SlideShare a Scribd company logo
1 of 50
Managing Applications, Services, Folders,Managing Applications, Services, Folders,
and Librariesand Libraries
Lesson 4
ObjectivesObjectives
Objective Domain Matrix
Technology Skill Objective Domain Description Objective Domain
Number
Understanding Local versus Network
Applications
Understanding Local versus Network
Applications
3.1.1
Removing or Uninstalling an Application Removing or Uninstalling Applications 3.1.3
Understanding Group Policy and Application
Installation
Understanding Group Policy 3.1.2
Understanding Service Startup Types Understanding Service Startup Types 3.4.1
Understanding Service Accounts Understanding Service Accounts 3.4.2
Understanding Service Dependencies Understanding Service Dependencies 3.4.3
Understanding MSCONFIG Understanding MSCONFIG 1.3.5
Understanding FAT, FAT32, and NTFS Understanding FAT, FAT32, and NTFS 4.1.1
Adding Multiple Local Locations to a Library Adding Multiple Local Locations to a Library 4.4.2
Adding Networked Locations Adding Networked Locations 4.4.3
Understanding Encrypting File System (EFS) Understanding Encrypting File System (EFS) 4.3.2
Understanding Security (Encryption) Understanding Security (Encryption) 5.2.2
Understanding Compression Understanding Compression 4.3.3
Understanding BitLocker Understanding BitLocker 4.3.1
Installing and Managing ApplicationsInstalling and Managing Applications
• An application is a program that:
– Runs “on top” of the operating system or
from a server
– Helps a user perform a specific task, such as
word processing, appointment scheduling, or
accounting
Installing and Managing ApplicationsInstalling and Managing Applications
• Applications installed at the local level or the
network level
– Local installation = software files running
directly from a computer
– Network installation = software files are
made available from an application server on
a network
Uninstalling Local ApplicationsUninstalling Local Applications
Applications Installed over a NetworkApplications Installed over a Network
• Group Policy
• Active Directory
• Group Policy objects (GPOs)
Assigning/Publishing ApplicationsAssigning/Publishing Applications
• Windows 2008 R2 Active Directory Domain
Services (AD DS) uses Group Policy to push
applications to users or computers.
• Using Group Policy, you can assign or
publish an application to all users or
computers in a designated site, domain,
organizational unit (OU), or to a local,
individual user or computer.
Assigning ApplicationsAssigning Applications
• If Group Policy assigns software on each
computer, the software is installed the next
time the computer starts and any users with
the correct permissions who log on to the
computer may run the software.
• If Group Policy assigns software to users, the
next time an authorized user clicks the
Microsoft Office shortcut or menu item (for
example), the software installs on the user’s
computer and Office opens.
Publishing ApplicationsPublishing Applications
• Group Policy can publish an application to
users.
– The next time a user logs on, he can choose
to install the software from a dialog box that
appears.
ServicesServices
• Run in the background on a Windows
system to help the operating system run
other programs
• Services console is the central management
point of services in Windows Vista and
Windows 7
ServicesServices
The General TabThe General Tab
The Log On TabThe Log On Tab
The Recovery TabThe Recovery Tab
The Dependencies TabThe Dependencies Tab
The Print Spooler Service in the ServicesThe Print Spooler Service in the Services
ConsoleConsole
Selecting a Startup TypeSelecting a Startup Type
MSCONFIGMSCONFIG
• Also known as the System Configuration
Utility
• Lets you:
– Enable or disable startup services
– Set boot options such as booting into Safe
Mode
– Access tools like Action Center and Event
Viewer
– More
The General TabThe General Tab
The Boot TabThe Boot Tab
Checking the Safe Boot Option onChecking the Safe Boot Option on
the Boot Tabthe Boot Tab
The Services TabThe Services Tab
Disabling an Unneeded ServiceDisabling an Unneeded Service
The Startup TabThe Startup Tab
Disabling an Unneeded Startup ItemDisabling an Unneeded Startup Item
Selective Startup EnabledSelective Startup Enabled
The Tools TabThe Tools Tab
File SystemsFile Systems
• FAT, FAT32, and NTFS
• NTFS-formatted disks best for Windows 7
• Can convert from one file system to another
• Some conversions destroy existing data
File SystemsFile Systems
File
System
Maximum
Partition
Size
Maximum File Size
FAT 2 GB 2 GB
FAT32 32 GB 4 GB
NTFS 256 TB Limited by size of volume on
which it resides
File SystemsFile Systems
Windows 7 LibrariesWindows 7 Libraries
• A virtual folder that can display content from
different locations (folders, for example) on
your computer or an external drive
• Looks like an ordinary folder but simply
points to files and folders that are located
elsewhere
Windows 7 LibrariesWindows 7 Libraries
Selecting a Library in WhichSelecting a Library in Which
to Include a Folderto Include a Folder
The Locations HyperlinkThe Locations Hyperlink
The Pictures Library Locations Dialog BoxThe Pictures Library Locations Dialog Box
The Pictures Library Locations DialogThe Pictures Library Locations Dialog
Box with a Newly Added FolderBox with a Newly Added Folder
Creating a New LibraryCreating a New Library
EncryptionEncryption
• Encrypted data is “scrambled” but still
readable and usable by the user who
encrypted the file
• That user and other authorized users can
open and change the file as necessary
• Unauthorized users who try to open the file
or copy it receive “Access Denied” message
EncryptionEncryption
• Only the original owner and the computer’s
designated recovery agent can access
encrypted files
• Encryption uses:
– Encryption keys
– Certificates
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypting File System (EFS)
– Encrypts information on hard disks, external
flash disks, CDs, DVDs, backup tapes, and
other types of physical media
• Users can enforce encryption on data files,
folders, and entire drives
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to encrypt files and folders
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypted (EFS) files and folders are
displayed in green in Windows Explorer
Personal Certificates in Certificate ManagerPersonal Certificates in Certificate Manager
Using the Certificate Export WizardUsing the Certificate Export Wizard
CompressionCompression
• The process of decreasing the size of files or
folders without affecting the files’ content
• Decreases large files that would otherwise
use a lot of storage space
• Compressing files replaces repeated data
with pointers to the data; pointers take up
much less space than the repeated data, so
the size of the file is reduced
Compressing Files and Folders in Windows 7Compressing Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to compress files and folders
BitLocker Drive EncryptionBitLocker Drive Encryption
• Encrypts an entire fixed disk to prevent
access by unauthorized users
• BitLocker To Go protects removable drives,
such as external flash drives
• BitLocker is available in Windows Ultimate
and Enterprise editions only
Turning on BitLockerTurning on BitLocker
SummarySummary
• You install applications, or programs, at the local
level or the network level.
• Use Control Panel to uninstall a local application.
• Group Policy lets you control who can install
software, and on which computers, and helps you
push software updates and security configurations
across the network.
• Services run in the background on a Windows
system to help the operating system run other
programs.
SummarySummary
• Use MSCONFIG (System Configuration utility) to
troubleshoot and diagnose startup problems.
• The three primary types of file systems for Windows
are FAT, FAT32, and NTFS.
• A library is a virtual folder that points to resources.
• Encrypting files and folders protects them from
unwanted access. Microsoft uses the Encrypting
File System (EFS) and BitLocker.
• Compression reduces the size of files and folders
without affecting their content.

