
ī‚ˇ Verification enables we to download patches and service packs
ī‚ˇ Use Microsoft Update Manager to scan for new software and to:
o Install all service packs
o Install all patches
Check Device Manager for Conflicts
ī‚ˇ Look for warning icons (yellow exclamation points)
ī‚ˇ Double-click to learn about the problem
ī‚ˇ Click the plus (+) sign to expand the category
ī‚ˇ May be able to ignore an error
Custom Installation Options
ī‚ˇ With Microsoft System Preparation
ī‚ˇ Follow these steps for disk cloning:
o Create a master installation on one computer
o Run Sysprep
o Create a disk image of the configured computer using third-party disk-cloning software
o Copy the disk image onto a server
ī‚ˇ When the destination computer is booted,
o A shortened version of the Windows setup program runs
o Setup configures only user-specific and computer-specific settings
o An answer file provides data normally required during set up
The Boot Sequence for Windows XP
1. Power On Self Test (POST)
2. POST for each adapter card that has a BIOS
3. BIOS reads the Master Boot Record (MBR)
4. MBR takes over control of the boot process and starts NT Loader (NTLDR)
5. NTLDR reads the BOOT.INI file to know which OS to load and where to find the OS on the boot
partition
6. NTLDR uses NTDETECT.COM to detect any installed hardware
7. NTLDR loads the NTOSKRNL.EXE file and HAL.DLL
8. NTLDR reads the registry files and loads device drivers
9. NTOSKRNL.EXE starts the WINLOGON.EXE program and displays the Windows login screen
NTLDR and the Windows Boot Menu
ī‚ˇ If more than one OS is present on the disk, BOOT.INI gives the user a chance to select which to
use.
ī‚ˇ Otherwise:
o NTLDR runs NTDETECT.COM to get information about installed hardware
o NTLDR then uses the path specified in the BOOT.INI to find the boot partition
o NTLDR loads two files that make up the core of XP: NTOSKRNL.EXE and HAL.DLL
o NTLDR reads the Registry files, chooses a hardware profile, and loads device drivers.
VG-PRUCAS-PENNAGARAM
The Windows Registry
ī‚ˇ The Windows registry is a hierarchal database used by the Windows operating system to store
information and settings for hardware, software, users, and preferences on a system
ī‚ˇ Recognized by distinctive names, beginning with HKEY_
ī‚ˇ Changes to the Control Panel settings, File Associations, System Policies, or installed software
are stored in the registry
ī‚ˇ Each user has their own section of the registry
ī‚ˇ The Windows logon process uses the registry to set the system to the state that it was in the last
time the user logged in
ī‚ˇ Following are the some of The Windows Registry Files
The NT Kernel
ī‚ˇ The NT kernel, the heart of the Windows operating system, takes over. The name of this file is
ntoskrnl.exe.
Manipulating Operating System Files
ī‚ˇ MSCONFIG: After we have installed Windows XP, we can use MSCONFIG for post-installation
modifications:
o This boot configuration utility allows we to set programs that will run at startup, and to
edit configuration files
ī‚ˇ REGEDIT: The registry is a database that contains information and settings for all of the
hardware, software, users and preferences. REGEDIT allows users to edit the registry.
Startup Modes
ī‚ˇ Pressing the F8 key during the boot process opens the Windows Advanced Startup Options
menu, which allows we to select how to boot Windows.
o Safe Mode – Starts Windows but only loads drivers for basic components, such as the
keyboard and display.
o Safe Mode with Networking Support – Starts Windows identically to Safe Mode and
also loads the drivers for network components.
VG-PRUCAS-PENNAGARAM
o Safe Mode with Command Prompt – Starts Windows and loads the command prompt
instead of the GUI interface.
o Last Known Good Configuration – Enables a user to load the configurations settings of
Windows that was used the last time that Windows successfully started. It does this by
accessing a copy of the registry that is created for this purpose.
Describing Directory Structures
ī‚ˇ Windows file system naming conventions:
o Maximum of 255 characters may be used
o Characters such as a period (.) or a slash ( /) are not allowed
o An extension of three or four letters is added to the filename to identify the file type
o Filenames are not case sensitive
ī‚ˇ Windows filename extension examples:
o .doc -Microsoft Word
o .txt -ASCII text only
o .jpg -graphics format
o .ppt -Microsoft PowerPoint
o .zip -compression format
ī‚ˇ Each file has a set of attributes that control how the file may be viewed or altered.
ī‚ˇ The following are the most common file attributes:
o R -The file is read-only
o A -The file will be archived the next backup
o S -The file is marked as a system file and a warning is given if an attempt is made to
delete or modify the file
o H -The file is hidden in the directory display
The ATTRIB Command
ī‚ˇ we can view the filenames, extensions, and attributes by entering a DOS window (choose Start >
Run > cmd) and typing the ATTRIB command
NTFS and FAT32
ī‚ˇ FAT32 is used where files need to be accessed by multiple versions of Windows. FAT32 is not as
secure as NTFS
ī‚ˇ NTFS can support more and larger files than FAT32, and provides more flexible security features
for folders, files, and sizes
ī‚ˇ Partitions can be converted from FAT32 to NTFS using the CONVERT.EXE utility, but not in the
reverse direction
Navigate a GUI (windows)
ī‚ˇ The operating system provides a user interface that allows us to interact with the computer.
ī‚ˇ There are two methods that we can use to navigate the file system and run applications within
an operating system:
o A GUI provides graphical representations of all the files, folders, and programs on a
computer.
o A command-line interface (CLI) is text based. we must type commands to manipulate
files and execute programs
VG-PRUCAS-PENNAGARAM
Manipulate Items on the Desktop
ī‚ˇ A desktop on a computer is a graphical representation of a workspace.
ī‚ˇ The desktop has icons, toolbars, and menus to manipulate files.
ī‚ˇ The desktop can be customized with images, sounds, and colors to provide a more personalized
look and feel.
Desktop Properties
ī‚ˇ To customize the GUI of our desktop, right-click the desktop and choose Properties,
ī‚ˇ The Display Properties menu has five tabs: Themes, Desktop, Screen Saver, Appearance, and
