SlideShare a Scribd company logo
1 of 12
Download to read offline
Managing and
monitoring
opportunities in
Windows 7
Operating Systems(CSC2133) - Assignment 01
Rksk Ekanayaka
SC/2013/8853
Managing and monitoring opportunities in Windows 7
Table of Contents
1. Defragment and Optimize Drives..........................................................................................................2
2. Device Manager ....................................................................................................................................3
3. Disk Cleanup..........................................................................................................................................4
4. Event Viewer.........................................................................................................................................5
5. Performance Monitor ...........................................................................................................................6
6. Services .................................................................................................................................................7
7. Task Manager........................................................................................................................................8
8. Task Scheduler ......................................................................................................................................9
9. Windows Firewall with Advanced Security.........................................................................................10
10. Windows Memory Diagnostic.........................................................................................................11
Managing and monitoring opportunities in Windows 7
1. Defragment and Optimize Drives
 What is?
Optimizing the drive is one of the best ways we can improve computer performance. Windows
includes features to help optimize the different types of drives that PCs use today. It can
optimize solid-state drives as well as defragment mechanical drives.
 How to access
 Control panel > Administrative tools > Defragment and Optimize Drives
 My computer > Right click on a drive > Properties > Tools > Defragment and Optimize Drives
 How to use?
 Open Defragment and optimize drives.
 Click the drive you want to optimize.
 To determine if the drive needs to be optimized, click Analyze.
 After Windows is finished analyzing the drive, check the Current status column to see whether
you need to optimize the drive. If the drive is more than 10% fragmented, you should optimize
the drive now.
 Click Optimize.
Managing and monitoring opportunities in Windows 7
2. Device Manager
 What is?
You can use Device Manager to see the devices installed on your PC, update driver software for
our devices, check to see if hardware is working properly, and change hardware settings.
 How to access
 Control Panel > Device Manager
 How to use
Double-tap or double-click a device category to expand it. If there's a yellow warning icon Yellow
warning icon that shows there might be a device problem on the name of a device, there might
be a problem with it. Click the device, Click Action, and then click Properties to see details about
that device.
Managing and monitoring opportunities in Windows 7
3. Disk Cleanup
 What is?
Disk Cleanup will check our system and then present you with a list of things that can be
removed to free up space. It will tell us how much space can be gained by removing unnecessary
files in our computer.
 How to access
 Control Panel > Administrative Tools > Disk Cleanup
 How to use?
 Open Disk Cleanup.
 If you see a drop-down menu with a list of drives, choose the drive you want to clean (generally
the C drive).
 Click OK.
 In the Disk Cleanup for OS dialog box, choose the checkboxes for the file types you want to
delete.
 Click OK.
 When you see a dialog box that prompts you whether to permanently delete the files, click
Delete Files.
Managing and monitoring opportunities in Windows 7
4. Event Viewer
 What is?
The Event Viewer displays the Windows event log. Applications, services, and Windows itself
write messages to the event log. Viewing the log can sometimes help you identify a problem and
look up a specific error message, but most of the messages here aren’t important.
 How to access
 Control Panel > Administrative Tools > Event Viewer
Managing and monitoring opportunities in Windows 7
5. Performance Monitor
 What is?
The Microsoft Windows Performance Monitor is a feature found in Windows 7 that allows us to
view and monitor the performance of your computer either in real time or from a log. In the
picture below, is an example of the Performance Monitor running in real time and is graphing
the percentage of the processor time. Additional values could be added to this chart by right-
clicking on the chart and clicking Add Counters.
 How to access
 Control Panel > Administrative Tools > Performance Monitor
Managing and monitoring opportunities in Windows 7
6. Services
 What is?
The Services tool displays the services installed on our Windows system and allows us to
manage them. Services are low-level programs that run in the background. Many of these
services are included with Windows and perform essential system tasks.
 How to access
 Control Panel > Administrative Tools > Services
Managing and monitoring opportunities in Windows 7
7. Task Manager
 What is?
Task Manager shows you the programs, processes, and services that are currently running on
your computer. We can use Task Manager to monitor your computer’s performance or to close
a program that is not responding.
We can also use Task Manager to view network status and see how your network is functioning.
If more than one user is connected to our computer, we can see who is connected, what they
are working on, and we can send them a message.
 How to access
 Press CTRL+SHIFT+ESC
 Right click on an empty area of Task bar and click Task manager
Managing and monitoring opportunities in Windows 7
8. Task Scheduler
 What is?
Windows uses the Task Scheduler to automatically run processes at scheduled times. The Task
Scheduler application allows us to set our own programs to run on a schedule, view our system’s
scheduled tasks, and manage them.
 How to access
 Control Panel > Administrative Tools > Task Scheduler
Managing and monitoring opportunities in Windows 7
9. Windows Firewall with Advanced Security
 What is?
The Windows Firewall with Advanced Security is a tool which gives us detailed control over the
rules that are applied by the Windows Firewall. We can view all the rules that are used by the
Windows Firewall, change their properties, create new rules or disable existing ones.
The Windows Firewall with Advanced Security includes some monitoring features as well. In the
Monitoring section we can find the following information: the firewall rules that are active (both
inbound and outbound), the connection security rules that are active and whether there are any
active security associations.
 How to access
 Control Panel > System and Security > Windows Firewall > Advanced settings.
Managing and monitoring opportunities in Windows 7
10. Windows Memory Diagnostic
 What is?
The memory diagnostic tool checks our random access memory (RAM) for defects.Tt writes data
to different sectors of your RAM and reads it back. If it gets different data back, it knows our
RAM is malfunctioning. This is usually a hardware problem and can generally be solved by
replacing at least one stick of RAM.
 How to access
 Control Panel > Administrative Tools > Windows Memory Diagnostic
 How to use
 Open Windows Memory Diagnostic
 A pop-up will appear on your screen, asking how you'd like to go about checking the memory.
The first option will restart your machine and check the memory right now, and the second
option checks the next time you choose to reboot. Pick the option that best suits your needs.
 Your computer will load a screen that shows the progress of the check and number of passes it
will run on the memory. Watch the memory diagnostic tool for errors.