More Related Content

What's hot

Lesson 5 - Managing Devices
Lesson 5 - Managing DevicesLesson 5 - Managing Devices
Lesson 5 - Managing DevicesGene Carboni
 
An Introduction to Google Chrome OS..........
An Introduction to Google Chrome OS..........An Introduction to Google Chrome OS..........
An Introduction to Google Chrome OS..........VAST TRICHUR
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM DominoJared Roberts
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in LinuxHenry Osborne
 
Course 101: Lecture 5: Linux & GNU
Course 101: Lecture 5: Linux & GNU Course 101: Lecture 5: Linux & GNU
Course 101: Lecture 5: Linux & GNU Ahmed El-Arabawy
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tablesshashikant pabari
 
Windows 2012 server
Windows 2012 serverWindows 2012 server
Windows 2012 serverJaffer Haadi
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10clcewing
 
Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)
Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)
Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)Ahmed El-Arabawy
 
Linux directory structure by jitu mistry
Linux directory structure by jitu mistryLinux directory structure by jitu mistry
Linux directory structure by jitu mistryJITU MISTRY
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File ManagementDamian T. Gordon
 
Sistemas Operativos Web
Sistemas Operativos WebSistemas Operativos Web
Sistemas Operativos Websheila11
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web systemhashim102
 
Open Mic "Notes Federated Login"
Open Mic "Notes Federated Login"Open Mic "Notes Federated Login"
Open Mic "Notes Federated Login"Ranjit Rai
 

What's hot (20)

Lesson 5 - Managing Devices
Lesson 5 - Managing DevicesLesson 5 - Managing Devices
Lesson 5 - Managing Devices
 
An Introduction to Google Chrome OS..........
An Introduction to Google Chrome OS..........An Introduction to Google Chrome OS..........
An Introduction to Google Chrome OS..........
 