Settings. Click any of these tabs to customize our display settings
Desktop Items
ī‚ˇ There are several items on the desktop that can be customized, such as the taskbar and Recycle
Bin.
ī‚ˇ To customize any item, right-click the item and then choose Properties.
The Start Menu
ī‚ˇ On the desktop, the Start menu is accessed by clicking the Start button.
ī‚ˇ The Start menu, displays all the applications installed in the computer, a list of recently opened
documents, and a listing of other elements, such as a search feature, help center, and system
settings.
ī‚ˇ The Start menu can also be customized to two styles, XP and Classic
My Computer
ī‚ˇ To access the various drives installed in the computer, double-click the My Computer icon that
appears on the desktop.
ī‚ˇ To customize certain settings, right-click My Computer and choose Properties
ī‚ˇ there are several settings that can be customized:
o Computer name
o Hardware settings
o Virtual memory
o Automatic updates
o Remote access
ī‚ˇ Files can also be moved and copied using My Computer
Launching Applications
ī‚ˇ Applications can be launched in several ways:
o Click the application on the Start menu
o Double-click the application shortcut icon on the desktop
o Double-click the application executable file in My Computer
o Launch the application from the Run window or command line
My Network Place
ī‚ˇ To view and configure network connections, right-click the My Network Places icon.
o Connect to or disconnect from a network drive
o Right-click Properties to configure existing network connections, such as a wired or
wireless LAN connection
Explore Control Panel Applets
ī‚ˇ Windows centralizes the settings for many features that control the behavior and appearance of
the computer. These settings are categorized in Control Panel applets
VG-PRUCAS-PENNAGARAM
Display Settings
ī‚ˇ Change the resolution and color quality
ī‚ˇ Change wallpaper, screen saver, power settings, and other options, by clicking the Advanced
button
Explore Administrative Tools
ī‚ˇ The following sections cover some of the most common administrative utilities for
troubleshooting, managing, and maintaining Windows XP, including
o Device Manager
o Task Manager
o Event Viewer
o Remote Desktop
o Performance Settings
Device Manager
ī‚ˇ Used to view settings for devices in the computer
ī‚ˇ To view the system resources in the Device Manager, use the following path:
Start > Control Panel > System > Hardware > Device Manager
An exclamation mark indicates a problem with a device
Task Manager
ī‚ˇ View all applications that are currently running
ī‚ˇ Close any applications that have stopped responding
ī‚ˇ Monitor the performance of the CPU and virtual memory
ī‚ˇ View all processes that are currently running
ī‚ˇ View information about the network connections
ī‚ˇ To view information in the Task Manager, press Ctrl-Alt-Delete and then select Task Manager or
right-click the taskbar and select Task Manager.
Event Viewer and Remote Desktop
Event Viewer
ī‚ˇ Logs a history of events regarding applications, security, and the system.
ī‚ˇ These log files are a valuable troubleshooting tool.
ī‚ˇ To access the Event Viewer, choose Administrative Tools > Event Viewer from the Control
Panel.
Remote Desktop
ī‚ˇ Allows one computer to remotely take control of another computer.
ī‚ˇ This troubleshooting feature is only available with Windows XP Professional.
ī‚ˇ To access the Remote Desktop,use the following path:Start > All Programs > Accessories >
Communications > Remote Desktop Connection
Performance Settings
ī‚ˇ To enhance the performance of the operating system, we can change some of the settings that
our computer uses, such as virtual memory configuration settings,
ī‚ˇ To change the virtual memory setting, use the following path:Start > Control Panel > System >
Advanced > Performance area > Settings button >Advanced tab > Virtual memory section >
Change
VG-PRUCAS-PENNAGARAM
Install, Navigate, and Uninstall an Application
ī‚ˇ Most applications use an automatic installation process when an application
ī‚ˇ Microsoft recommends that users always use the Add or Remove Programs utility,when
installing or removing applications
ī‚ˇ To open the Add or Remove Programs applet, use the following path:Start > Control Panel >
Add or Remove Programs
UPGRADING AN OPERATING SYSTEM
ī‚ˇ Before upgrading the operating system, check the minimum requirements of the new operating
system
ī‚ˇ Check the HCL to ensure that the hardware is compatible with the new operating system.
ī‚ˇ Back up all data before upgrading the operating system in case there is a problem with the
installation
Upgrading the Windows XP operating system
1. Insert the Windows XP CD. Select Start > Run.
2. In the Run box, where D is the drive letter for the CDROM, type D:i386winnt32 and press Enter. The
Welcome to the Windows XP Setup Wizard displays.
3. Choose Upgrade to Windows XP and click Next. The License Agreement page displays.
4. Read the license agreement and click the button to accept this agreement.
5. Click Next. The Upgrading to the Windows XP NTFS File System page displays.
6. Follow the prompts and complete the upgrade. When the install is complete, the computer will
restart.
Preventive Maintenance technique
ī‚ˇ Components of a preventive maintenance plan:
o Updates to the operating system and applications
o Updates to anti-virus and other protective software
o Hard drive error checking
o Hard drive backup
o Hard drive defragmentation
SCHEDULE TASKS
ī‚ˇ Most preventive maintenance applications can be set to run automatically according to a
schedule.
ī‚ˇ Windows has the following utilities that will launch tasks when we schedule them:
o The DOS AT command launches tasks at a specified time using the command-line
interface (choose Start > Run > cmd) and type AT /?
o The Windows Task Scheduler launches tasks at a specified time using a graphical user
interface. Start > All Programs > Accessories > System Tools > Scheduled Tasks.
System Utilities
ī‚ˇ There are several utilities included with DOS and Windows that help maintain system integrity.
ī‚ˇ Two system utilities that are useful tools for preventive maintenance are
o ScanDisk or CHKDSK: ScanDisk (Windows 2000) and CHKDSK (Windows XP) check the