More Related Content

What's hot

Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
mariacalji
 
Windows xp blue screen of death stop codes
Windows xp blue screen of death stop codesWindows xp blue screen of death stop codes
Windows xp blue screen of death stop codes
Seven Branch
 

What's hot (19)

How to repair windows 8
How to repair  windows 8How to repair  windows 8
How to repair windows 8
 
Optimize and speed up windows 7
Optimize and speed up windows 7Optimize and speed up windows 7
Optimize and speed up windows 7
 
SysInfoTools OpenOffice Draw Repair
SysInfoTools OpenOffice Draw RepairSysInfoTools OpenOffice Draw Repair
SysInfoTools OpenOffice Draw Repair
 
SysInfoTools OpenOffice Impress Repair
 SysInfoTools OpenOffice Impress Repair SysInfoTools OpenOffice Impress Repair
SysInfoTools OpenOffice Impress Repair
 
Lesson 3
Lesson 3Lesson 3
Lesson 3
 
Cis presentation group 'g'
Cis presentation group 'g'Cis presentation group 'g'
Cis presentation group 'g'
 
Operating systems 2
Operating systems 2Operating systems 2
Operating systems 2
 
Windows xp blue screen of death stop codes
Windows xp blue screen of death stop codesWindows xp blue screen of death stop codes
Windows xp blue screen of death stop codes
 
wipe dell laptop windows 11
wipe dell laptop windows 11wipe dell laptop windows 11
wipe dell laptop windows 11
 
Important tips to speed up a slow laptop
Important tips to speed up a slow laptopImportant tips to speed up a slow laptop
Important tips to speed up a slow laptop
 
run 32 bit programs on 64 bit windows
run 32 bit programs on 64 bit windowsrun 32 bit programs on 64 bit windows
run 32 bit programs on 64 bit windows
 
undo system restore
undo system restoreundo system restore
undo system restore
 
Basic computer maintenance
Basic computer maintenanceBasic computer maintenance
Basic computer maintenance
 
Toshiba backup software
Toshiba backup softwareToshiba backup software
Toshiba backup software
 
Amplify boost increase mic volume windows 11
Amplify boost increase mic volume windows 11Amplify boost increase mic volume windows 11
Amplify boost increase mic volume windows 11
 
Virus and malware removal instructions
Virus and malware removal instructionsVirus and malware removal instructions
Virus and malware removal instructions
 
Pc Preventative Maintenance Checklist
Pc Preventative Maintenance ChecklistPc Preventative Maintenance Checklist
Pc Preventative Maintenance Checklist
 
Cms instruction 1.0
Cms instruction 1.0Cms instruction 1.0
Cms instruction 1.0
 
Tutorial
TutorialTutorial
Tutorial
 

Viewers also liked (10)

Chapter 6
Chapter 6Chapter 6
Chapter 6
 
CV 2016
CV 2016CV 2016
CV 2016
 
Genetic engineering (cloning)
Genetic engineering (cloning)Genetic engineering (cloning)
Genetic engineering (cloning)
 
Genetic engineering (cloning)
Genetic engineering (cloning)Genetic engineering (cloning)
Genetic engineering (cloning)
 
Object oriented databases
Object oriented databasesObject oriented databases
Object oriented databases
 
Henoch HSP Powerpoint presentation jan 2014
Henoch HSP Powerpoint presentation jan 2014Henoch HSP Powerpoint presentation jan 2014
Henoch HSP Powerpoint presentation jan 2014
 