Best Practice TLS for IBM Domino
Best Practice TLS for IBM DominoBest Practice TLS for IBM Domino
Best Practice TLS for IBM Domino
 
Windows file system
Windows file systemWindows file system
Windows file system
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Course 101: Lecture 5: Linux & GNU
Course 101: Lecture 5: Linux & GNU Course 101: Lecture 5: Linux & GNU
Course 101: Lecture 5: Linux & GNU
 
Windows 10
Windows 10Windows 10
Windows 10
 
File System and File allocation tables
File System and File allocation tablesFile System and File allocation tables
File System and File allocation tables
 
Windows 2012 server
Windows 2012 serverWindows 2012 server
Windows 2012 server
 
Windows registry forensics
Windows registry forensicsWindows registry forensics
Windows registry forensics
 
Installing windows 10
Installing windows 10Installing windows 10
Installing windows 10
 
Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)
Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)
Embedded Systems: Lecture 13: Introduction to GNU Toolchain (Build Tools)
 
Linux directory structure by jitu mistry
Linux directory structure by jitu mistryLinux directory structure by jitu mistry
Linux directory structure by jitu mistry
 
Operating Systems - File Management
Operating Systems -  File ManagementOperating Systems -  File Management
Operating Systems - File Management
 
Sistemas Operativos Web
Sistemas Operativos WebSistemas Operativos Web
Sistemas Operativos Web
 
introduction to Web system
introduction to Web systemintroduction to Web system
introduction to Web system
 
Common Network Services
Common Network ServicesCommon Network Services
Common Network Services
 
Open Mic "Notes Federated Login"
Open Mic "Notes Federated Login"Open Mic "Notes Federated Login"
Open Mic "Notes Federated Login"
 
FAT vs NTFS
FAT vs NTFSFAT vs NTFS
FAT vs NTFS
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 

Viewers also liked

Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingGene Carboni
 
Basic networking
Basic networkingBasic networking
Basic networkingajeeshr3
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networksRhenan Belisario
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbcHanzel Metrio
 
computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs Rogelio Alvarez
 
Installing computer systems and networks Module
Installing computer systems and networks ModuleInstalling computer systems and networks Module
Installing computer systems and networks ModuleMyra Ramos
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Viewers also liked (10)

Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networks
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 
TMC1
TMC1TMC1
TMC1
 
Final cblm
Final cblmFinal cblm
Final cblm
 
computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs
 
Installing computer systems and networks Module
Installing computer systems and networks ModuleInstalling computer systems and networks Module
Installing computer systems and networks Module
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to Lesson 4 - Managing Applications, Services, Folders, and Libraries

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profitssusera432ea1
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10gameaxt
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network AdministratorGina Alfaro
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Ahmed El-Arabawy
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecturesolarisyougood
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentationsdrayin
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptxOnyemaobiAmarachi
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux SecurityGeo Marian
 
Linux Installation
Linux InstallationLinux Installation
Linux InstallationBIT DURG
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User GuideDirectReader
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installationIshworKhatiwada
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"EPAM Systems
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 

Similar to Lesson 4 - Managing Applications, Services, Folders, and Libraries (20)

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network Administrator
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Linux Installation
Linux InstallationLinux Installation
Linux Installation
 
Hiding files.pptx
Hiding files.pptxHiding files.pptx
Hiding files.pptx
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User Guide
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installation
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Expo ciberseguridad
Expo ciberseguridadExpo ciberseguridad
Expo ciberseguridad
 

More from Gene Carboni

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResumeGene Carboni
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessGene Carboni
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsGene Carboni
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting ProcessGene Carboni
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business TransactionsGene Carboni
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business EnvironmentGene Carboni
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7Gene Carboni
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGene Carboni
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGene Carboni
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGene Carboni
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Gene Carboni
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Gene Carboni
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1Gene Carboni
 
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to HardwareGene Carboni
 

More from Gene Carboni (20)

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResume
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting Process
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting Process
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business Transactions
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business Environment
 
7th ed ppt ch07
7th ed ppt ch077th ed ppt ch07
7th ed ppt ch07
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1
 