integrity of files and folders and scan the hard disk surface for physical errors.
o Defrag: As files increase in size, some data is written to the next available space on the
disk. Defrag gathers the noncontiguous data into one place, making files run faster.
VG-PRUCAS-PENNAGARAM
ī‚ˇ We can access both of these utilities by using this path: Start > All Programs > Accessories >
System Tools > Disk Defragmenter
Automatic Updates
ī‚ˇ An automatic update service scans the system for needed updates, and recommends what
should be downloaded and installed.
ī‚ˇ Automatic update services can setup to download and install updates as soon as they are
available or as required, and install them when the computer is next rebooted.
ī‚ˇ The Microsoft Update Wizard is available at this path: Start > Control Panel > System >
Automatic Updates
Restore Point
ī‚ˇ An update can sometimes cause serious problems. Perhaps an older program is in the system
that is not compatible with the current operating system
ī‚ˇ Windows System Restore is the solution for this problem. Windows XP can create an image of
current computer settings, called a restore point.
ī‚ˇ Then, if the computer crashes or an update causes system problems, the computer can roll back
to a previous configuration.
ī‚ˇ To restore or create a restore point, use the following path: Start > All Programs > Accessories >
System Tools > System Restore
ERD and ASR
ī‚ˇ Windows 2000 offers the ability to create an emergency repair disk (ERD) that saves critical
boot files and configuration information necessary to troubleshoot problems in Windows.
ī‚ˇ Windows XP offers the same features with the Automated System Recovery(ASR) wizard.
BACKUP THE HARD DRIVE
ī‚ˇ Backup tools allow the recovery of data.
ī‚ˇ There are several different types of backup.
Normal Backup
ī‚ˇ A normal backup is also called a full backup. During a normal backup, all selected files on the
disk are archived to the backup medium.
Copy Backup
ī‚ˇ A copy backup will copy all selected files. It does not mark the files as having been archived.
Incremental Backup
ī‚ˇ An incremental backup procedure backs up all the files and folders that have been created or
modified since either the last normal or incremental backup.
ī‚ˇ It marks the files as having been archived by clearing the archive bit.
Differential Backup
ī‚ˇ A differential backup backs up all the files and folders that have been created or modified since
either the last normal backup or the last incremental backup.
ī‚ˇ The differential backup does not mark the files as having been archived.
Daily Backup
ī‚ˇ Daily backups only back up the files that are modified on the day of the backup.
Backup Media
ī‚ˇ There are many types of backup media available for computers:
o Tape drives are devices that are used for data backup on a network server drive. Tapes
drives are an inexpensive way to store a lot of data.
VG-PRUCAS-PENNAGARAM
o The Digital Audio Tape (DAT) tape standard uses 4-mm digital audiotapes to store data
in the Digital Data Storage (DSS) format.
o Digital Linear Tape (DLT) technology offers high-capacity and relatively high-speed tape
backup capabilities.
o USB flash memory can hold hundreds of times the data that a floppy disk can hold.USB
flash memory devices are available in many capacities and offer better transfer rates
than tape devices.
Troubleshooting Process
ī‚ˇ Step 1 Gather data from the customer
ī‚ˇ Step 2 Verify the obvious issues
ī‚ˇ Step 3 Try quick solutions first
ī‚ˇ Step 4 Gather data from the computer
ī‚ˇ Step 5 Evaluate the problem and implement the solution
ī‚ˇ Step 6 Close with the customer
1. Gather Data from the Customer
ī‚ˇ Customer information
o Company name, contact name, address, phone number
ī‚ˇ Computer configuration
o Operating system, patches and updates, network environment, connection type
ī‚ˇ Use a work order to collect information
ī‚ˇ Description of problem
o Open-ended questions
ī‚§ What were we doing when the problem was identified?
o Closed-ended questions
ī‚§ Are we currently logged into our network?
2. Verify the Obvious Issues
ī‚ˇ Examine the most obvious causes of a problem.
o Is the caps lock key set to ON?
o Is there a non-bootable disk in the floppy drive?
o Are the drive settings and boot order configured correctly in BIOS?
o Can we log on as another user?
o Was the computer turned off without being shut down properly?
o Has the password changed?
o Does the monitor have power?
o Does the display have the correct settings?
3. Try Quick Solutions First
ī‚ˇ Use the Last Known Good Configuration settings
ī‚ˇ Enter Safe Mode to troubleshoot video problems
ī‚ˇ Uninstall an application that was recently added
ī‚ˇ Roll back the system using a System Restore point
ī‚ˇ Examine the Device Manager for device conflicts
ī‚ˇ Run cleanmgr to clean up temp files
VG-PRUCAS-PENNAGARAM
ī‚ˇ Run chkdsk/f to repair problems with the hard drive
ī‚ˇ Run defrag to speed up the hard drive
ī‚ˇ Reboot the computer
ī‚ˇ Login as a different user
4. Gather Data from the Computer
ī‚ˇ Examine system files.
ī‚ˇ Run diagnostic software.
ī‚ˇ Refer to the computer user manual or BIOS website for the meaning of beep codes.
ī‚ˇ Examine the event logs to determine the cause of computer problems.
5. Evaluate Problem & Implement Solution
ī‚ˇ We may need to conduct further research
ī‚ˇ Refer to repair manuals
ī‚ˇ Study the product documentation
ī‚ˇ Visit the manufacturer’s website
ī‚ˇ Consult repair journals
ī‚ˇ Talk to technicians who may have repaired similar problems.
ī‚ˇ Implement the most likely solution first
ī‚ˇ Return the computer to the original state before trying the next solution
ī‚ˇ It may be necessary to test many potential solutions before the problem is resolved
6. Close with the Customer
ī‚ˇ When we are confident that the problem is resolved:
ī‚ˇ Document the customer information, problem description, and steps to resolve the issue in the
work order.
ī‚ˇ Explain to the customer how we solved the problem .
ī‚ˇ Let the customer verify that the problem has been solved.
ī‚ˇ Complete all documentation including sales orders, time logs, and receipts.
ī‚ˇ Complete the work order.
ī‚ˇ Update the repair journal. We can use the notes from the journal for future reference.

