SlideShare a Scribd company logo
1 of 72
© 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1
Chapter 5:
Operating Systems
IT Essentials 5.0
Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 Objectives
 5.1 Explain the characteristics and basic functions of
modern operating systems
 5.1 Describe and compare types of operating systems
to include purpose, limitations, and compatibilities
 5.1 Determine operating system based on customer
needs
 5.2 Install an operating system
 5.3 Navigate a GUI (Windows)
 5.4 Explain the advantages of Virtualization and install
Virtual PC
Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 Objectives (continued)
 5.5 Identify and apply common preventive maintenance
techniques for operating systems
 5.6 Troubleshoot operating systems
Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Purpose of an Operating System
 The operating system (OS) controls almost all
functions on a computer.
 In this chapter, you will learn about the components,
functions, and terminology related to the Windows 7,
Windows Vista , and Windows XP operating systems.
Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Characteristics of an Operating System
 Multi-user – Two or more users have individual accounts that
allow them to work with programs and peripheral devices at the
same time.
 Multitasking – The computer is capable of operating multiple
applications at the same time.
 Multiprocessing – The operating system can support two or
more CPUs.
 Multithreading – A program can be broken into smaller parts
that are loaded as needed by the operating system. Multithreading
allows individual programs to be multitasked.
Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Basic Function of an Operating System
 All computers rely on an operating system (OS) to
provide the interface for interaction between users,
applications, and hardware.
 The operating system boots the computer and
manages the file system.
 The operating system has four main roles:
• Control hardware access
• Manage files and folders
• Provide user interface
• Manage applications
Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Processor Architecture
 32-bit Windows Operating System and x86 Processor
Architecture
• Capable of addressing 4 GB of RAM
• x86 uses a Complex Instruction Set Computer (CISC)
• x86 processors use fewer registers than x64 processors
 64-bit Windows Operating System and x64 Processor
Architecture
• Capable of addressing 128+ GB of RAM
• Enhanced performance for memory management
• Additional security features
• x64 architecture is backward compatible with x86
• Process much more complex instructions at a much higher rate
Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
32-bit and 64-bit Compatibility in
Windows OS
Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of Operating Systems
Desktop Operating
System
• Supports a single user
• Runs single-user
applications
• Shares files and folders
• Shares peripherals
• Used on a small network
• Supports multiple users
• Runs multi-user
applications
• Robust and redundant
• Provides increased security
• Used on a network
Network Operating
System
Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of Operating Systems
 Desktop operating systems:
• Microsoft Windows: Windows 7
• Macintosh: Mac OS X
• Linux
• UNIX
 A desktop OS has the following
characteristics:
• Supports a single user
• Runs single-user applications
• Shares files and folders on a small network
with limited security
Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Network Operating Systems (NOS)
 Common NOS include:
• Microsoft Windows Server
• Linux
• UNIX
• Mac OS X Server
 NOS has the following characteristics:
• Supports multiple users
• Runs multi-user applications
• Robust and redundant
• Provides increased security compared to desktop operating
systems
Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Customer Requirements for an OS
 To select the proper operating system for a
customer first determine:
•Budget constraints
•Compatibility with current hardware
•Compatibility with new hardware
•How the computers will be used
•Compatibility with existing applications
•Types of new applications to be used
Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Identify Minimum Hardware Requirements
 Customer may need to upgrade or purchase additional
hardware to support the required applications and OS.
 A cost analysis will indicate if purchasing new
equipment is a better idea than upgrading.
 Possible hardware upgrades:
•RAM capacity
•Hard drive size
•CPU
•Video card memory and speed
•Motherboard
Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hardware Compatibility
 Most operating systems have an HCL.
 HCLs can be found on the manufacturer's website.
 HCL includes list of hardware that is known to work with
the operating system.
 Use Microsoft Compatibility Center for Windows 7 and
Vista.
Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Operating System Upgrades
 Operating systems must be upgraded periodically.
• To remain compatible with the latest hardware and software.
• Because support for older OS is eventually withdrawn.
 Ensure that the new OS is compatible with the computer.
• Use Microsoft Upgrade Advisor to scan the system for incompatibility
issues before upgrading. Upgrade Advisor is free and downloadable
from the Microsoft Windows website.
 Backup all data prior to beginning the upgrade.
Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Data Migration
One of the following tools can be used to migrate data
and settings:
 User State Migration Tool migrates all user files and
settings to the new OS.
 Windows Easy Transfer migrates personal files and
settings when switching from an old computer to new.
Note: Windows Easy Transfer replaced the Windows
XP File and Settings Transfer Wizard.
Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Installing the Operating System
 Reasons to perform a clean installation of an OS:
•When a computer is passed from one employee to another.
•When the operating system is corrupted.
•When the primary hard drive is replaced in a computer .
 Before performing a clean installation:
•Back up all data first.
•Explain to the customer that existing data will be erased.
•Confirm that all needed data has been successfully
transferred.
Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hard Drive Setup Procedures
 Operating system setup methods:
•Install an OS over a network from a server.
•Install from OS files stored on CDs or DVDs.
 Partitioning and Formatting:
•Hard drive must be logically divided (partitioned).
•File system must be created on the hard drive.
•During the installation phase, most operating
systems will automatically partition and format the
hard drive.
Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Hard Drive Formatting
 The first portion of the installation process deals with
formatting and partitioning the hard drive.
 The second portion prepares the disk to accept the file
system.
 The file system provides the directory structure that
organizes the user's operating system, application,
configuration, and data files.
 Examples of file systems:
•The New Technology File System (NTFS) - Supports
partition sizes up to 16 exabytes
•The FAT32 file system - Supports partition sizes up to 2 TB.
Used by Windows XP and earlier OS versions.
Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Install the Operating System
 When a computer boots up with the Windows installation CD, the
Windows 7 installation process starts with three options:
• Install now - Sets up and installs the Windows 7 OS.
• What to know before installing Windows - Opens Help.
• Repair your computer - Opens the System Recovery Options.
 Under Install now three options are available:
• Upgrade - Upgrades Windows but keeps your current files, settings,
and programs. You can use this option to repair an installation.
• Custom (advanced) - Installs a clean copy of Windows in your choice
of location and allows you to change disks and partitions. It is also
known as a clean installation.
• Quit - Exits Setup.
Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Account Creation
 Windows 7 has three types of user accounts:
Administrator, Standard, and Guest.
 The Administrator Account must be created
when Windows 7 is installed.
 To create or remove a user account in Windows 7 use the
following path :
Start > Control Panel > User Accounts > Add or
remove user accounts
Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Complete the Installation
 When Windows 7 installation
completes:
•Computer will reboot
•Prompts to create user account
•Register Windows 7 and verify that you
are using a legal copy of the OS
•Verification enables you to download
patches and service packs
 Use Microsoft Update Manager to
scan for new software.
Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Custom Installation Options – Disk Cloning
 Follow these steps for disk cloning:
1. Create a master installation on one computer.
2. Run Sysprep.
3. Create a disk image of the configured computer using third-
party disk-cloning software.
4. Copy the disk image onto a server.
 When the destination computer is booted:
• A shortened version of the Windows setup program runs.
• Setup installs drivers, creates user accounts, and
configures network settings.
With Microsoft System Preparation
Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Custom Installation Options
 Windows 7 has several different types of custom
installations.
•Network Installation - Requires all setup files to be copied to a
network server.
•Preboot Execution Environment (PXE) Installation - Uses a
PXE boot program and a client’s network card to access the
setup files.
•Unattended Installation - Uses a network distribution point
that uses an answer file.
•Image-based Installation - Uses Sysprep and a disk-imaging
program, that copies an image of the OS directly to the hard
drive with no user intervention.
•Remote Installation - Downloads the installation across the
network.
Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
System Recovery Options
 Repair Disc- For Windows 7. Use the system repair disc to
boot the computer
 System Image Recovery – For Windows 7. It allows users
to back up the contents of their hard drive, including
personal files and settings.
 Factory Recovery Partition – Some computers with
Windows 7 preinstalled from the factory contain a hidden
recovery partition with an image of the bootable partition.
 Automated System Recovery (Windows XP Professional
only) – The ASR is a backup of the system state, services,
and OS components. Used with Windows installation disc to
recover computer.
Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Boot Sequence for Windows 7
Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Startup Modes
Pressing the F8 key during the boot process opens the
Windows Advanced Startup Options menu, which allows
you to select how to boot Windows.
 Safe Mode – Starts Windows but only loads drivers for basic
components, such as the keyboard and display.
 Safe Mode with Networking Support – Starts Windows
identically to Safe Mode and also loads the drivers for network
components.
 Safe Mode with Command Prompt – Starts Windows and loads
the command prompt instead of the GUI interface.
 Last Known Good Configuration – Enables a user to load the
configurations settings of Windows that was used the last time that
Windows successfully started. It does this by accessing a copy of
the registry that is created for this purpose.
Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The Windows Registry Files
Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Multiboot Procedures
 Multiple OS can be installed on one computer
 To create a dual-boot system in Microsoft Windows:
• Must have more than one hard drive or a hard drive with more than
one partition.
• Install the oldest OS on the primary partition or the hard drive
marked with an active partition.
• Install the second OS on the second partition or hard drive.
• The boot files are automatically installed in the active partition.
 During the dual-boot process:
• The BOOTMGR file indicates that more than one OS is present.
• You are prompted to choose the OS that you want to load.
• NOTE: In Windows XP, the BOOT.INI file fills the role of the
BOOTMGR file.
Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Disk Management Utility
 This utility can be to used to complete the following
tasks:
• View drive status
• Extend partitions
• Split partitions
• Assign drive letters
• Add drives
• Add arrays
 To access the Disk Management utility in Windows 7 and Windows
Vista, use the following path:
Select Start > right-click Computer > Manage > select Disk
Management
Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Directory Structures
 The root level of the Windows directory structure, the
partition, is usually labeled drive C.
•Contains a set of standardized directories, called folders, for the
operating system, applications, configuration information, and
data files.
•Directories may contain subdirectories. Subdirectories are
commonly called subfolders.
 Drive Mapping - letters are used to name physical or
logical drives.
 Mounting a Volume - mapping a drive to an empty
folder on a volume. Mounted drives are assigned drive
paths instead of letters.
Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
File Extensions and Attributes
 Windows file system naming conventions:
•Maximum of 255 characters may be used.
•Characters such as a period (.) or a slash ( /) are not allowed.
•An extension of three or four letters is added to the filename to
identify the file type.
•Filenames are not case sensitive.
 Windows filename extension examples:
•.docx- Microsoft Word
•.txt - ASCII text only
•.jpg - graphics format
•.pptx - Microsoft PowerPoint
•.zip - compression format
Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Windows Desktop
 A GUI provides graphical representations of all the files,
folders, and programs on a computer.
 Windows 7 and Windows Vista have a default theme called Aero.
Aero has translucent window borders, numerous animations, and
icons that are thumbnail images of the contents of a file
 Windows 7 includes the following new Aero features:
• Shake -Minimize all windows that are not being used by clicking the title bar
of one window and shaking the mouse.
• Peek - View the icons and gadgets on the desktop by pointing the mouse at
the right edge of the taskbar to make all windows transparent.
• Snap - Resize a window by dragging it to one edge of the screen.
 Gadgets -Windows 7 and Windows Vista users can place Gadgets
on the desktop. Gadgets are small applications such as games,
sticky notes, or a clock.
Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Windows Desktop Properties
 To customize the desktop in Windows 7 and
Windows Vista, right-click anywhere on the
desktop and choose Personalize to:
•change desktop icons, mouse pointers, and
your account picture.
•modify a theme’s background, color, sound,
and screensaver.
Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Windows Desktop, Tools, and Applications
 To customize the Start Menu or the Taskbar,
right-click it and choose Properties.
 The Task Manager allows you to view all
applications that are running and to close any
applications that have stopped responding:
•CTRL-ALT-DEL and select Start Task Manager.
•right-click the taskbar and select Start Task
Manager.
Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Computer and Windows Explorer
 Computer allows access to the various installed drives (My Computer
in Windows XP)
 Windows Explorer - used to navigate the file system includes:
• Search box - Access previous searches. Filter search results.
• New folder button - Create new folders with one click.
• Arrange by - Organize items easily according to different criteria.