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to Hardware
 
7th ed ppt ch10
7th ed ppt ch107th ed ppt ch10
7th ed ppt ch10
 
7th ed ppt ch09
7th ed ppt ch097th ed ppt ch09
7th ed ppt ch09
 
7th ed ppt ch08
7th ed ppt ch087th ed ppt ch08
7th ed ppt ch08
 
7th ed ppt ch06
7th ed ppt ch067th ed ppt ch06
7th ed ppt ch06
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 

Lesson 4 - Managing Applications, Services, Folders, and Libraries

  • 1. Managing Applications, Services, Folders,Managing Applications, Services, Folders, and Librariesand Libraries Lesson 4
  • 2. ObjectivesObjectives Objective Domain Matrix Technology Skill Objective Domain Description Objective Domain Number Understanding Local versus Network Applications Understanding Local versus Network Applications 3.1.1 Removing or Uninstalling an Application Removing or Uninstalling Applications 3.1.3 Understanding Group Policy and Application Installation Understanding Group Policy 3.1.2 Understanding Service Startup Types Understanding Service Startup Types 3.4.1 Understanding Service Accounts Understanding Service Accounts 3.4.2 Understanding Service Dependencies Understanding Service Dependencies 3.4.3 Understanding MSCONFIG Understanding MSCONFIG 1.3.5 Understanding FAT, FAT32, and NTFS Understanding FAT, FAT32, and NTFS 4.1.1 Adding Multiple Local Locations to a Library Adding Multiple Local Locations to a Library 4.4.2 Adding Networked Locations Adding Networked Locations 4.4.3 Understanding Encrypting File System (EFS) Understanding Encrypting File System (EFS) 4.3.2 Understanding Security (Encryption) Understanding Security (Encryption) 5.2.2 Understanding Compression Understanding Compression 4.3.3 Understanding BitLocker Understanding BitLocker 4.3.1
  • 3. Installing and Managing ApplicationsInstalling and Managing Applications • An application is a program that: – Runs “on top” of the operating system or from a server – Helps a user perform a specific task, such as word processing, appointment scheduling, or accounting
  • 4. Installing and Managing ApplicationsInstalling and Managing Applications • Applications installed at the local level or the network level – Local installation = software files running directly from a computer – Network installation = software files are made available from an application server on a network
  • 6. Applications Installed over a NetworkApplications Installed over a Network • Group Policy • Active Directory • Group Policy objects (GPOs)
  • 7. Assigning/Publishing ApplicationsAssigning/Publishing Applications • Windows 2008 R2 Active Directory Domain Services (AD DS) uses Group Policy to push applications to users or computers. • Using Group Policy, you can assign or publish an application to all users or computers in a designated site, domain, organizational unit (OU), or to a local, individual user or computer.
  • 8. Assigning ApplicationsAssigning Applications • If Group Policy assigns software on each computer, the software is installed the next time the computer starts and any users with the correct permissions who log on to the computer may run the software. • If Group Policy assigns software to users, the next time an authorized user clicks the Microsoft Office shortcut or menu item (for example), the software installs on the user’s computer and Office opens.
  • 9. Publishing ApplicationsPublishing Applications • Group Policy can publish an application to users. – The next time a user logs on, he can choose to install the software from a dialog box that appears.
  • 10. ServicesServices • Run in the background on a Windows system to help the operating system run other programs • Services console is the central management point of services in Windows Vista and Windows 7
  • 12. The General TabThe General Tab
  • 13. The Log On TabThe Log On Tab
  • 14. The Recovery TabThe Recovery Tab
  • 15. The Dependencies TabThe Dependencies Tab
  • 16. The Print Spooler Service in the ServicesThe Print Spooler Service in the Services ConsoleConsole
  • 17. Selecting a Startup TypeSelecting a Startup Type
  • 18. MSCONFIGMSCONFIG • Also known as the System Configuration Utility • Lets you: – Enable or disable startup services – Set boot options such as booting into Safe Mode – Access tools like Action Center and Event Viewer – More
  • 19. The General TabThe General Tab
  • 20. The Boot TabThe Boot Tab
  • 21. Checking the Safe Boot Option onChecking the Safe Boot Option on the Boot Tabthe Boot Tab
  • 22. The Services TabThe Services Tab
  • 23. Disabling an Unneeded ServiceDisabling an Unneeded Service
  • 24. The Startup TabThe Startup Tab
  • 25. Disabling an Unneeded Startup ItemDisabling an Unneeded Startup Item
  • 27. The Tools TabThe Tools Tab
  • 28. File SystemsFile Systems • FAT, FAT32, and NTFS • NTFS-formatted disks best for Windows 7 • Can convert from one file system to another • Some conversions destroy existing data
  • 29. File SystemsFile Systems File System Maximum Partition Size Maximum File Size FAT 2 GB 2 GB FAT32 32 GB 4 GB NTFS 256 TB Limited by size of volume on which it resides
  • 31. Windows 7 LibrariesWindows 7 Libraries • A virtual folder that can display content from different locations (folders, for example) on your computer or an external drive • Looks like an ordinary folder but simply points to files and folders that are located elsewhere
  • 33. Selecting a Library in WhichSelecting a Library in Which to Include a Folderto Include a Folder
  • 34. The Locations HyperlinkThe Locations Hyperlink
  • 35. The Pictures Library Locations Dialog BoxThe Pictures Library Locations Dialog Box
  • 36. The Pictures Library Locations DialogThe Pictures Library Locations Dialog Box with a Newly Added FolderBox with a Newly Added Folder
  • 37. Creating a New LibraryCreating a New Library
  • 38. EncryptionEncryption • Encrypted data is “scrambled” but still readable and usable by the user who encrypted the file • That user and other authorized users can open and change the file as necessary • Unauthorized users who try to open the file or copy it receive “Access Denied” message
  • 39. EncryptionEncryption • Only the original owner and the computer’s designated recovery agent can access encrypted files • Encryption uses: – Encryption keys – Certificates
  • 40. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Encrypting File System (EFS) – Encrypts information on hard disks, external flash disks, CDs, DVDs, backup tapes, and other types of physical media • Users can enforce encryption on data files, folders, and entire drives
  • 41. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Advanced Attributes dialog box enables users to encrypt files and folders
  • 42. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Encrypted (EFS) files and folders are displayed in green in Windows Explorer
  • 43. Personal Certificates in Certificate ManagerPersonal Certificates in Certificate Manager
  • 44. Using the Certificate Export WizardUsing the Certificate Export Wizard
  • 45. CompressionCompression • The process of decreasing the size of files or folders without affecting the files’ content • Decreases large files that would otherwise use a lot of storage space • Compressing files replaces repeated data with pointers to the data; pointers take up much less space than the repeated data, so the size of the file is reduced
  • 46. Compressing Files and Folders in Windows 7Compressing Files and Folders in Windows 7 • Advanced Attributes dialog box enables users to compress files and folders
  • 47. BitLocker Drive EncryptionBitLocker Drive Encryption • Encrypts an entire fixed disk to prevent access by unauthorized users • BitLocker To Go protects removable drives, such as external flash drives • BitLocker is available in Windows Ultimate and Enterprise editions only
  • 49. SummarySummary • You install applications, or programs, at the local level or the network level. • Use Control Panel to uninstall a local application. • Group Policy lets you control who can install software, and on which computers, and helps you push software updates and security configurations across the network. • Services run in the background on a Windows system to help the operating system run other programs.
  • 50. SummarySummary • Use MSCONFIG (System Configuration utility) to troubleshoot and diagnose startup problems. • The three primary types of file systems for Windows are FAT, FAT32, and NTFS. • A library is a virtual folder that points to resources. • Encrypting files and folders protects them from unwanted access. Microsoft uses the Encrypting File System (EFS) and BitLocker. • Compression reduces the size of files and folders without affecting their content.