More Related Content

What's hot

Operating systems Basics
Operating systems BasicsOperating systems Basics
Operating systems BasicsSherif Mousa
 
File management ppt
File management pptFile management ppt
File management pptmarotti
 
Operating system overview concepts ppt
Operating system overview concepts pptOperating system overview concepts ppt
Operating system overview concepts pptRajendraPrasad Alladi
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in ITRohana K Amarakoon
 
Future operating system
Future operating systemFuture operating system
Future operating systemEstiak Khan
 
Operating systems
Operating systemsOperating systems
Operating systemsUjjwal 'Shanu'
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networkingJafar Nesargi
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - OverviewAshita Agrawal
 
Process management os concept
Process management os conceptProcess management os concept
Process management os conceptpriyadeosarkar91
 
Operating Systems
Operating SystemsOperating Systems
Operating SystemsMohamed Loey
 
File management
File managementFile management
File managementVishal Singh
 
Computer software
Computer softwareComputer software
Computer softwareBurhan Ahmed
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and DesignAamir Abbas
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to ServerAnacrissa Soriano
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systemsrahmanitayulia
 
Network operating systems
Network operating systems Network operating systems
Network operating systems Sachin Awasthi
 

What's hot (20)

Operating systems Basics
Operating systems BasicsOperating systems Basics
Operating systems Basics
 
File management ppt
File management pptFile management ppt
File management ppt
 
Operating system overview concepts ppt
Operating system overview concepts pptOperating system overview concepts ppt
Operating system overview concepts ppt
 
Social & professional issues in IT
Social & professional issues in ITSocial & professional issues in IT
Social & professional issues in IT
 
Systems Administration
Systems AdministrationSystems Administration
Systems Administration
 
Future operating system
Future operating systemFuture operating system
Future operating system
 
Operating systems
Operating systemsOperating systems
Operating systems
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
An introduction to networking
An introduction to networkingAn introduction to networking
An introduction to networking
 
Linux operating system - Overview
Linux operating system - OverviewLinux operating system - Overview
Linux operating system - Overview
 
Process management os concept
Process management os conceptProcess management os concept
Process management os concept
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
File management
File managementFile management
File management
 
operating system structure
operating system structureoperating system structure
operating system structure
 
Internet Protocols
Internet ProtocolsInternet Protocols
Internet Protocols
 
Computer software
Computer softwareComputer software
Computer software
 
System Analysis and Design
System Analysis and DesignSystem Analysis and Design
System Analysis and Design
 
Introduction to Server
Introduction to ServerIntroduction to Server
Introduction to Server
 
Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
 
Network operating systems
Network operating systems Network operating systems
Network operating systems
 

Similar to SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY

Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptxLINDYLGERAL
 
CSC1100 - Chapter06 - Operating System & Utility Programs
CSC1100 - Chapter06 - Operating System & Utility ProgramsCSC1100 - Chapter06 - Operating System & Utility Programs
CSC1100 - Chapter06 - Operating System & Utility ProgramsYhal Htet Aung
 
Operating Systems
Operating SystemsOperating Systems
Operating SystemsDasun Hegoda
 
Lecture - 1.pdf
Lecture - 1.pdfLecture - 1.pdf
Lecture - 1.pdfruhama12
 
operatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptxoperatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptxkrishnajoshi70
 
Lec9chap8f04
Lec9chap8f04Lec9chap8f04
Lec9chap8f04screaminc
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptKirti Verma
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Project Student
 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating systemAkshay Ithape
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 
Introduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.pptIntroduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.pptminaltmv
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdfGanesh198271
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating systemAnil Dharmapuri
 
Computer system software
Computer system softwareComputer system software
Computer system softwareMozaSaid
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptxAshmitKashyap1
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptxAshmitKashyap1
 
ch1-introduction-to-os.ppt
ch1-introduction-to-os.pptch1-introduction-to-os.ppt
ch1-introduction-to-os.pptJohnColaco1
 

Similar to SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY (20)

Reformat PPT.pptx
Reformat PPT.pptxReformat PPT.pptx
Reformat PPT.pptx
 
CSC1100 - Chapter06 - Operating System & Utility Programs
CSC1100 - Chapter06 - Operating System & Utility ProgramsCSC1100 - Chapter06 - Operating System & Utility Programs
CSC1100 - Chapter06 - Operating System & Utility Programs
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
Chapter 5.0
Chapter 5.0Chapter 5.0
Chapter 5.0
 
Lecture - 1.pdf
Lecture - 1.pdfLecture - 1.pdf
Lecture - 1.pdf
 
operatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptxoperatinndnd jdj jjrg-system-1(1) (1).pptx
operatinndnd jdj jjrg-system-1(1) (1).pptx
 
Lec9chap8f04
Lec9chap8f04Lec9chap8f04
Lec9chap8f04
 
L-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.pptL-3 BCE OS FINAL.ppt
L-3 BCE OS FINAL.ppt
 
Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...Operating System (Scheduling, Input and Output Management, Memory Management,...
Operating System (Scheduling, Input and Output Management, Memory Management,...
 
CH01.pdf
CH01.pdfCH01.pdf
CH01.pdf
 
Introduction to operating system
Introduction to operating systemIntroduction to operating system
Introduction to operating system
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Clifford sugerman
Clifford sugermanClifford sugerman
Clifford sugerman
 
Introduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.pptIntroduction and fundamentals of Operating System.ppt
Introduction and fundamentals of Operating System.ppt
 
operating system1.pdf
operating system1.pdfoperating system1.pdf
operating system1.pdf
 
Principles of operating system
Principles of operating systemPrinciples of operating system
Principles of operating system
 
Computer system software
Computer system softwareComputer system software
Computer system software
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
Operating system.pptx
Operating system.pptxOperating system.pptx
Operating system.pptx
 
ch1-introduction-to-os.ppt
ch1-introduction-to-os.pptch1-introduction-to-os.ppt
ch1-introduction-to-os.ppt
 

More from GOKUL SREE

UG_CS_DEPT_PRESENTATION.pptx
UG_CS_DEPT_PRESENTATION.pptxUG_CS_DEPT_PRESENTATION.pptx
UG_CS_DEPT_PRESENTATION.pptxGOKUL SREE
 
college quiz-1.pptx
college quiz-1.pptxcollege quiz-1.pptx
college quiz-1.pptxGOKUL SREE
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYGOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY GOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY GOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY GOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY GOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY GOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY GOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY GOKUL SREE
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITYDOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITYGOKUL SREE
 

More from GOKUL SREE (14)

UG_CS_DEPT_PRESENTATION.pptx
UG_CS_DEPT_PRESENTATION.pptxUG_CS_DEPT_PRESENTATION.pptx
UG_CS_DEPT_PRESENTATION.pptx
 
college quiz-1.pptx
college quiz-1.pptxcollege quiz-1.pptx
college quiz-1.pptx
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITYSYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITYDOT NET LAB PROGRAM PERIYAR UNIVERSITY
DOT NET LAB PROGRAM PERIYAR UNIVERSITY
 

Recently uploaded

Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...
HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...
HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...Nguyen Thanh Tu Collection
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 

Recently uploaded (20)

Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...
HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...
HáģŒC TáģT TIáēžNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIáēžT - Cáēĸ NĂ...
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 