• Preview pane button - Turn the preview pane on or off.
 Applications can be launched in several ways:
• Click the application on the Start menu or Taskbar.
• Double-click the application shortcut icon on the desktop.
• Double-click the application executable on the desktop or in Windows
Explorer.
• Launch the application from the Run window or command line.
Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Windows 7 Libraries
 Allows for easy organization of content from storage
devices on local computer and network.
 Are virtual folders that present content from different
locations within the same view.
 Include four default Libraries - Documents, Music, Pictures,
and Videos.
 To add a file to a library, right-click it, select Include in
library, and then choose which library to add the item.
 To create a new library, open a folder and select Include in
Library > Create new library
Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Control Panel Utilities
 System and Security - To configure system and security settings
 Network and Internet - To configure network connection types
 Hardware and Sound - To configure devices connected to the
computer and settings for sound
 Programs - To remove, change, and repair applications
 User Accounts and Family Safety - To create and remove user
accounts and set up parental controls
 Appearance and Personalization - To control the look and feel of
the Windows GUI
 Clock, Language, and Region - To specify location and language
 Ease of Access - To configure Windows for vision, hearing, and
mobility needs
Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
User Accounts
 User Accounts Utility:
•Create a user account.
•Manage password, change picture, change account
name and type, manage another account, and
change User Account Control (UAC) settings.
•Start > Control Panel> select User Accounts
 User Account Control (UAC):
•Monitors programs on a computer and warns users
when an action might present a threat to the system.
Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Internet Options
 To access Internet Options select Start > Control
Panel > Internet Options
Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Action Center
 Used to configure security settings in Windows 7 and
Vista.
 Select Start > Control Panel > Action Center.
Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Windows Firewall
 The Windows Firewall Utility implements a security
policy by adjusting the following settings:
•Allow a program or feature through Windows Firewall
•Change notification settings
•Turn Windows Firewall on or off
•Restore defaults
•Advanced settings
 Start > Control Panel > Windows Firewall.
Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
The System Utility
 View basic system information, access tools and
configure advanced settings including:
•Computer Name -View or modify the name and workgroup
settings for a computer, as well as change the domain or
workgroup.
•Hardware - Access the Device Manager or adjust the device
installation settings.
•Advanced -Configure settings for performance, user profiles,
startup, and recovery.
•System Protection - Access System restore and configure
protection settings.
•Remote -Adjust settings for Remote Assistance and Remote
Desktop.
 Start > Control Panel > System
Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Device Manager
 View settings for devices
in the computer and:
•Update a driver - Change
the currently installed driver.
•Roll back a driver - Change
the currently installed driver
to the previously installed
driver.
•Uninstall a driver
•Disable a device
• Start > Control Panel >
System > Device Manager
Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Computer Management Console
 Provides utilities to manage
your computer including:
•Task Scheduler
•Event Viewer
•Shared Folders
•Local Users and Groups
•Performance
•Device Manager
•Disk Management
 Start > Control Panel >
Administrative Tools > Computer
Management
Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Event Viewer
 Logs a history of events
regarding applications,
security, and the system.
 These log files are a
valuable troubleshooting
tool.
 Start > Control Panel >
Administrative Tools >
Event Viewer
Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Services and Performance Monitor
Performance Monitor:
•Record performance data and
configure alerts.
•Start > Control Panel >
Administrative Tools > Performance
Monitor
Services:
•Start, stop, or disable services.
•Start > Control Panel >
Administrative Tools > Services.
Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Disk Defragmenter and Disk Error-
Checking Tool
 Disk Defragmenter makes files on the hard drive
contiguous and speeds up the reading of files.
 To access the Disk Defragmenter in Windows 7, select
Start > All Programs > Accessories > System Tools
> Disk Defragmenter.
 CHKDSK checks the integrity of files and folders by
scanning the hard disk surface for physical errors.
 Access CHKDSK from within the Disk Defragmenter or
enter CHKDSK in command line to detect and repair
disk errors.
Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
System Information Tool
 Collect and display information about local and remote
computers
 To access the System Information tool, Start > All
Programs > Accessories > System Tools > System
Information
Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Remote Desktop
 Remote Desktop
•View and control a computer from a remote location.
 Remote Assistance
•Also allows user to view what the remote technician
is doing to the computer.
 To access in Windows 7 or Windows Vista, select Start
> All Programs > Accessories > Remote Desktop
Connection
Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Control Panel Utilities Unique to Specific
Windows Versions
 Windows 7
•HomeGroup
•Action Center
•Windows Defender
•RemoteApp and Desktop
Connections
•Troubleshooting
 Windows Vista
•Tablet PC settings
•Pen and Input Devices
•Offline Files
•Problem Reports and Solutions
•Printers
 Windows XP
•Add/Remove Programs
•Printers and Faxes
•Automatic Updates
•Network Connections
•Network Setup wizard
Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Command-Line Tools
 Start > Type Cmd in the search box > Press Enter
Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Run Line Utility
 Enter commands to configure settings and system
modifications.
 To access in Windows 7 select Start > Search box > Type
run > Enter.
 Common Commands
•CMD –Used to execute command line programs.
•DXDIAG - Displays details for all DirectX components and drivers.
•EXPLORER – Opens Windows Explorer.
•MMC - Opens the Microsoft Management console (MMC).
•MSCONFIG - Opens the System Configuration Utility.
•MSINFO32 - Displays complete system summary of the computer.
Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Virtualization
 Host machine uses its system resources to host a
virtual machine.
 Hosting a virtual machine allows users to access the
functionality and resources provided by an OS that is
not on the local PC.
 Provides access to applications, file-sharing services,
and other productivity tools.
 Users can further increases the functionality of their
system by running multiple virtual machines.
Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Virtualization
 The software that creates and manages a virtual
machine on a host machine is called the hypervisor,
or Virtual Machine Manager (VMM).
• Allocates the physical system resources, such as CPU, RAM,
and hard drive, to each virtual machine as needed.
 Windows Virtual PC is the virtualization platform for
Windows 7
•Allows you to partition system resources for a Window OS
among virtual machines .
Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Virtual Machine PC Requirements
Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Preventive Maintenance Planning
Components of a preventive maintenance plan:
 Updates to the operating system and applications
 Updates to anti-virus and other protective software
 Hard drive error checking
 Hard drive backup
 Hard drive defragmentation
 Device drive updates
 Firmware updates
 Startup programs
Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Schedule Tasks
 The CLI at command launches tasks at a specified time
using the command line interface.
 The Windows Task Scheduler launches tasks at a
specified time using a graphical interface.
 To access the Windows Task Scheduler in Windows 7
and Windows Vista, select Start > All Programs >
Accessories > System Tools > Task Scheduler.
 Both of these tools allow users to set commands to run
at a certain time just once, or to repeat at selected days
or times.
Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Restore Point
 If a computer crashes, the OS can roll back to a restore point
using the System Restore Utility.
•The restore utility only operates on OS and application files.
•Anti-virus software should be run to remove malware before
creating a restore point.
 When to create a restore point:
•Before updating or replacing
the OS.
•When installing or updating
hardware.
•When an application or
driver is installed.
 Start > All Programs >
Accessories > System Tools >
System Restore
Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Backup the Hard Drive
 Use the Microsoft Backup Tool to perform backups.
 Establish a backup strategy that will allow for the
recovery of data.
 Decide how often the data must be backed up and the
type of backup to perform.
 It is only necessary to make copies of the files that
have changed since the last backup.
 To access the backup utility in Windows 7, select Start
> Control Panel > Backup and Restore.
Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Types of Backups
Description
Clear
marker
Normal Selected files and folders Yes
Copy Selected files and folders No
Differential
Selected files and folders that
changed since the last backup
No
Incremental
Selected files and folders that
changed since the last backup
Yes
Daily
Selected files and folders that
changed during the day
No
Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Step 1 Identify the problem
Step 2 Establish a Theory of Probable Cause
Step 3 Test the Theory to Determine Cause
Step 4 Establish a Plan of Action to Resolve the Problem
and Implement the Solution
Step 5 Verify Full System Functionality and Implement
Preventive Measures
Step 6 Document Findings, Actions, and Outcomes
Troubleshooting Process
Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Step 1 - Identify the Problem
 Computer configuration
• Operating system, patches and updates, network environment, connection type
 Open-ended questions
• What problems are you experiencing with your computer?
• What software has been installed on your computer recently?
• What were you doing when the problem was identified?
• What operating system do you have installed on your computer?
• What updates or patches have been installed on your computer?
 Closed-ended questions
• Has anyone else used your computer recently?
• Does the computer boot up successfully?
• Have you changed your password recently?
• Have you received any error messages on your computer?
Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Step 2 - Establish a Theory of Probable
Causes
 Create a list of the most common reasons why the error would occur
and list the easiest or most obvious causes at the top with the more
complex causes at the bottom.
• Incorrect settings in BIOS
• Caps lock key is set to ON
• Non-bootable media in the floppy drive during computer boot up
• Password has changed
• Incorrect monitor settings in control panel
• Operating system update failure
• Driver update failure
• Malware infection
• Hard drive failure
• Corrupt operating system files
Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Step 3 - Test the Theory to Determine
Cause
 Testing your theories of probable causes one at a time, starting
with the quickest and easiest.
• Log in as a different user.
• Use third party diagnostic software.
• New software or software updates have just been installed.
• Uninstall recently installed applications.
• Boot into safe mode to determine if the problem is driver-related.
• Roll back newly updated drivers.
• Examine Device Manager for device conflicts.
• Examine event logs for warnings or errors.
• Check the hard drive for errors and fix file system issues.
• Use the system file checker to recover corrupt system files.
• Use system restore if a system update or service pack has been installed.
Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Step 4 - Establish a Plan of Action to
Resolve the Problem and Implement the
Solution
 If a quick procedure does not correct the problem, you might
need to research the problem further to establish the exact
cause.
 Divide larger problems into smaller problems that can be
analyzed and solved individually.
 Create a list of possible solutions and implement them one at a
time. If you implement a possible solution and it does not work,
reverse the solution and try another.
Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Step 5 - Verify Full System Functionality
and Implement Preventive Measures
 Verifying full system functionality and implementing any preventive
measures if needed.
• Shut down the computer and restart it.
• Check event logs to make sure there are no new warnings or errors.
• Check Device Manager to see that there are no warnings or errors.
• Run DxDiag to make sure DirectX is running correctly.
• Make sure applications run properly.
• Make sure network shares are accessible.
• Make sure the Internet can be accessed.
• Re-run system file checker to ensure all files are correct.
• Re-run scandisk to make sure no problems remain on the hard drive.
• Check task manager to ensure no programs are running incorrectly.
• Re-run any third party diagnostic tools.
 Have the customer verify the solution and system functionality.
Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Step 6 - Document Findings, Actions,
and Outcomes
 Discuss the solution with the customer.
 Have the customer confirm that the problem has been solved.
 Give the customer all appropriate paperwork.
 Document the process in the work order and in your technician’s
journal:
•Problem description
•Solution
•Components used
•Amount of time spent in solving the problem
Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Common Problems and Solutions
 Operating system problems can be attributed to
hardware, application, or configuration issues, or
to some combination of the three.
 See chart of common OS problems and solutions
in curriculum 5.6.2.1
Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 Summary
 Several different operating systems are available, and
you must consider the customer's needs and
environment when choosing an operating system.
 The main steps in setting up a customer's computer
include preparing the hard drive, installing an operating
system, creating user accounts, and configuring
installation options.
 A GUI shows icons of all files, folders, and applications
on the computer. A pointing device, such as a mouse, is
used to navigate in a GUI desktop.
 A CLI uses commands to complete tasks and navigate
the file system.
Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential
Chapter 5 Summary (Continued)
 Establish a backup strategy that allows for the recovery
of data. Normal, copy, differential, incremental, and daily
backups are all available in Windows operating systems.
 Virtualization has become a popular method of providing
staff with critical resources, such as applications, file-
sharing services, and other productivity tools.
 Preventive maintenance techniques help to ensure
optimal operation of the operating system.
 Some of the tools available for troubleshooting an OS
problem include administrative tools, system tools, and
CLI commands.
Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