Birthday Paradox explained
Birthday Paradox explainedBirthday Paradox explained
Birthday Paradox explained
 
both business plans starting points
both business plans starting pointsboth business plans starting points
both business plans starting points
 
Book Building.pptx
Book Building.pptxBook Building.pptx
Book Building.pptx
 
IEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer ProtocolIEEE standards and Data Link Layer Protocol
IEEE standards and Data Link Layer Protocol
 

Similar to Managing and monitoring opportunities in Windows 7

Cicero Discovery White Paper
Cicero Discovery White PaperCicero Discovery White Paper
Cicero Discovery White Paper
Cicero, Inc.
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
eugeniadean34240
 
Revo Uninstaller Pro Help
Revo Uninstaller Pro HelpRevo Uninstaller Pro Help
Revo Uninstaller Pro Help
guestd9ca37
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
shujra
 
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxLab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
DIPESH30
 
Chapter11 Monitoring Server Performance
Chapter11      Monitoring  Server  PerformanceChapter11      Monitoring  Server  Performance
Chapter11 Monitoring Server Performance
Raja Waseem Akhtar
 

Similar to Managing and monitoring opportunities in Windows 7 (20)

Built in digaonst
Built in digaonstBuilt in digaonst
Built in digaonst
 
Monitoring of computers
Monitoring of computers Monitoring of computers
Monitoring of computers
 
20 Windows Tools Every SysAdmin Should Know
20 Windows Tools Every SysAdmin Should Know20 Windows Tools Every SysAdmin Should Know
20 Windows Tools Every SysAdmin Should Know
 
5 stepmainttut
5 stepmainttut5 stepmainttut
5 stepmainttut
 
operating systems By ZAK
operating systems By ZAKoperating systems By ZAK
operating systems By ZAK
 
Cicero Discovery White Paper
Cicero Discovery White PaperCicero Discovery White Paper
Cicero Discovery White Paper
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
Solve Stop Code Memory Management on Windows.pptx
Solve Stop Code Memory Management on Windows.pptxSolve Stop Code Memory Management on Windows.pptx
Solve Stop Code Memory Management on Windows.pptx
 
Software utilities p3 - unit 2
Software utilities   p3 - unit 2Software utilities   p3 - unit 2
Software utilities p3 - unit 2
 
How to remove conduit search and other toolbars — extended guide
How to remove conduit search and other toolbars — extended guideHow to remove conduit search and other toolbars — extended guide
How to remove conduit search and other toolbars — extended guide
 
Revo Uninstaller Pro Help
Revo Uninstaller Pro HelpRevo Uninstaller Pro Help
Revo Uninstaller Pro Help
 
Application software and system software
Application software and system softwareApplication software and system software
Application software and system software
 
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docxLab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
Lab Deliverable for Lab nYour NameDateTitle Creating, Using, Remo.docx
 
Checking Windows for signs of compromise
Checking Windows for signs of compromiseChecking Windows for signs of compromise
Checking Windows for signs of compromise
 
Readme
ReadmeReadme
Readme
 
Readme
ReadmeReadme
Readme
 
LESSON-2.pptx
LESSON-2.pptxLESSON-2.pptx
LESSON-2.pptx
 
Managing windows server and control panel
Managing windows server and control panelManaging windows server and control panel
Managing windows server and control panel
 
Chapter11 Monitoring Server Performance
Chapter11      Monitoring  Server  PerformanceChapter11      Monitoring  Server  Performance
Chapter11 Monitoring Server Performance
 
apply problem solve.pdf
apply problem solve.pdfapply problem solve.pdf
apply problem solve.pdf
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 