SYSTEM ADMINISTRATION AND MAINTENANCE NOTES PERIYAR UNIVERSITY

  • 1. VG-PRUCAS-PENNAGARAM Fundamental Operating Systems The Purpose of an Operating System ī‚ˇ The operating system (OS) controls almost all functions on a computer. ī‚ˇ All computers rely on an operating system (OS) to provide the interface for interaction between users, applications, and hardware. ī‚ˇ The operating system boots the computer and manages the file system. Characteristics of Operating Systems ī‚ˇ The operating system has four main functions: o Control hardware access o Manage files and folders o Provide user interface o Manage applications ī‚ˇ Control hardware access o The operating system manages the interaction between applications and the hardware o OS automatically discovers and configures (Plug and Play)PnP hardware o To communicate with the hardware, the operating system installs a device driver for each hardware component. o A device driver is a small program written by the hardware manufacturer ī‚ˇ File and folder management o The operating system creates a file structure on the hard disk drive to allow data to be stored o A file is a block of related data o Program and data files are grouped together in a directory ī‚ˇ User interface ī‚ˇ The operating system enables the user to interact with software and hardware. There are two types of user interfaces: o Command line interface (CLI) o Graphical user interface (GUI) ī‚ˇ Application management ī‚ˇ The operating system locates an application and loads it into the RAM of the computer. ī‚ˇ Applications are software programs, such as word processors, databases, spreadsheets,games, and many other applications. ī‚ˇ An application programming interface (API) is a set of guidelines used by programmers to ensure that the application they are developing is compatible with an operating system. ī‚ˇ Two examples of APIs are: o Open Graphics Library (OpenGL) o DirectX Operating Systems concepts To understand the operating system, it is important to understand some basic terms. The following terms are often used when comparing operating systems: ī‚ˇ Multi-user – Two or more users can work with programs and share peripheral devices, such as printers, at the same time.
  • 2. VG-PRUCAS-PENNAGARAM ī‚ˇ Multi-tasking – The computer is capable of operating multiple applications at the same time. ī‚ˇ Multi-processing – The computer can have two or more central processing units (CPUs) that programs share. ī‚ˇ Multi-threading – A program can be broken into smaller parts that can be loaded as needed by the operating system. ī‚ˇ Multi-threading allows individual programs to be multi-tasked. Modes of Operation ī‚ˇ All modern CPUs can run in different modes of operation ī‚ˇ The mode of operation refers to the capability of the CPU and the operating environment. ī‚ˇ The four common modes of operation are as follows: o Real mode o Protected mode o Virtual real mode o Compatible mode Real Mode ī‚ˇ Executes only one program at a time ī‚ˇ Addresses only 1 MB of system memory at a time ī‚ˇ Directly accesses memory and hardware ī‚ˇ Subject to crashes ī‚ˇ Available to all modern processors ī‚ˇ Only used by DOS and DOS applications ī‚ˇ Program Code directly controls PC hardware. ī‚ˇ PC hardware can be interrupted by bad code. Protected Mode ī‚ˇ Has access to all memory ī‚ˇ Can manage multiple programs simultaneously ī‚ˇ Allows the system to use virtual memory ī‚ˇ Provides 32-bit access to memory, drivers, and I/O transfers ī‚ˇ Each program is assigned a space in memory ī‚ˇ Computer is protected from program errors Virtual Real Mode ī‚ˇ Allows a real-mode application to run within a protected-mode operating system ī‚ˇ Creates virtual machines for each program that runs in real mode ī‚ˇ Each virtual machine receives 1 MB of memory and access to hardware ī‚ˇ In the event of a program error, only the virtual machine is affected ī‚ˇ OS provides virtual machine to host the code and protect the PC Compatibility Mode ī‚ˇ Compatibility mode creates the environment of an earlier operating system for applications that are not compatible with the current operating system. Compare Operating Systems There are two distinct types of operating systems:
  • 3. VG-PRUCAS-PENNAGARAM ī‚ˇ Desktop operating systems: A desktop operating system is intended for use in a small office/home office (SOHO) with a limited number of users. ī‚ˇ Network operating systems: A network operating system (NOS) is designed for a corporate environment serving multiple users with a wide range of needs. Desktop Operating System o Supports a single user o Runs single-user applications o Shares files and folders o Shares peripherals o Used on a small network ī‚ˇ Desktop operating systems: o Microsoft Windows: Windows XP o Macintosh: Mac OS X o Linux: Fedora, Ubuntu, and others o UNIX Network Operating Systems (NOS) o Supports multiple users o Runs multi-user applications o Is robust and redundant o Provides increased security o Used on a network o Provides increased security compared to desktop operating systems ī‚ˇ Common NOS include: o Novell Netware o Microsoft Windows Server o Linux o UNIX Determine Proper Operating System ī‚ˇ To select the proper operating system: o Create an accurate profile of our customer by analyzing the daily, weekly, and monthly computer activities o Select appropriate software and hardware to satisfy What Does Our Customer Require? ī‚ˇ Office applications o word processing, spreadsheets, or presentation software ī‚ˇ Graphics applications o Photoshop or Illustrator ī‚ˇ Animation applications o Flash ī‚ˇ Business applications o accounting, contact management, sales tracking or database
  • 4. VG-PRUCAS-PENNAGARAM Identify Minimum Hardware Requirements ī‚ˇ Customer may need to upgrade or purchase additional hardware to support the required applications and OS. ī‚ˇ A cost analysis will indicate if purchasing new equipment is a better idea than upgrading. ī‚ˇ Common hardware upgrades: o RAM capacity o Hard drive size o Processor speed o Video card memory and speed Hardware Compatibility List (HCL) ī‚ˇ Most operating systems have an HCL. ī‚ˇ HCLs can be found on the manufacturer's website. ī‚ˇ HCL includes list of hardware that is known to work with the operating system. Installing the Operating System ī‚ˇ Reasons to perform a clean installation of an OS: o When a computer is passed from one employee to another