More Related Content

What's hot

ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2Irsandi Hasan
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1Irsandi Hasan
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9Irsandi Hasan
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overviewAhmed Sultan
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8Irsandi Hasan
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesLumension
 
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...Spiceworks
 
Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLockerutahmisfit
 
Managing bitlocker with mbam
Managing bitlocker with mbamManaging bitlocker with mbam
Managing bitlocker with mbamOlav Tvedt
 
Open security controller security orchestration for openstack
Open security controller security orchestration for openstackOpen security controller security orchestration for openstack
Open security controller security orchestration for openstackPriyanka Aash
 

What's hot (20)

ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2ITE v5.0 - Chapter 2
ITE v5.0 - Chapter 2
 
Ite pc v40_chapter5
Ite pc v40_chapter5Ite pc v40_chapter5
Ite pc v40_chapter5
 
IT ESSENTIALS 6.0
IT ESSENTIALS 6.0IT ESSENTIALS 6.0
IT ESSENTIALS 6.0
 
Ite pc v40_chapter1
Ite pc v40_chapter1Ite pc v40_chapter1
Ite pc v40_chapter1
 
ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1ITE v5.0 - Chapter 1
ITE v5.0 - Chapter 1
 
ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9ITE v5.0 - Chapter 9
ITE v5.0 - Chapter 9
 
It essentials pc hardware and software overview
It essentials pc hardware and software overviewIt essentials pc hardware and software overview
It essentials pc hardware and software overview
 
Ite pc v40_chapter2
Ite pc v40_chapter2Ite pc v40_chapter2
Ite pc v40_chapter2
 
Ite pc v40_chapter6
Ite pc v40_chapter6Ite pc v40_chapter6
Ite pc v40_chapter6
 
Ite v5.0 chapter3
Ite v5.0 chapter3Ite v5.0 chapter3
Ite v5.0 chapter3
 
ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8ITE v5.0 - Chapter 8
ITE v5.0 - Chapter 8
 
Ite pc v40_chapter4
Ite pc v40_chapter4Ite pc v40_chapter4
Ite pc v40_chapter4
 
ITE - Chapter 13
ITE - Chapter 13ITE - Chapter 13
ITE - Chapter 13
 
Bit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it ComparesBit locker Drive Encryption: How it Works and How it Compares
Bit locker Drive Encryption: How it Works and How it Compares
 
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
How Spiceworks Integrated Intel Technology into the Spiceworks IT Desktop - K...
 
Deploying Microsoft BitLocker
Deploying Microsoft BitLockerDeploying Microsoft BitLocker
Deploying Microsoft BitLocker
 
ppt ch17
ppt ch17ppt ch17
ppt ch17
 
Ch2 Presentation
Ch2 PresentationCh2 Presentation
Ch2 Presentation
 
Managing bitlocker with mbam
Managing bitlocker with mbamManaging bitlocker with mbam
Managing bitlocker with mbam
 
Open security controller security orchestration for openstack
Open security controller security orchestration for openstackOpen security controller security orchestration for openstack
Open security controller security orchestration for openstack
 

Similar to Install and Configure Operating Systems

Windows_Installation.pptx
Windows_Installation.pptxWindows_Installation.pptx
Windows_Installation.pptxLearyJohn
 
docslide-3df5a529-2ffd-ef23.ppt
docslide-3df5a529-2ffd-ef23.pptdocslide-3df5a529-2ffd-ef23.ppt
docslide-3df5a529-2ffd-ef23.pptPrasannaDeSilva7
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptxOnyemaobiAmarachi
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Gene Carboni
 
The operating system (os),
The operating system (os),The operating system (os),
The operating system (os),emesce
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxPoornimaGhodke3
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7aesthetics00
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningAcend Corporate Learning
 
Modern Operating System Windows Server 2008
Modern Operating System  Windows Server 2008Modern Operating System  Windows Server 2008
Modern Operating System Windows Server 2008Sneha Chopra
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7Chaing Ravuth
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1solarisyougood
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationKen Hutchins
 
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...Andik Susilo
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7Gene Carboni
 
Implementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded SystemImplementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded Systeminsydesoftware
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Jan Ketil Skanke
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptxTadeseBeyene
 

Similar to Install and Configure Operating Systems (20)

Windows_Installation.pptx
Windows_Installation.pptxWindows_Installation.pptx
Windows_Installation.pptx
 
ITE7_Chp10.pptx
ITE7_Chp10.pptxITE7_Chp10.pptx
ITE7_Chp10.pptx
 
docslide-3df5a529-2ffd-ef23.ppt
docslide-3df5a529-2ffd-ef23.pptdocslide-3df5a529-2ffd-ef23.ppt
docslide-3df5a529-2ffd-ef23.ppt
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7Lesson 1 - Introducing, Installing, and Upgrading Windows 7
Lesson 1 - Introducing, Installing, and Upgrading Windows 7
 
The operating system (os),
The operating system (os),The operating system (os),
The operating system (os),
 
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptxChapter 1,2,3 & 4_Win Server AD Basics.pptx
Chapter 1,2,3 & 4_Win Server AD Basics.pptx
 
Module 03 installing, upgrading, and migrating to windows 7
Module 03   installing, upgrading, and migrating to windows 7Module 03   installing, upgrading, and migrating to windows 7
Module 03 installing, upgrading, and migrating to windows 7
 
Windows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate LearningWindows 7 Seminar - Acend Corporate Learning
Windows 7 Seminar - Acend Corporate Learning
 
Modern Operating System Windows Server 2008
Modern Operating System  Windows Server 2008Modern Operating System  Windows Server 2008
Modern Operating System Windows Server 2008
 
CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7CCNA4 Verson6 Chapter7
CCNA4 Verson6 Chapter7
 
Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1Microsoft System center Configuration manager 2012 sp1
Microsoft System center Configuration manager 2012 sp1
 
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 ConfigurationLecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
 
John
JohnJohn
John
 
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
Windows 7 Deployment with Microsoft Deployment Toolkit & Windows Deployment S...
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
 
Implementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded SystemImplementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded System
 
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
Security @ Windows 10 Partner Technical Bootcamp Microsoft Norway October 2015
 
window configuration & Administration.pptx
window   configuration  & Administration.pptxwindow   configuration  & Administration.pptx
window configuration & Administration.pptx
 

Recently uploaded

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Install and Configure Operating Systems