Managing and monitoring opportunities in Windows 7

  • 1. Managing and monitoring opportunities in Windows 7 Operating Systems(CSC2133) - Assignment 01 Rksk Ekanayaka SC/2013/8853
  • 2. Managing and monitoring opportunities in Windows 7 Table of Contents 1. Defragment and Optimize Drives..........................................................................................................2 2. Device Manager ....................................................................................................................................3 3. Disk Cleanup..........................................................................................................................................4 4. Event Viewer.........................................................................................................................................5 5. Performance Monitor ...........................................................................................................................6 6. Services .................................................................................................................................................7 7. Task Manager........................................................................................................................................8 8. Task Scheduler ......................................................................................................................................9 9. Windows Firewall with Advanced Security.........................................................................................10 10. Windows Memory Diagnostic.........................................................................................................11
  • 3. Managing and monitoring opportunities in Windows 7 1. Defragment and Optimize Drives  What is? Optimizing the drive is one of the best ways we can improve computer performance. Windows includes features to help optimize the different types of drives that PCs use today. It can optimize solid-state drives as well as defragment mechanical drives.  How to access  Control panel > Administrative tools > Defragment and Optimize Drives  My computer > Right click on a drive > Properties > Tools > Defragment and Optimize Drives  How to use?  Open Defragment and optimize drives.  Click the drive you want to optimize.  To determine if the drive needs to be optimized, click Analyze.  After Windows is finished analyzing the drive, check the Current status column to see whether you need to optimize the drive. If the drive is more than 10% fragmented, you should optimize the drive now.  Click Optimize.
  • 4. Managing and monitoring opportunities in Windows 7 2. Device Manager  What is? You can use Device Manager to see the devices installed on your PC, update driver software for our devices, check to see if hardware is working properly, and change hardware settings.  How to access  Control Panel > Device Manager  How to use Double-tap or double-click a device category to expand it. If there's a yellow warning icon Yellow warning icon that shows there might be a device problem on the name of a device, there might be a problem with it. Click the device, Click Action, and then click Properties to see details about that device.
  • 5. Managing and monitoring opportunities in Windows 7 3. Disk Cleanup  What is? Disk Cleanup will check our system and then present you with a list of things that can be removed to free up space. It will tell us how much space can be gained by removing unnecessary files in our computer.  How to access  Control Panel > Administrative Tools > Disk Cleanup  How to use?  Open Disk Cleanup.  If you see a drop-down menu with a list of drives, choose the drive you want to clean (generally the C drive).  Click OK.  In the Disk Cleanup for OS dialog box, choose the checkboxes for the file types you want to delete.  Click OK.  When you see a dialog box that prompts you whether to permanently delete the files, click Delete Files.
  • 6. Managing and monitoring opportunities in Windows 7 4. Event Viewer  What is? The Event Viewer displays the Windows event log. Applications, services, and Windows itself write messages to the event log. Viewing the log can sometimes help you identify a problem and look up a specific error message, but most of the messages here aren’t important.  How to access  Control Panel > Administrative Tools > Event Viewer
  • 7. Managing and monitoring opportunities in Windows 7 5. Performance Monitor  What is? The Microsoft Windows Performance Monitor is a feature found in Windows 7 that allows us to view and monitor the performance of your computer either in real time or from a log. In the picture below, is an example of the Performance Monitor running in real time and is graphing the percentage of the processor time. Additional values could be added to this chart by right- clicking on the chart and clicking Add Counters.  How to access  Control Panel > Administrative Tools > Performance Monitor
  • 8. Managing and monitoring opportunities in Windows 7 6. Services  What is? The Services tool displays the services installed on our Windows system and allows us to manage them. Services are low-level programs that run in the background. Many of these services are included with Windows and perform essential system tasks.  How to access  Control Panel > Administrative Tools > Services
  • 9. Managing and monitoring opportunities in Windows 7 7. Task Manager  What is? Task Manager shows you the programs, processes, and services that are currently running on your computer. We can use Task Manager to monitor your computer’s performance or to close a program that is not responding. We can also use Task Manager to view network status and see how your network is functioning. If more than one user is connected to our computer, we can see who is connected, what they are working on, and we can send them a message.  How to access  Press CTRL+SHIFT+ESC  Right click on an empty area of Task bar and click Task manager
  • 10. Managing and monitoring opportunities in Windows 7 8. Task Scheduler  What is? Windows uses the Task Scheduler to automatically run processes at scheduled times. The Task Scheduler application allows us to set our own programs to run on a schedule, view our system’s scheduled tasks, and manage them.  How to access  Control Panel > Administrative Tools > Task Scheduler
  • 11. Managing and monitoring opportunities in Windows 7 9. Windows Firewall with Advanced Security  What is? The Windows Firewall with Advanced Security is a tool which gives us detailed control over the rules that are applied by the Windows Firewall. We can view all the rules that are used by the Windows Firewall, change their properties, create new rules or disable existing ones. The Windows Firewall with Advanced Security includes some monitoring features as well. In the Monitoring section we can find the following information: the firewall rules that are active (both inbound and outbound), the connection security rules that are active and whether there are any active security associations.  How to access  Control Panel > System and Security > Windows Firewall > Advanced settings.
  • 12. Managing and monitoring opportunities in Windows 7 10. Windows Memory Diagnostic  What is? The memory diagnostic tool checks our random access memory (RAM) for defects.Tt writes data to different sectors of your RAM and reads it back. If it gets different data back, it knows our RAM is malfunctioning. This is usually a hardware problem and can generally be solved by replacing at least one stick of RAM.  How to access  Control Panel > Administrative Tools > Windows Memory Diagnostic  How to use  Open Windows Memory Diagnostic  A pop-up will appear on your screen, asking how you'd like to go about checking the memory. The first option will restart your machine and check the memory right now, and the second option checks the next time you choose to reboot. Pick the option that best suits your needs.  Your computer will load a screen that shows the progress of the check and number of passes it will run on the memory. Watch the memory diagnostic tool for errors.