  • 5. VG-PRUCAS-PENNAGARAM o When the operating system is corrupted o When a new replacement hard drive is installed in a computer ī‚ˇ Before performing a clean installation: o Back up all data first o Explain to the customer that existing data will be erased o Confirm that all needed data has been successfully transferred Hard Drive Setup Procedures Operating system setup methods: o Install an OS over a network from a server o Install from a copy of the OS files stored on the hard drive o Install from OS files stored on CDs or DVDs ī‚ˇ Partitioning and Formatting o Hard drive must be logically divided (partitioned) o File system must be created on the hard drive o During the installation phase, most operating systems will automatically partition and format the hard drive ī‚ˇ The following terms are used when referring to hard drive setup: o Primary partition: This partition is usually the first partition. A primary partition cannot be subdivided into smaller sections. There can be up to four partitions per hard drive. o Active partition: This partition is the partition used by the operating system to boot the computer. Only one primary partition can be marked active. o Extended partition: This partition normally uses the remaining free space on a hard drive or takes the place of a primary partition. There can be only one extended partition per hard drive, and it can be subdivided into smaller sections called logical drives. o Logical drive: This drive is a section of an extended partition that can be used to separate information for administrative purposes. o Formatting: This process prepares a file system in a partition for files to be stored. o Cluster: A cluster is also called a file allocation unit. It is the smallest unit of space used for storing data. o Track: A track is one complete circle of data on one side of a hard drive platter. A track is broken into groups of 512 bytes, called sectors. o Cylinder: A cylinder is a stack of tracks lined up one on top of another to form a cylinder shape. o Drive mapping: Drive mapping is a letter assigned to a physical or logical drive Prepare the Hard Drive ī‚ˇ The first portion of the installation process deals with formatting and partitioning the hard drive. ī‚ˇ The second portion prepares the disk to accept the file system. ī‚ˇ The file system provides the directory structure that organizes the user's operating system, application, configuration, and data files. ī‚ˇ Examples of file systems: o The FAT32 file system
  • 6. VG-PRUCAS-PENNAGARAM o The New Technology File System (NTFS) Install the Operating System ī‚ˇ During the Windows XP installation the user must provide: o Define currency and numerals o Text input language o Name of user o Name of company o Product key o Computer name o Administrator password o Date and time settings o Network settings o Domain or workgroup information Create Administrator Account ī‚ˇ Setup creates the administrator account with the user name “administrator” o Change this name to keep the administrator account secure o Only use the administrator account occasionally for critical system changes ī‚ˇ Create a fictitious user account to use as a template ī‚ˇ Use secure passwords o These should be a minimum of 7 characters, containing at least one of each (letter, number, and symbol) Complete the Installation ī‚ˇ When Windows XP installation completes: o Computer will reboot
  • 7. VG-PRUCAS-PENNAGARAM o Log in for the first time o Register Windows XP and verify that we are using a legal copy of the OS ī‚ˇ Verification enables we to download patches and service packs ī‚ˇ Use Microsoft Update Manager to scan for new software and to: o Install all service packs o Install all patches Check Device Manager for Conflicts ī‚ˇ Look for warning icons (yellow exclamation points) ī‚ˇ Double-click to learn about the problem ī‚ˇ Click the plus (+) sign to expand the category ī‚ˇ May be able to ignore an error Custom Installation Options ī‚ˇ With Microsoft System Preparation ī‚ˇ Follow these steps for disk cloning: o Create a master installation on one computer o Run Sysprep o Create a disk image of the configured computer using third-party disk-cloning software o Copy the disk image onto a server ī‚ˇ When the destination computer is booted, o A shortened version of the Windows setup program runs o Setup configures only user-specific and computer-specific settings o An answer file provides data normally required during set up The Boot Sequence for Windows XP 1. Power On Self Test (POST) 2. POST for each adapter card that has a BIOS 3. BIOS reads the Master Boot Record (MBR) 4. MBR takes over control of the boot process and starts NT Loader (NTLDR) 5. NTLDR reads the BOOT.INI file to know which OS to load and where to find the OS on the boot partition 6. NTLDR uses NTDETECT.COM to detect any installed hardware 7. NTLDR loads the NTOSKRNL.EXE file and HAL.DLL 8. NTLDR reads the registry files and loads device drivers 9. NTOSKRNL.EXE starts the WINLOGON.EXE program and displays the Windows login screen NTLDR and the Windows Boot Menu ī‚ˇ If more than one OS is present on the disk, BOOT.INI gives the user a chance to select which to use. ī‚ˇ Otherwise: o NTLDR runs NTDETECT.COM to get information about installed hardware o NTLDR then uses the path specified in the BOOT.INI to find the boot partition o NTLDR loads two files that make up the core of XP: NTOSKRNL.EXE and HAL.DLL o NTLDR reads the Registry files, chooses a hardware profile, and loads device drivers.
  • 8. VG-PRUCAS-PENNAGARAM The Windows Registry ī‚ˇ The Windows registry is a hierarchal database used by the Windows operating system to store information and settings for hardware, software, users, and preferences on a system ī‚ˇ Recognized by distinctive names, beginning with HKEY_ ī‚ˇ Changes to the Control Panel settings, File Associations, System Policies, or installed software are stored in the registry ī‚ˇ Each user has their own section of the registry ī‚ˇ The Windows logon process uses the registry to set the system to the state that it was in the last time the user logged in ī‚ˇ Following are the some of The Windows Registry Files The NT Kernel ī‚ˇ The NT kernel, the heart of the Windows operating system, takes over. The name of this file is ntoskrnl.exe. Manipulating Operating System Files ī‚ˇ MSCONFIG: After we have installed Windows XP, we can use MSCONFIG for post-installation modifications: o This boot configuration utility allows we to set programs that will run at startup, and to edit configuration files ī‚ˇ REGEDIT: The registry is a database that contains information and settings for all of the hardware, software, users and preferences. REGEDIT allows users to edit the registry. Startup Modes ī‚ˇ Pressing the F8 key during the boot process opens the Windows Advanced Startup Options menu, which allows we to select how to boot Windows. o Safe Mode – Starts Windows but only loads drivers for basic components, such as the keyboard and display. o Safe Mode with Networking Support – Starts Windows identically to Safe Mode and also loads the drivers for network components.