  • 1. © 2008 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID 1 Chapter 5: Operating Systems IT Essentials 5.0
  • 2. Presentation_ID 2© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 Objectives  5.1 Explain the characteristics and basic functions of modern operating systems  5.1 Describe and compare types of operating systems to include purpose, limitations, and compatibilities  5.1 Determine operating system based on customer needs  5.2 Install an operating system  5.3 Navigate a GUI (Windows)  5.4 Explain the advantages of Virtualization and install Virtual PC
  • 3. Presentation_ID 3© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 Objectives (continued)  5.5 Identify and apply common preventive maintenance techniques for operating systems  5.6 Troubleshoot operating systems
  • 4. Presentation_ID 4© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Purpose of an Operating System  The operating system (OS) controls almost all functions on a computer.  In this chapter, you will learn about the components, functions, and terminology related to the Windows 7, Windows Vista , and Windows XP operating systems.
  • 5. Presentation_ID 5© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Characteristics of an Operating System  Multi-user – Two or more users have individual accounts that allow them to work with programs and peripheral devices at the same time.  Multitasking – The computer is capable of operating multiple applications at the same time.  Multiprocessing – The operating system can support two or more CPUs.  Multithreading – A program can be broken into smaller parts that are loaded as needed by the operating system. Multithreading allows individual programs to be multitasked.
  • 6. Presentation_ID 6© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Basic Function of an Operating System  All computers rely on an operating system (OS) to provide the interface for interaction between users, applications, and hardware.  The operating system boots the computer and manages the file system.  The operating system has four main roles: • Control hardware access • Manage files and folders • Provide user interface • Manage applications
  • 7. Presentation_ID 7© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Processor Architecture  32-bit Windows Operating System and x86 Processor Architecture • Capable of addressing 4 GB of RAM • x86 uses a Complex Instruction Set Computer (CISC) • x86 processors use fewer registers than x64 processors  64-bit Windows Operating System and x64 Processor Architecture • Capable of addressing 128+ GB of RAM • Enhanced performance for memory management • Additional security features • x64 architecture is backward compatible with x86 • Process much more complex instructions at a much higher rate
  • 8. Presentation_ID 8© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 32-bit and 64-bit Compatibility in Windows OS
  • 9. Presentation_ID 9© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of Operating Systems Desktop Operating System • Supports a single user • Runs single-user applications • Shares files and folders • Shares peripherals • Used on a small network • Supports multiple users • Runs multi-user applications • Robust and redundant • Provides increased security • Used on a network Network Operating System
  • 10. Presentation_ID 10© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of Operating Systems  Desktop operating systems: • Microsoft Windows: Windows 7 • Macintosh: Mac OS X • Linux • UNIX  A desktop OS has the following characteristics: • Supports a single user • Runs single-user applications • Shares files and folders on a small network with limited security
  • 11. Presentation_ID 11© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Network Operating Systems (NOS)  Common NOS include: • Microsoft Windows Server • Linux • UNIX • Mac OS X Server  NOS has the following characteristics: • Supports multiple users • Runs multi-user applications • Robust and redundant • Provides increased security compared to desktop operating systems
  • 12. Presentation_ID 12© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Customer Requirements for an OS  To select the proper operating system for a customer first determine: •Budget constraints •Compatibility with current hardware •Compatibility with new hardware •How the computers will be used •Compatibility with existing applications •Types of new applications to be used
  • 13. Presentation_ID 13© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Identify Minimum Hardware Requirements  Customer may need to upgrade or purchase additional hardware to support the required applications and OS.  A cost analysis will indicate if purchasing new equipment is a better idea than upgrading.  Possible hardware upgrades: •RAM capacity •Hard drive size •CPU •Video card memory and speed •Motherboard
  • 14. Presentation_ID 14© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hardware Compatibility  Most operating systems have an HCL.  HCLs can be found on the manufacturer's website.  HCL includes list of hardware that is known to work with the operating system.  Use Microsoft Compatibility Center for Windows 7 and Vista.
  • 15. Presentation_ID 15© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Operating System Upgrades  Operating systems must be upgraded periodically. • To remain compatible with the latest hardware and software. • Because support for older OS is eventually withdrawn.  Ensure that the new OS is compatible with the computer. • Use Microsoft Upgrade Advisor to scan the system for incompatibility issues before upgrading. Upgrade Advisor is free and downloadable from the Microsoft Windows website.  Backup all data prior to beginning the upgrade.
  • 16. Presentation_ID 16© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Data Migration One of the following tools can be used to migrate data and settings:  User State Migration Tool migrates all user files and settings to the new OS.  Windows Easy Transfer migrates personal files and settings when switching from an old computer to new. Note: Windows Easy Transfer replaced the Windows XP File and Settings Transfer Wizard.
  • 17. Presentation_ID 17© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Installing the Operating System  Reasons to perform a clean installation of an OS: •When a computer is passed from one employee to another. •When the operating system is corrupted. •When the primary hard drive is replaced in a computer .  Before performing a clean installation: •Back up all data first. •Explain to the customer that existing data will be erased. •Confirm that all needed data has been successfully transferred.
  • 18. Presentation_ID 18© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hard Drive Setup Procedures  Operating system setup methods: •Install an OS over a network from a server. •Install from OS files stored on CDs or DVDs.  Partitioning and Formatting: •Hard drive must be logically divided (partitioned). •File system must be created on the hard drive. •During the installation phase, most operating systems will automatically partition and format the hard drive.
  • 19. Presentation_ID 19© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Hard Drive Formatting  The first portion of the installation process deals with formatting and partitioning the hard drive.  The second portion prepares the disk to accept the file system.  The file system provides the directory structure that organizes the user's operating system, application, configuration, and data files.  Examples of file systems: •The New Technology File System (NTFS) - Supports partition sizes up to 16 exabytes •The FAT32 file system - Supports partition sizes up to 2 TB. Used by Windows XP and earlier OS versions.
  • 20. Presentation_ID 20© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Install the Operating System  When a computer boots up with the Windows installation CD, the Windows 7 installation process starts with three options: • Install now - Sets up and installs the Windows 7 OS. • What to know before installing Windows - Opens Help. • Repair your computer - Opens the System Recovery Options.  Under Install now three options are available: • Upgrade - Upgrades Windows but keeps your current files, settings, and programs. You can use this option to repair an installation. • Custom (advanced) - Installs a clean copy of Windows in your choice of location and allows you to change disks and partitions. It is also known as a clean installation. • Quit - Exits Setup.
  • 21. Presentation_ID 21© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Account Creation  Windows 7 has three types of user accounts: Administrator, Standard, and Guest.  The Administrator Account must be created when Windows 7 is installed.  To create or remove a user account in Windows 7 use the following path : Start > Control Panel > User Accounts > Add or remove user accounts
  • 22. Presentation_ID 22© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Complete the Installation  When Windows 7 installation completes: •Computer will reboot •Prompts to create user account •Register Windows 7 and verify that you are using a legal copy of the OS •Verification enables you to download patches and service packs  Use Microsoft Update Manager to scan for new software.
  • 23. Presentation_ID 23© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Custom Installation Options – Disk Cloning  Follow these steps for disk cloning: 1. Create a master installation on one computer. 2. Run Sysprep. 3. Create a disk image of the configured computer using third- party disk-cloning software. 4. Copy the disk image onto a server.  When the destination computer is booted: • A shortened version of the Windows setup program runs. • Setup installs drivers, creates user accounts, and configures network settings. With Microsoft System Preparation
  • 24. Presentation_ID 24© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Custom Installation Options  Windows 7 has several different types of custom installations. •Network Installation - Requires all setup files to be copied to a network server. •Preboot Execution Environment (PXE) Installation - Uses a PXE boot program and a client’s network card to access the setup files. •Unattended Installation - Uses a network distribution point that uses an answer file. •Image-based Installation - Uses Sysprep and a disk-imaging program, that copies an image of the OS directly to the hard drive with no user intervention. •Remote Installation - Downloads the installation across the network.
  • 25. Presentation_ID 25© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential System Recovery Options  Repair Disc- For Windows 7. Use the system repair disc to boot the computer  System Image Recovery – For Windows 7. It allows users to back up the contents of their hard drive, including personal files and settings.  Factory Recovery Partition – Some computers with Windows 7 preinstalled from the factory contain a hidden recovery partition with an image of the bootable partition.  Automated System Recovery (Windows XP Professional only) – The ASR is a backup of the system state, services, and OS components. Used with Windows installation disc to recover computer.
  • 26. Presentation_ID 26© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Boot Sequence for Windows 7
  • 27. Presentation_ID 27© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Startup Modes Pressing the F8 key during the boot process opens the Windows Advanced Startup Options menu, which allows you to select how to boot Windows.  Safe Mode – Starts Windows but only loads drivers for basic components, such as the keyboard and display.  Safe Mode with Networking Support – Starts Windows identically to Safe Mode and also loads the drivers for network components.  Safe Mode with Command Prompt – Starts Windows and loads the command prompt instead of the GUI interface.  Last Known Good Configuration – Enables a user to load the configurations settings of Windows that was used the last time that Windows successfully started. It does this by accessing a copy of the registry that is created for this purpose.
  • 28. Presentation_ID 28© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The Windows Registry Files
  • 29. Presentation_ID 29© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Multiboot Procedures  Multiple OS can be installed on one computer  To create a dual-boot system in Microsoft Windows: • Must have more than one hard drive or a hard drive with more than one partition. • Install the oldest OS on the primary partition or the hard drive marked with an active partition. • Install the second OS on the second partition or hard drive. • The boot files are automatically installed in the active partition.  During the dual-boot process: • The BOOTMGR file indicates that more than one OS is present. • You are prompted to choose the OS that you want to load. • NOTE: In Windows XP, the BOOT.INI file fills the role of the BOOTMGR file.
  • 30. Presentation_ID 30© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Disk Management Utility  This utility can be to used to complete the following tasks: • View drive status • Extend partitions • Split partitions • Assign drive letters • Add drives • Add arrays  To access the Disk Management utility in Windows 7 and Windows Vista, use the following path: Select Start > right-click Computer > Manage > select Disk Management
  • 31. Presentation_ID 31© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Directory Structures  The root level of the Windows directory structure, the partition, is usually labeled drive C. •Contains a set of standardized directories, called folders, for the operating system, applications, configuration information, and data files. •Directories may contain subdirectories. Subdirectories are commonly called subfolders.  Drive Mapping - letters are used to name physical or logical drives.  Mounting a Volume - mapping a drive to an empty folder on a volume. Mounted drives are assigned drive paths instead of letters.
  • 32. Presentation_ID 32© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential File Extensions and Attributes  Windows file system naming conventions: •Maximum of 255 characters may be used. •Characters such as a period (.) or a slash ( /) are not allowed. •An extension of three or four letters is added to the filename to identify the file type. •Filenames are not case sensitive.  Windows filename extension examples: •.docx- Microsoft Word •.txt - ASCII text only •.jpg - graphics format •.pptx - Microsoft PowerPoint •.zip - compression format
  • 33. Presentation_ID 33© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Windows Desktop  A GUI provides graphical representations of all the files, folders, and programs on a computer.  Windows 7 and Windows Vista have a default theme called Aero. Aero has translucent window borders, numerous animations, and icons that are thumbnail images of the contents of a file  Windows 7 includes the following new Aero features: • Shake -Minimize all windows that are not being used by clicking the title bar of one window and shaking the mouse. • Peek - View the icons and gadgets on the desktop by pointing the mouse at the right edge of the taskbar to make all windows transparent. • Snap - Resize a window by dragging it to one edge of the screen.  Gadgets -Windows 7 and Windows Vista users can place Gadgets on the desktop. Gadgets are small applications such as games, sticky notes, or a clock.
  • 34. Presentation_ID 34© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Windows Desktop Properties  To customize the desktop in Windows 7 and Windows Vista, right-click anywhere on the desktop and choose Personalize to: •change desktop icons, mouse pointers, and your account picture. •modify a theme’s background, color, sound, and screensaver.
  • 35. Presentation_ID 35© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Windows Desktop, Tools, and Applications  To customize the Start Menu or the Taskbar, right-click it and choose Properties.  The Task Manager allows you to view all applications that are running and to close any applications that have stopped responding: •CTRL-ALT-DEL and select Start Task Manager. •right-click the taskbar and select Start Task Manager.
  • 36. Presentation_ID 36© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Computer and Windows Explorer  Computer allows access to the various installed drives (My Computer in Windows XP)  Windows Explorer - used to navigate the file system includes: • Search box - Access previous searches. Filter search results. • New folder button - Create new folders with one click. • Arrange by - Organize items easily according to different criteria. • Preview pane button - Turn the preview pane on or off.  Applications can be launched in several ways: • Click the application on the Start menu or Taskbar. • Double-click the application shortcut icon on the desktop. • Double-click the application executable on the desktop or in Windows Explorer. • Launch the application from the Run window or command line.