  • 9. VG-PRUCAS-PENNAGARAM o Safe Mode with Command Prompt – Starts Windows and loads the command prompt instead of the GUI interface. o Last Known Good Configuration – Enables a user to load the configurations settings of Windows that was used the last time that Windows successfully started. It does this by accessing a copy of the registry that is created for this purpose. Describing Directory Structures ī‚ˇ Windows file system naming conventions: o Maximum of 255 characters may be used o Characters such as a period (.) or a slash ( /) are not allowed o An extension of three or four letters is added to the filename to identify the file type o Filenames are not case sensitive ī‚ˇ Windows filename extension examples: o .doc -Microsoft Word o .txt -ASCII text only o .jpg -graphics format o .ppt -Microsoft PowerPoint o .zip -compression format ī‚ˇ Each file has a set of attributes that control how the file may be viewed or altered. ī‚ˇ The following are the most common file attributes: o R -The file is read-only o A -The file will be archived the next backup o S -The file is marked as a system file and a warning is given if an attempt is made to delete or modify the file o H -The file is hidden in the directory display The ATTRIB Command ī‚ˇ we can view the filenames, extensions, and attributes by entering a DOS window (choose Start > Run > cmd) and typing the ATTRIB command NTFS and FAT32 ī‚ˇ FAT32 is used where files need to be accessed by multiple versions of Windows. FAT32 is not as secure as NTFS ī‚ˇ NTFS can support more and larger files than FAT32, and provides more flexible security features for folders, files, and sizes ī‚ˇ Partitions can be converted from FAT32 to NTFS using the CONVERT.EXE utility, but not in the reverse direction Navigate a GUI (windows) ī‚ˇ The operating system provides a user interface that allows us to interact with the computer. ī‚ˇ There are two methods that we can use to navigate the file system and run applications within an operating system: o A GUI provides graphical representations of all the files, folders, and programs on a computer. o A command-line interface (CLI) is text based. we must type commands to manipulate files and execute programs
  • 10. VG-PRUCAS-PENNAGARAM Manipulate Items on the Desktop ī‚ˇ A desktop on a computer is a graphical representation of a workspace. ī‚ˇ The desktop has icons, toolbars, and menus to manipulate files. ī‚ˇ The desktop can be customized with images, sounds, and colors to provide a more personalized look and feel. Desktop Properties ī‚ˇ To customize the GUI of our desktop, right-click the desktop and choose Properties, ī‚ˇ The Display Properties menu has five tabs: Themes, Desktop, Screen Saver, Appearance, and Settings. Click any of these tabs to customize our display settings Desktop Items ī‚ˇ There are several items on the desktop that can be customized, such as the taskbar and Recycle Bin. ī‚ˇ To customize any item, right-click the item and then choose Properties. The Start Menu ī‚ˇ On the desktop, the Start menu is accessed by clicking the Start button. ī‚ˇ The Start menu, displays all the applications installed in the computer, a list of recently opened documents, and a listing of other elements, such as a search feature, help center, and system settings. ī‚ˇ The Start menu can also be customized to two styles, XP and Classic My Computer ī‚ˇ To access the various drives installed in the computer, double-click the My Computer icon that appears on the desktop. ī‚ˇ To customize certain settings, right-click My Computer and choose Properties ī‚ˇ there are several settings that can be customized: o Computer name o Hardware settings o Virtual memory o Automatic updates o Remote access ī‚ˇ Files can also be moved and copied using My Computer Launching Applications ī‚ˇ Applications can be launched in several ways: o Click the application on the Start menu o Double-click the application shortcut icon on the desktop o Double-click the application executable file in My Computer o Launch the application from the Run window or command line My Network Place ī‚ˇ To view and configure network connections, right-click the My Network Places icon. o Connect to or disconnect from a network drive o Right-click Properties to configure existing network connections, such as a wired or wireless LAN connection Explore Control Panel Applets ī‚ˇ Windows centralizes the settings for many features that control the behavior and appearance of the computer. These settings are categorized in Control Panel applets
  • 11. VG-PRUCAS-PENNAGARAM Display Settings ī‚ˇ Change the resolution and color quality ī‚ˇ Change wallpaper, screen saver, power settings, and other options, by clicking the Advanced button Explore Administrative Tools ī‚ˇ The following sections cover some of the most common administrative utilities for troubleshooting, managing, and maintaining Windows XP, including o Device Manager o Task Manager o Event Viewer o Remote Desktop o Performance Settings Device Manager ī‚ˇ Used to view settings for devices in the computer ī‚ˇ To view the system resources in the Device Manager, use the following path: Start > Control Panel > System > Hardware > Device Manager An exclamation mark indicates a problem with a device Task Manager ī‚ˇ View all applications that are currently running ī‚ˇ Close any applications that have stopped responding ī‚ˇ Monitor the performance of the CPU and virtual memory ī‚ˇ View all processes that are currently running ī‚ˇ View information about the network connections ī‚ˇ To view information in the Task Manager, press Ctrl-Alt-Delete and then select Task Manager or right-click the taskbar and select Task Manager. Event Viewer and Remote Desktop Event Viewer ī‚ˇ Logs a history of events regarding applications, security, and the system. ī‚ˇ These log files are a valuable troubleshooting tool. ī‚ˇ To access the Event Viewer, choose Administrative Tools > Event Viewer from the Control Panel. Remote Desktop ī‚ˇ Allows one computer to remotely take control of another computer. ī‚ˇ This troubleshooting feature is only available with Windows XP Professional. ī‚ˇ To access the Remote Desktop,use the following path:Start > All Programs > Accessories > Communications > Remote Desktop Connection Performance Settings ī‚ˇ To enhance the performance of the operating system, we can change some of the settings that our computer uses, such as virtual memory configuration settings, ī‚ˇ To change the virtual memory setting, use the following path:Start > Control Panel > System > Advanced > Performance area > Settings button >Advanced tab > Virtual memory section > Change
  • 12. VG-PRUCAS-PENNAGARAM Install, Navigate, and Uninstall an Application ī‚ˇ Most applications use an automatic installation process when an application ī‚ˇ Microsoft recommends that users always use the Add or Remove Programs utility,when installing or removing applications ī‚ˇ To open the Add or Remove Programs applet, use the following path:Start > Control Panel > Add or Remove Programs UPGRADING AN OPERATING SYSTEM ī‚ˇ Before upgrading the operating system, check the minimum requirements of the new operating system ī‚ˇ Check the HCL to ensure that the hardware is compatible with the new operating system. ī‚ˇ Back up all data before upgrading the operating system in case there is a problem with the installation Upgrading the Windows XP operating system 1. Insert the Windows XP CD. Select Start > Run. 2. In the Run box, where D is the drive letter for the CDROM, type D:i386winnt32 and press Enter. The Welcome to the Windows XP Setup Wizard displays. 3. Choose Upgrade to Windows XP and click Next. The License Agreement page displays. 4. Read the license agreement and click the button to accept this agreement. 5. Click Next. The Upgrading to the Windows XP NTFS File System page displays. 