  • 37. Presentation_ID 37© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Windows 7 Libraries  Allows for easy organization of content from storage devices on local computer and network.  Are virtual folders that present content from different locations within the same view.  Include four default Libraries - Documents, Music, Pictures, and Videos.  To add a file to a library, right-click it, select Include in library, and then choose which library to add the item.  To create a new library, open a folder and select Include in Library > Create new library
  • 38. Presentation_ID 38© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Control Panel Utilities  System and Security - To configure system and security settings  Network and Internet - To configure network connection types  Hardware and Sound - To configure devices connected to the computer and settings for sound  Programs - To remove, change, and repair applications  User Accounts and Family Safety - To create and remove user accounts and set up parental controls  Appearance and Personalization - To control the look and feel of the Windows GUI  Clock, Language, and Region - To specify location and language  Ease of Access - To configure Windows for vision, hearing, and mobility needs
  • 39. Presentation_ID 39© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential User Accounts  User Accounts Utility: •Create a user account. •Manage password, change picture, change account name and type, manage another account, and change User Account Control (UAC) settings. •Start > Control Panel> select User Accounts  User Account Control (UAC): •Monitors programs on a computer and warns users when an action might present a threat to the system.
  • 40. Presentation_ID 40© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Internet Options  To access Internet Options select Start > Control Panel > Internet Options
  • 41. Presentation_ID 41© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Action Center  Used to configure security settings in Windows 7 and Vista.  Select Start > Control Panel > Action Center.
  • 42. Presentation_ID 42© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Windows Firewall  The Windows Firewall Utility implements a security policy by adjusting the following settings: •Allow a program or feature through Windows Firewall •Change notification settings •Turn Windows Firewall on or off •Restore defaults •Advanced settings  Start > Control Panel > Windows Firewall.
  • 43. Presentation_ID 43© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential The System Utility  View basic system information, access tools and configure advanced settings including: •Computer Name -View or modify the name and workgroup settings for a computer, as well as change the domain or workgroup. •Hardware - Access the Device Manager or adjust the device installation settings. •Advanced -Configure settings for performance, user profiles, startup, and recovery. •System Protection - Access System restore and configure protection settings. •Remote -Adjust settings for Remote Assistance and Remote Desktop.  Start > Control Panel > System
  • 44. Presentation_ID 44© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Device Manager  View settings for devices in the computer and: •Update a driver - Change the currently installed driver. •Roll back a driver - Change the currently installed driver to the previously installed driver. •Uninstall a driver •Disable a device • Start > Control Panel > System > Device Manager
  • 45. Presentation_ID 45© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Computer Management Console  Provides utilities to manage your computer including: •Task Scheduler •Event Viewer •Shared Folders •Local Users and Groups •Performance •Device Manager •Disk Management  Start > Control Panel > Administrative Tools > Computer Management
  • 46. Presentation_ID 46© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Event Viewer  Logs a history of events regarding applications, security, and the system.  These log files are a valuable troubleshooting tool.  Start > Control Panel > Administrative Tools > Event Viewer
  • 47. Presentation_ID 47© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Services and Performance Monitor Performance Monitor: •Record performance data and configure alerts. •Start > Control Panel > Administrative Tools > Performance Monitor Services: •Start, stop, or disable services. •Start > Control Panel > Administrative Tools > Services.
  • 48. Presentation_ID 48© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Disk Defragmenter and Disk Error- Checking Tool  Disk Defragmenter makes files on the hard drive contiguous and speeds up the reading of files.  To access the Disk Defragmenter in Windows 7, select Start > All Programs > Accessories > System Tools > Disk Defragmenter.  CHKDSK checks the integrity of files and folders by scanning the hard disk surface for physical errors.  Access CHKDSK from within the Disk Defragmenter or enter CHKDSK in command line to detect and repair disk errors.
  • 49. Presentation_ID 49© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential System Information Tool  Collect and display information about local and remote computers  To access the System Information tool, Start > All Programs > Accessories > System Tools > System Information
  • 50. Presentation_ID 50© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Remote Desktop  Remote Desktop •View and control a computer from a remote location.  Remote Assistance •Also allows user to view what the remote technician is doing to the computer.  To access in Windows 7 or Windows Vista, select Start > All Programs > Accessories > Remote Desktop Connection
  • 51. Presentation_ID 51© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Control Panel Utilities Unique to Specific Windows Versions  Windows 7 •HomeGroup •Action Center •Windows Defender •RemoteApp and Desktop Connections •Troubleshooting  Windows Vista •Tablet PC settings •Pen and Input Devices •Offline Files •Problem Reports and Solutions •Printers  Windows XP •Add/Remove Programs •Printers and Faxes •Automatic Updates •Network Connections •Network Setup wizard
  • 52. Presentation_ID 52© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Command-Line Tools  Start > Type Cmd in the search box > Press Enter
  • 53. Presentation_ID 53© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Run Line Utility  Enter commands to configure settings and system modifications.  To access in Windows 7 select Start > Search box > Type run > Enter.  Common Commands •CMD –Used to execute command line programs. •DXDIAG - Displays details for all DirectX components and drivers. •EXPLORER – Opens Windows Explorer. •MMC - Opens the Microsoft Management console (MMC). •MSCONFIG - Opens the System Configuration Utility. •MSINFO32 - Displays complete system summary of the computer.
  • 54. Presentation_ID 54© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Virtualization  Host machine uses its system resources to host a virtual machine.  Hosting a virtual machine allows users to access the functionality and resources provided by an OS that is not on the local PC.  Provides access to applications, file-sharing services, and other productivity tools.  Users can further increases the functionality of their system by running multiple virtual machines.
  • 55. Presentation_ID 55© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Virtualization  The software that creates and manages a virtual machine on a host machine is called the hypervisor, or Virtual Machine Manager (VMM). • Allocates the physical system resources, such as CPU, RAM, and hard drive, to each virtual machine as needed.  Windows Virtual PC is the virtualization platform for Windows 7 •Allows you to partition system resources for a Window OS among virtual machines .
  • 56. Presentation_ID 56© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Virtual Machine PC Requirements
  • 57. Presentation_ID 57© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Preventive Maintenance Planning Components of a preventive maintenance plan:  Updates to the operating system and applications  Updates to anti-virus and other protective software  Hard drive error checking  Hard drive backup  Hard drive defragmentation  Device drive updates  Firmware updates  Startup programs
  • 58. Presentation_ID 58© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Schedule Tasks  The CLI at command launches tasks at a specified time using the command line interface.  The Windows Task Scheduler launches tasks at a specified time using a graphical interface.  To access the Windows Task Scheduler in Windows 7 and Windows Vista, select Start > All Programs > Accessories > System Tools > Task Scheduler.  Both of these tools allow users to set commands to run at a certain time just once, or to repeat at selected days or times.
  • 59. Presentation_ID 59© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Restore Point  If a computer crashes, the OS can roll back to a restore point using the System Restore Utility. •The restore utility only operates on OS and application files. •Anti-virus software should be run to remove malware before creating a restore point.  When to create a restore point: •Before updating or replacing the OS. •When installing or updating hardware. •When an application or driver is installed.  Start > All Programs > Accessories > System Tools > System Restore
  • 60. Presentation_ID 60© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Backup the Hard Drive  Use the Microsoft Backup Tool to perform backups.  Establish a backup strategy that will allow for the recovery of data.  Decide how often the data must be backed up and the type of backup to perform.  It is only necessary to make copies of the files that have changed since the last backup.  To access the backup utility in Windows 7, select Start > Control Panel > Backup and Restore.
  • 61. Presentation_ID 61© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Types of Backups Description Clear marker Normal Selected files and folders Yes Copy Selected files and folders No Differential Selected files and folders that changed since the last backup No Incremental Selected files and folders that changed since the last backup Yes Daily Selected files and folders that changed during the day No
  • 62. Presentation_ID 62© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Step 1 Identify the problem Step 2 Establish a Theory of Probable Cause Step 3 Test the Theory to Determine Cause Step 4 Establish a Plan of Action to Resolve the Problem and Implement the Solution Step 5 Verify Full System Functionality and Implement Preventive Measures Step 6 Document Findings, Actions, and Outcomes Troubleshooting Process
  • 63. Presentation_ID 63© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Step 1 - Identify the Problem  Computer configuration • Operating system, patches and updates, network environment, connection type  Open-ended questions • What problems are you experiencing with your computer? • What software has been installed on your computer recently? • What were you doing when the problem was identified? • What operating system do you have installed on your computer? • What updates or patches have been installed on your computer?  Closed-ended questions • Has anyone else used your computer recently? • Does the computer boot up successfully? • Have you changed your password recently? • Have you received any error messages on your computer?
  • 64. Presentation_ID 64© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Step 2 - Establish a Theory of Probable Causes  Create a list of the most common reasons why the error would occur and list the easiest or most obvious causes at the top with the more complex causes at the bottom. • Incorrect settings in BIOS • Caps lock key is set to ON • Non-bootable media in the floppy drive during computer boot up • Password has changed • Incorrect monitor settings in control panel • Operating system update failure • Driver update failure • Malware infection • Hard drive failure • Corrupt operating system files
  • 65. Presentation_ID 65© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Step 3 - Test the Theory to Determine Cause  Testing your theories of probable causes one at a time, starting with the quickest and easiest. • Log in as a different user. • Use third party diagnostic software. • New software or software updates have just been installed. • Uninstall recently installed applications. • Boot into safe mode to determine if the problem is driver-related. • Roll back newly updated drivers. • Examine Device Manager for device conflicts. • Examine event logs for warnings or errors. • Check the hard drive for errors and fix file system issues. • Use the system file checker to recover corrupt system files. • Use system restore if a system update or service pack has been installed.
  • 66. Presentation_ID 66© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Step 4 - Establish a Plan of Action to Resolve the Problem and Implement the Solution  If a quick procedure does not correct the problem, you might need to research the problem further to establish the exact cause.  Divide larger problems into smaller problems that can be analyzed and solved individually.  Create a list of possible solutions and implement them one at a time. If you implement a possible solution and it does not work, reverse the solution and try another.
  • 67. Presentation_ID 67© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Step 5 - Verify Full System Functionality and Implement Preventive Measures  Verifying full system functionality and implementing any preventive measures if needed. • Shut down the computer and restart it. • Check event logs to make sure there are no new warnings or errors. • Check Device Manager to see that there are no warnings or errors. • Run DxDiag to make sure DirectX is running correctly. • Make sure applications run properly. • Make sure network shares are accessible. • Make sure the Internet can be accessed. • Re-run system file checker to ensure all files are correct. • Re-run scandisk to make sure no problems remain on the hard drive. • Check task manager to ensure no programs are running incorrectly. • Re-run any third party diagnostic tools.  Have the customer verify the solution and system functionality.
  • 68. Presentation_ID 68© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Step 6 - Document Findings, Actions, and Outcomes  Discuss the solution with the customer.  Have the customer confirm that the problem has been solved.  Give the customer all appropriate paperwork.  Document the process in the work order and in your technician’s journal: •Problem description •Solution •Components used •Amount of time spent in solving the problem
  • 69. Presentation_ID 69© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Common Problems and Solutions  Operating system problems can be attributed to hardware, application, or configuration issues, or to some combination of the three.  See chart of common OS problems and solutions in curriculum 5.6.2.1
  • 70. Presentation_ID 70© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 Summary  Several different operating systems are available, and you must consider the customer's needs and environment when choosing an operating system.  The main steps in setting up a customer's computer include preparing the hard drive, installing an operating system, creating user accounts, and configuring installation options.  A GUI shows icons of all files, folders, and applications on the computer. A pointing device, such as a mouse, is used to navigate in a GUI desktop.  A CLI uses commands to complete tasks and navigate the file system.
  • 71. Presentation_ID 71© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential Chapter 5 Summary (Continued)  Establish a backup strategy that allows for the recovery of data. Normal, copy, differential, incremental, and daily backups are all available in Windows operating systems.  Virtualization has become a popular method of providing staff with critical resources, such as applications, file- sharing services, and other productivity tools.  Preventive maintenance techniques help to ensure optimal operation of the operating system.  Some of the tools available for troubleshooting an OS problem include administrative tools, system tools, and CLI commands.
  • 72. Presentation_ID 72© 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential

Editor's Notes

  1. Cisco Networking Academy Program IT Essentials 5.0 Chapter 5: Modern Operating Systems
  2. Chapter 5 Objectives
  3. Chapter Introduction After completing this chapter, students will meet these objectives: Explain the purpose of an operating system. Describe and compare operating systems to include purpose, limitations, and compatibilities. Determine the operating system based on customer needs. Install an operating system. Navigate a GUI. Identify and apply common preventive maintenance techniques for operating systems. Troubleshoot operating systems.
  4. 5.1.1.1 Terms Almost all modern operating systems are multi-user and multi-tasking, and they support multi-processing and multi-threading.
  5. 5.1.1.2 Explain the functions of an operating system Regardless of the size and complexity of the computer and the operating system, all operating systems perform the same four basic functions: Control hardware access - The operating system manages the interaction between applications and the hardware. To access and communicate with the hardware, the operating system installs a device driver for each hardware component. A device driver is a small program written by the hardware manufacturer and supplied with the hardware component. The process of assigning system resources and installing drivers can be performed with Plug and Play (PnP). The operating system automatically detects the PnP-compatible hardware and installs the driver for that component. The operating system then configures the device and updates the registry, which is a database that contains all the information about the computer. NOTE: The registry contains information about applications, users, hardware, network settings, and file types. Files and Folder Management - The operating system creates a file structure on the hard disk drive to allow data to be stored. A file is a block of related data that is given a single name and treated as a single unit. Program and data files are grouped together in a directory. The files and directories are organized for easy retrieval and use. Directories can be kept inside other directories. These nested directories are referred to as subdirectories. Directories are called folders in Windows operating systems, and subdirectories are called subfolders. User interface - The operating system enables the user to interact with software and hardware. There are two types of user interfaces: Command Line Interface (CLI) – The user types commands at a prompt. Graphical User Interface (GUI) – The user interacts with menus and icons. Most operating systems, such as Windows Vista and Windows 7, include both a GUI and a CLI. Application management - The operating system manages all programs to ensure that the correct resources are allocated to the applications. The operating system locates an application and loads it into the RAM of the computer. Applications are software programs, such as word processors, databases, spreadsheets, games, and many other applications. The operating system ensures that each application has adequate system resources. Application programming interface (API) is a set of guidelines used by programmers to ensure that the application they are developing is compatible with an operating system. Here are two examples of APIs: Open Graphics Library (OpenGL) – Cross-platform standard specification for multimedia graphics DirectX – Collection of APIs related to multimedia tasks for Microsoft Windows Windows API – Allows applications from older versions os Windows to operate on newer versions Java -APIs related to the development of Java programming
  6. 5.1.1.3 Processor Architecture 32-bit vs. 64-bit x86 Processor vs. x64 Processor There are three main differences between 32-bit and 64-bit operating systems. A 32-bit operating system, such as Windows XP Professional, is capable of addressing only 4 GB of RAM, while a 64-bit operating system can address more than 128 GB of RAM. Memory management is also different between these two types of operating systems, resulting in enhanced performance of 64-bit programs. A 64-bit operating system, such as Windows Vista 64-bit and Windows 7 also have additional security features. Processor ArchitectureThere are two common architectures used by CPUs to process data: x86 (32-bit architecture) and x64 (64-bit architecture). x86 uses a Complex Instruction Set Computer (CISC) architecture to process multiple instructions with a single request. Registers are storage areas used by the CPU when performing calculations. x86 processors use fewer registers than x64 processors. x64 architecture is backward compatible with x86 and adds additional registers specifically for instructions that use a 64-bit address space. The additional registers of the x64 architecture allow the computer to process much more complex instructions at a much higher rate.
  7. 5.1.1.3 Processor Architecture 32-bit and 64-bit Compatibility in Windows OS
  8. 5.1.2 Types of Operating Systems 5.1.2.1 Desktop OS 5.1.2.2 Network OS There are two distinct types of operating systems: desktop operating systems and network operating systems. A desktop operating system is intended for use in a small office/home office (SOHO) with a limited number of users. A network operating system (NOS) is designed for a corporate environment serving multiple users with a wide range of needs.
  9. 5.1.2.1 Desktop operating systems The differences between desktop operating systems are typically related to availability and how much can be accomplished using the GUI: Windows and MAC OS users can perform the majority of tasks through the GUI. Linux and UNIX users must understand and use the CLI to perform some tasks. The code for an operating system will be either open source or proprietary: Open source applications can be read and modified. There are few restrictions on downloading, using, or rewriting open source software. Programmers openly share code with other programmers. Linux distributions are open source. Proprietary applications cannot be read or modified. Proprietary software agreements restrict the use of the software, identifying where and when the software may be used. Microsoft Windows products are proprietary. NOTE: In this course, all command paths refer to Microsoft Windows unless otherwise noted.
  10. 5.1.2.2 Describe network operating systems Microsoft Windows – Network operating systems offered by Microsoft are Windows 2000 Server, Windows Server 2003, Windows Server 2008, and Windows Server 2012. Windows Server operating systems use a central database called Active Directory to manage network resources. Linux – Linux operating systems include Red Hat, Caldera, SuSE, Debian, Fedora, Ubuntu and Slackware. UNIX – Various corporations offered proprietary operating systems, based on UNIX 5.1.2.3 Worksheet -Research NOS Certifications and Jobs
  11. 5.1.3 Customer Requirements for an Operating System 5.1.3.1 OS Compatible Application and Environments An operating system should be compatible with all applications that are installed on a computer. Before recommending an OS to your customer, investigate the types of applications that your customer will be using. If the computer will be part of a network, the operating system must also be compatible with the operating systems of the other computers in the network. The network type determines what operating systems are compatible. Microsoft Windows networks can have multiple computers using different versions of Microsoft operating systems.
  12. 5.1.3.2 Determine minimum hardware requirements and compatibility with the OS platform Operating systems have minimum hardware requirements that must be met for the OS to install and function correctly. Identify the equipment that your customer has in place. If hardware upgrades are necessary to meet the minimum requirements for an OS, conduct a cost analysis to determine the best course of action. In some cases, it may be less expensive for the customer to purchase a new computer than to upgrade the current system. NOTE: In some cases, the application requirements may exceed the hardware requirements of the operating system. For the application to function properly, it will be necessary to satisfy the additional requirements. Once you have determined the minimum hardware requirements for an OS, you should ensure that all of the hardware in the computer is compatible with the operating system that you have selected for your customer.
  13. 5.1.3.2 Determine minimum hardware requirements and compatibility with the OS platform The Microsoft Compatibility Center does not support Windows XP. Windows XP has a Hardware Compatibility List (HCL) that can be found on the manufacturer's website 5.1.3.3 Activity –Comparing OS Requirements
  14. 5.1.4 Operating System Upgrades 5.1.4.1 Checking OS Compatibility 5.1.4.2 Windows OS Upgrades The version of an OS determines available upgrade options. For example, a 32-bit OS cannot be upgraded to a 64-bit OS. Another example is that Windows XP cannot be upgraded to Windows 7
  15. 5.1.4.3 Data Migration 5.1.4.4 Lab – Data Migration in Windows 7 5.1.4.5 Lab - Data Migration in Windows Vista 5.1.4.6 Lab - Data Migration in Windows XP
  16. 5.2 Operating system installation NOTE: When you perform a clean install on an existing computer, you should back up all data first. You should also explain to the customer that existing data will be erased. As an extra precaution, some businesses hold the computer for a period of time to guarantee that all needed information has been successfully transferred before carrying out the clean install. After completing this section, students will meet these objectives: Identify hard drive setup procedures Prepare the hard drive Install the operating system using default settings Create user accounts Complete the installation Describe custom installation options Identify the boot sequence files and Registry files Describe how to manipulate operating system files Describe directory structures