6. Follow the prompts and complete the upgrade. When the install is complete, the computer will restart. Preventive Maintenance technique ī‚ˇ Components of a preventive maintenance plan: o Updates to the operating system and applications o Updates to anti-virus and other protective software o Hard drive error checking o Hard drive backup o Hard drive defragmentation SCHEDULE TASKS ī‚ˇ Most preventive maintenance applications can be set to run automatically according to a schedule. ī‚ˇ Windows has the following utilities that will launch tasks when we schedule them: o The DOS AT command launches tasks at a specified time using the command-line interface (choose Start > Run > cmd) and type AT /? o The Windows Task Scheduler launches tasks at a specified time using a graphical user interface. Start > All Programs > Accessories > System Tools > Scheduled Tasks. System Utilities ī‚ˇ There are several utilities included with DOS and Windows that help maintain system integrity. ī‚ˇ Two system utilities that are useful tools for preventive maintenance are o ScanDisk or CHKDSK: ScanDisk (Windows 2000) and CHKDSK (Windows XP) check the integrity of files and folders and scan the hard disk surface for physical errors. o Defrag: As files increase in size, some data is written to the next available space on the disk. Defrag gathers the noncontiguous data into one place, making files run faster.
  • 13. VG-PRUCAS-PENNAGARAM ī‚ˇ We can access both of these utilities by using this path: Start > All Programs > Accessories > System Tools > Disk Defragmenter Automatic Updates ī‚ˇ An automatic update service scans the system for needed updates, and recommends what should be downloaded and installed. ī‚ˇ Automatic update services can setup to download and install updates as soon as they are available or as required, and install them when the computer is next rebooted. ī‚ˇ The Microsoft Update Wizard is available at this path: Start > Control Panel > System > Automatic Updates Restore Point ī‚ˇ An update can sometimes cause serious problems. Perhaps an older program is in the system that is not compatible with the current operating system ī‚ˇ Windows System Restore is the solution for this problem. Windows XP can create an image of current computer settings, called a restore point. ī‚ˇ Then, if the computer crashes or an update causes system problems, the computer can roll back to a previous configuration. ī‚ˇ To restore or create a restore point, use the following path: Start > All Programs > Accessories > System Tools > System Restore ERD and ASR ī‚ˇ Windows 2000 offers the ability to create an emergency repair disk (ERD) that saves critical boot files and configuration information necessary to troubleshoot problems in Windows. ī‚ˇ Windows XP offers the same features with the Automated System Recovery(ASR) wizard. BACKUP THE HARD DRIVE ī‚ˇ Backup tools allow the recovery of data. ī‚ˇ There are several different types of backup. Normal Backup ī‚ˇ A normal backup is also called a full backup. During a normal backup, all selected files on the disk are archived to the backup medium. Copy Backup ī‚ˇ A copy backup will copy all selected files. It does not mark the files as having been archived. Incremental Backup ī‚ˇ An incremental backup procedure backs up all the files and folders that have been created or modified since either the last normal or incremental backup. ī‚ˇ It marks the files as having been archived by clearing the archive bit. Differential Backup ī‚ˇ A differential backup backs up all the files and folders that have been created or modified since either the last normal backup or the last incremental backup. ī‚ˇ The differential backup does not mark the files as having been archived. Daily Backup ī‚ˇ Daily backups only back up the files that are modified on the day of the backup. Backup Media ī‚ˇ There are many types of backup media available for computers: o Tape drives are devices that are used for data backup on a network server drive. Tapes drives are an inexpensive way to store a lot of data.
  • 14. VG-PRUCAS-PENNAGARAM o The Digital Audio Tape (DAT) tape standard uses 4-mm digital audiotapes to store data in the Digital Data Storage (DSS) format. o Digital Linear Tape (DLT) technology offers high-capacity and relatively high-speed tape backup capabilities. o USB flash memory can hold hundreds of times the data that a floppy disk can hold.USB flash memory devices are available in many capacities and offer better transfer rates than tape devices. Troubleshooting Process ī‚ˇ Step 1 Gather data from the customer ī‚ˇ Step 2 Verify the obvious issues ī‚ˇ Step 3 Try quick solutions first ī‚ˇ Step 4 Gather data from the computer ī‚ˇ Step 5 Evaluate the problem and implement the solution ī‚ˇ Step 6 Close with the customer 1. Gather Data from the Customer ī‚ˇ Customer information o Company name, contact name, address, phone number ī‚ˇ Computer configuration o Operating system, patches and updates, network environment, connection type ī‚ˇ Use a work order to collect information ī‚ˇ Description of problem o Open-ended questions ī‚§ What were we doing when the problem was identified? o Closed-ended questions ī‚§ Are we currently logged into our network? 2. Verify the Obvious Issues ī‚ˇ Examine the most obvious causes of a problem. o Is the caps lock key set to ON? o Is there a non-bootable disk in the floppy drive? o Are the drive settings and boot order configured correctly in BIOS? o Can we log on as another user? o Was the computer turned off without being shut down properly? o Has the password changed? o Does the monitor have power? o Does the display have the correct settings? 3. Try Quick Solutions First ī‚ˇ Use the Last Known Good Configuration settings ī‚ˇ Enter Safe Mode to troubleshoot video problems ī‚ˇ Uninstall an application that was recently added ī‚ˇ Roll back the system using a System Restore point ī‚ˇ Examine the Device Manager for device conflicts ī‚ˇ Run cleanmgr to clean up temp files
  • 15. VG-PRUCAS-PENNAGARAM ī‚ˇ Run chkdsk/f to repair problems with the hard drive ī‚ˇ Run defrag to speed up the hard drive ī‚ˇ Reboot the computer ī‚ˇ Login as a different user 4. Gather Data from the Computer ī‚ˇ Examine system files. ī‚ˇ Run diagnostic software. ī‚ˇ Refer to the computer user manual or BIOS website for the meaning of beep codes. ī‚ˇ Examine the event logs to determine the cause of computer problems. 5. Evaluate Problem & Implement Solution ī‚ˇ We may need to conduct further research ī‚ˇ Refer to repair manuals ī‚ˇ Study the product documentation ī‚ˇ Visit the manufacturer’s website ī‚ˇ Consult repair journals ī‚ˇ Talk to technicians who may have repaired similar problems. ī‚ˇ Implement the most likely solution first ī‚ˇ Return the computer to the original state before trying the next solution ī‚ˇ It may be necessary to test many potential solutions before the problem is resolved 6. Close with the Customer ī‚ˇ When we are confident that the problem is resolved: ī‚ˇ Document the customer information, problem description, and steps to resolve the issue in the work order. ī‚ˇ Explain to the customer how we solved the problem . ī‚ˇ Let the customer verify that the problem has been solved. ī‚ˇ Complete all documentation including sales orders, time logs, and receipts. ī‚ˇ Complete the work order. ī‚ˇ Update the repair journal. We can use the notes from the journal for future reference.