  17. 5.2.1 Identify hard drive setup procedures The installation and initial booting of the operating system is called the operating system setup. Although it is possible to install an operating system over a network from a server or from a local hard drive, the most common installation method is with CDs and DVDs. To install an OS from a CD or DVD, first configure the BIOS setup to boot the system from the CD or DVD. 5.2.1.1 Hard Drive Partitioning Before installing an operating system on a hard drive, the hard drive must be partitioned and formatted. When a hard drive is partitioned, it is logically divided into one or more areas. When a hard drive is formatted, the partitions are prepared to hold files and applications. During the installation phase, most operating systems automatically partition and format the hard drive. A technician should understand the process relating to hard drive setup Primary partition – This partition is usually the first partition. A primary partition cannot be subdivided into smaller sections. There can be up to four partitions per hard drive. Active partition – This partition is the partition used by the operating system to boot the computer. Only one primary partition can be marked active. Extended partition – This partition normally uses the remaining free space on a hard drive or takes the place of a primary partition. There can be only one extended partition per hard drive, and it can be subdivided into smaller sections called logical drives. Logical drive – This drive is a section of an extended partition that can be used to separate information for administrative purposes. Formatting – This process prepares a file system in a partition for files to be stored. Cluster – A cluster is also called a file allocation unit. It is the smallest unit of space used for storing data. Track – A track is one complete circle of data on one side of a hard drive platter. A track is broken into groups of 512 bytes, called sectors. Cylinder – A cylinder is a stack of tracks lined up one on top of another to form a cylinder shape. Drive mapping – Drive mapping is a letter assigned to a physical or logical drive.
  18. 5.2.1.2 Hard Drive Formatting The disk must first be partitioned and formatted. This is similar to preparing a large garden plot. Partitioning is similar to laying out footpaths and ditches for irrigation and drainage. This defines the size and shape of your garden. Formatting is similar to laying out rows or beds. These are sized according to the crops that you wish to plant. The FAT32 file system records the position of files on the disk using File Allocation Tables and 32-bit addressing (FAT32). The New Technology File System (NTFS) uses a journaling system to record changes to the file system and a Master File Table (MFT) to record information about each file. NTFS is usually more reliable than FAT32 and incorporates security. 5.2.1.3 Worksheet – Answer NTFS and FAT32 questions.
  19. 5.2.1.4 Install the operating system with default settings Install now - Sets up and installs the Windows 7 OS. What to know before installing Windows - Opens a Help and Support window describing the Upgrade and Custom options for installing Windows 7. The window also describes how to prepare for and install Windows 7. Repair your computer - Opens the System Recovery Options utility to repair an installation. Under the Install now option. Three options are available: Upgrade - Upgrades Windows but keeps your current files, settings, and programs. You can use this option to repair an installation. Custom (advanced) - Installs a clean copy of Windows in your choice of location and allows you to change disks and partitions. It is also known as a clean installation. Selecting a custom installation increases the likelihood of a successful installation. Quit - Exits Setup. Note: If existing Windows installations are not found, the Upgrade option is disabled. 5.2.1.5 Lab – Install Windows 7 5.2.1.6 Lab – Install Windows Vista 5.2.1.7 Lab – Install Windows XP
  20. 5.2.1.8 Account Creation Windows 7 has three types of user accounts: Administrator, Standard, and Guest. The Administrator Account must be created when Windows 7 is installed. To create or remove a user account in Windows 7 use : Start > Control Panel > User Accounts > Add or remove user accounts 5.2.1.9 Lab – Check for updates in Windows 7 5.2.1.10 Lab – Check for updates in Windows Vista 5.2.1.11 Lab – Check for updates in Windows XP
  21. 5.2.1.12 Complete the installation You must register Windows 7. You must also complete the verification that ensures that you are using a legal copy of the OS. Doing so will enable you to download patches and service packs. Performing this step requires a connection to the Internet. Depending on the age of the media at the time of your installation, there may be updates to install. You can use the Microsoft Update Manager from the Start menu to scan for new software and to do the following: Install all service packs Install all patches You should also verify that all hardware is installed correctly. You can use Device Manager to locate problems and to install the correct or updated drivers.
  22. 5.2.2 Custom installation options 5.2.2.1 Disk Cloning You can use the Microsoft System Preparation (Sysprep) tool to install and configure the same operating system on multiple computers. Sysprep prepares an operating system that will be used on computers with different hardware configurations. With Sysprep and a disk cloning application, technicians are able to quickly install an operating system, complete the last configuration steps for the OS setup, and install applications. Disk Cloning creates an image of a hard drive in a computer.
  23. 5.2.2.2 Describe custom installation options Windows 7 has several different types of custom installations. Network Installation - Requires all setup files to be copied to a network server Preboot Execution Environment (PXE) Installation - Uses a PXE boot program and a client’s network card to access the setup files Unattended Installation - Uses a network distribution point that uses an answer file Image-based Installation - Uses Sysprep and a disk-imaging program, that copies an image of the OS directly to the hard drive with no user intervention Remote Installation - Downloads the installation across the network. 5.2.2.3 Lab – Advanced Installation of Windows 7 5.2.2.4 Lab – Advanced Installation of Windows Vista 5.2.2.5 Lab – Advanced Installation of Windows XP
  24. 5.2.2.6 System Recovery Options
  25. 5.2.3 Identify the boot sequence files and Registry files 5.2.3.1 Windows 7 Boot Process
  26. 5.2.3.2 Startup Modes You can boot Windows in one of many different modes. Pressing the F8 key during the boot process opens the Windows Advanced Startup Options menu, which allows you to select how to boot Windows.
  27. 5.2.3.3 Windows Registry The Windows Registry files are an important part of the Windows 7 boot process. These files are recognized by their distinctive names, which begin with HKEY_ followed by the name of the portion of the operating system under their control. Every setting in Windows—from the background of the desktop and the color of the screen buttons to the licensing of applications—is stored in the Registry. Each user has a unique section of the Registry. The Windows login process pulls system settings from the Registry to reconfigure the system to the state that it was in the last time that you turned it on. The Registry is also responsible for recording the location of Dynamic Link Library (DLL) files. A DLL file consists of program code that can be used by different programs to perform common functions. As a result, DLL files are very important to the functionality of an operating system and any application users may install. 5.2.3.4 Lab – Registry Backup and Recovery
  28. 5.2.4.1 Multiboot Procedure
  29. 5.2.4.2 Disk Management Utility Student Activity 5.2.4.3 Lab – Create a Partition in Windows 7 5.2.4.4 Lab – Create a Partition in Windows Vista 5.2.4.5 Lab – Create a Partition in Windows XP
  30. 5.2.5.1 Directory Structures
  31. 5.2.5.3 File Extensions and Attributes . The directory structure maintains a set of attributes for each file that controls how the file may be viewed or altered. The following are the most common file attributes: R - The file is read-only. A - The file will be archived the next time that the disk is backed up. S - The file is marked as a system file and a warning is given if an attempt is made to delete or modify the file. H - The file is hidden in the directory display.
  32. 5.3 The Windows GUI and Control Panel 5.3.1.1 Windows Desktop A desktop on a computer is a graphical representation of a workspace. The desktop has icons, toolbars, and menus to manipulate files. The desktop can be customized with images, sounds, and colors to provide a more personalized look and feel. All of these customizable items together make up a theme.
  33. 5.3.1.2 Windows Desktop Properties
  34. 5.3.1.3 Start Menu and Taskbar 5.3.1.4 Task Manager 5.3.1.6 Lab – Task manager (Managing Processes) Windows 7 5.3.1.7 Lab – Task manager (Managing Processes) Windows Vista 5.3.1.8 Lab – Task manager (Managing Processes) Windows XP
  35. 5.3.1.8 Computer and Windows Explorer
  36. 5.3.1.9 Windows 7 Libraries
  37. 5.3.2.1 Introduction to Control Panel Utilities
  38. 5.3.2.2 User Accounts Student Activity 5.3.2.3 Lab – Create User Accounts in Windows 7 5.3.2.4 Lab – Create User Accounts in Windows Vista 5.3.2.5 Lab – Create User Accounts in Windows XP
  39. 5.3.2.6 Internet Options 5.3.2.7 Lab – Configure Browser Settings in Windows 7 5.3.2.8 Lab – Configure Browser Settings in Windows Vista 5.3.2.9 Lab – Configure Browser Settings in Windows XP
  40. 5.3.2.12 Action Center
  41. 5.3.2.13 Windows Firewall
  42. 5.3.2.15 System Utility 5.3.2.16 Lab - Managing Virtual Memory Windows 7 5.3.2.17 Lab - Managing Virtual Memory Windows Vista 5.3.2.18 Lab - Managing Virtual Memory Windows XP
  43. 5.3.2.19 Device Manager The device manager allows you to view all of the settings for devices in the computer. A common task for technicians is to view the values assigned for the IRQ, I/O addresses, and the DMA setting for all of the devices in the computer. From the Device Manager, you can quickly view the properties of any device in the system by double-clicking the device name. You can view which version of the driver is installed in your computer, view driver file details, update a driver, or even roll back or uninstall a device driver. You can compare the driver version listed here with the version available from the website of your device manufacturer. 5.3.2.20 Lab - Managing Device Drivers with Device Manager in Windows 7 5.3.2.21 Lab - Lab - Managing Device Drivers with Device Manager in Windows Vista 5.3.2.22 Lab - Managing Device Drivers with Device Manager in Windows XP
  44. 5.3.3 Administrative Tools 5.3.3.1 Event Viewer The Computer Management console allows you to manage many aspects of both your computer and remote computers.
  45. 5.3.3.2 Event Viewer The Event Viewer logs a history of events regarding applications, security, and the system. These log files are a valuable troubleshooting tool.
  46. 5.3.3.3 Services Services are executable programs that require little or no user input. Services can be set to run automatically when Windows starts, or manually when required. The Services console allows you to manage all of the services on your computer and remote computers. You can start, stop, or disable services. You can also change how a service starts, or define actions for the computer to perform automatically when a service fails. You must have administrative privileges to access the Services console. 5.3.3.4 Performance MonitorThe Performance Monitor console has two distinct parts: the System Monitor and Performance Logs and Alerts. The System Monitor displays real-time information about the processors, disks, memory, and network usage for your computer. You can easily summarize these activities through histograms, graphs, and reports. Performance Logs and Alerts allow you to record the performance data and configure alerts. The alerts will notify you when a specified usage falls below or rises above a specified threshold. You can set alerts to create entries in the event log, send a network message, begin a performance log, run a specific program, or any combination of these. You must have administrative privileges to access the Performance Monitor console. 5.3.3.5 – Monitor and Manage System Resources in Windows 7 5.3.3.6 - Monitor and Manage System Resources in Windows Vista 5.3.3.7 - Monitor and Manage System Resources in Windows XP
  47. 5.3.4 System Tools 5.3.4.1 Disk Defragmenter and Disk Error- Checking Tool 5.3.4.2 Lab – Hard Drive Maintenance in Windows 7 5.3.4.3 Lab - Hard Drive Maintenance in Windows Vista 5.3.4.4 Lab - Hard Drive Maintenance in Windows XP
  48. 5.3.4.5 System Information 5.3.4.6 – Managing System Files with Built-in Utilities in Windows 7 5.3.4.7 - Managing System Files with Built-in Utilities in Windows Vista 5.3.4.8 - Managing System Files with Built-in Utilities in Windows XP
  49. 5.3.5.1 Remote Desktop 5.3.5.2 Lab – Remote Desktop and Remote Assistance in Windows 7 5.3.5.3 Lab – Remote Desktop and Remote Assistance in Windows Vista 5.3.5.4 Lab - Lab – Remote Desktop and Remote Assistance in Windows XP
  50. 5.3.6.1 Windows 7 Unique Utilities 5.3.6.2 Windows Vista Unique Utilities 5.3.6.3 Windows XP Unique Utilities
  51. 5.3.7.1 Command-Line Tools 5.3.7.2 Lab – Working with CLI Commands in Windows
  52. 5.3.7.3 Run Line Utility 5.3.7.4 Lab – Run Line Utilities in Windows 7 5.3.7.5 Lab – Run Line Utilities in Windows Vista 5.3.7.6 Lab – Run Line Utilities in Windows XP
  53. 5.4.1.1 Purpose of Virtualization
  54. 5.4.1.2 Hypervisor: Virtual Machine Manage
  55. 5.4.1.3 Virtual Machine PC Requirements 5.4.1.4 Lab – Install Virtual PC
  56. 5.5.1.1 Preventive Maintenance Plan Contents To ensure that an OS remains fully functional, you must implement a preventive maintenance plan. A preventive maintenance plan provides the following benefits to users and organizations: Decreased downtime Improved performance Improved reliability Decreased repair costs 5.5.1.2 Lab – Managing the Startup Folder in Windows 7 5.5.1.3 Lab - Managing the Startup Folder in Windows Vista 5.5.1.4 Lab - Managing the Startup Folder in Windows XP
  57. 5.5.1.6 Schedule tasks Some preventive maintenance consists of cleaning, inspecting, and doing minor repairs. Some preventive maintenance uses application tools that are either already in the operating system or can be loaded onto the user's hard drive. Most preventive maintenance applications can be set to run automatically according to a schedule. Two utilities that are useful tools for preventive maintenance are: CHKDSK - CHKDSK checks the integrity of files and folders and scan the hard disk surface for physical errors. Consider using them at least once a month and also whenever a sudden loss of power causes the system to shut down. Defrag - As files increase in size, some data is written to the next available space on the disk. In time, data becomes fragmented, or spread all over the hard drive. It takes time to seek each section of the data. Defrag gathers the noncontiguous data into one place, making files run faster. 5.5.1.7 Lab – Schedule a Task Using the GUI and the at Command in Windows 7 5.5.1.8 Lab – Schedule a Task Using the GUI and the at Command in Windows Vista 5.5.1.9 Lab -Schedule a Task Using the GUI and the at Command in Windows XP
  58. 5.5.1.10 Restore point An update can sometimes causes serious problems. Perhaps an older program is in the system that is not compatible with the current operating system. An automatic update may install code that will work for most users but does not work with your system. Windows 7 can create an image of the current computer settings, called a restore point. Then, if the computer crashes, or an update causes system problems, the computer can roll back to a previous configuration. NOTE: A restore point backs up drivers, system files, and registry settings but not application data. A recovery CD contains the essential files used to repair the system after a serious issue, such as a hard drive crash. The recovery CD can contain the original version of Windows, hardware drivers, and application software. When the recovery CD is used, the computer will be restored to the original default configuration. 5.5.1.11 Lab – Use the System Restore Tool in Windows 7 5.5.1.12 Lab – Use the System Restore Tool in Windows Vista 5.5.1.13 Lab – Use the System Restore Tool in Windows XP
  59. 5.5.1.14 Back up the hard drive Just as the system restore points allow the restoration of OS configuration files, backup tools allow recovery of data. You can use the Microsoft Backup Tool to perform backups as required. It is important to establish a backup strategy that includes data recovery. The organization’s requirements will determine how often the data must be backed up and the type of backup to perform. It can take a long time to run a backup. If the backup strategy is followed carefully, it will not be necessary to backup every file at every backup. It is only necessary to make copies of the files that have changed since the last backup. For this reason, there are several different types of backup.
  60. 5.5.1.4 Back up the hard drive A normal backup is also called a full backup. During a normal backup, all selected files on the disk are archived to the backup medium. These files are marked as having been archived. A copy backup will copy all selected files. It does not mark the files as having been archived. A differential backup backs up all the files and folders that have been created or modified since the last normal backup or the last incremental backup. The differential backup does not mark the files as having been archived. Copies will be made from the same starting point until the next incremental or full backup is performed. An incremental backup procedure backs up all the files and folders that have been created or modified since the last normal or incremental backup. It marks the files as having been archived. This has the effect of advancing the starting point of differential backups without having to re-archive the entire contents of the drive. Daily backups only back up the files that are modified on the day of the backup. Daily backups do not mark the files as being archived. There are many types of backup media available for computers: Tape drives are devices that are used for data backup on a network server drive. Tape drives are an inexpensive way to store a large amount of data. The Digital Audio Tape (DAT) tape standard uses 4 mm digital audiotapes to store data in the Digital Data Storage (DSS) format. Digital Linear Tape (DLT) technology offers high-capacity and relatively high-speed tape backup capabilities. USB flash memory can hold hundreds of times the data that a floppy disk can hold. USB flash memory devices are available in many capacities and offer better transfer rates than tape devices. Optical media, such as CDs, DVDs, and Blu-ray Discs, are plastic discs used to store data. Many formats and capacities of optical media are available. A DVD holds much more data than a CD, and a Blu-ray Disc holds much more data than a DVD. External Hard Disk Drives (HDDs) are hard drives that are connected to your computer using a USB, FireWire, or external Serial ATA (eSATA) connection. External HDDs can hold very large amounts of data and can transfer data very quickly.
  61. 5.6.1 Apply the Troubleshooting Process to Operating Systems Most operating systems contain utilities to assist in the troubleshooting process. These utilities help a technician to determine why the computer crashes or does not boot properly. The utilities also help identify the problem and how to resolve it.
  62. 5.6.1.1 Identify the Problem When a customer is not able to accurately describe the problem, there are other ways to evaluate the situation in subsequent steps in the troubleshooting process.
  63. 5.6.1.2 Establish a Theory of Probable Causes
  64. 5.6.1.3 Determine the Exact Cause If the exact cause of the problem has not been determined after you have tested all your theories, establish a new theory of probable causes and test it.
  65. 5.6.1.4 Implement a Solution If a quick procedure does correct the problem, you can go to step 5 to verify the solution and full system functionality. Evaluate the problem and research possible solutions. Divide larger problems into smaller problems that can be analyzed and solved individually. Prioritize solutions starting with the easiest and fastest to implement. Check: Helpdesk repair logs Other techs Manufacturer FAQs Technical websites’ News groups Computer manuals Device manuals Online forums Internet search
  66. 5.6.1.5 Verify Solution and System Functionality
  67. 5.6.1.6 Document Findings
  68. 5.6.2.1 Common problems and solutions [Direct the students to the curriculum to see all the charts explaining more common problems and solutions]
  69. Chapter 5 Summary This chapter introduced computer operating systems. A technician should be skilled at installing, configuring, and troubleshooting an operating system.
  70. Chapter 5 Summary