Editor's Notes

  1. The network method, along with Group Policy, gives an administrator more efficient control over who can use the software and who can remove it.
  2. Explain that in a Windows network in a domain environment, administrators can use Group Policy to ease the burden of administering and managing many users and client computers. Group Policy lets you control who may install software, and on which computers, and helps you push software updates and security configurations across the network. Group policies also exist in Windows 7 and other Windows operating systems. They are referred to as Local Group Policies and affect only the users who log on to a particular computer. This section focuses on Group Policy at the network domain level.
  3. Service startup types: Automatic (Delayed Start): The service starts approximately two minutes after the system has completed starting the operating system. Automatic: The service starts as the operating system starts. Manual: The service must be started manually, by a user, a dependent service, or a program. Disabled: The service is disabled and will not start.
  4. After changing options on the Startup tab, the Selective startup option is enabled on the General tab.
  5. The Disk Management MMC snap-in displays disks and partitions, and the file system in use.
  6. Libraries are accessed in Windows Explorer, just like files and folders. Windows 7 includes several default libraries: Documents, Music, Pictures, and Videos.
  7. When you add new files to a BitLocker-encrypted disk, the files are encrypted automatically. If you copy the files to another drive, BitLocker automatically decrypts the files, which means they’re no longer protected. Some computers have a Trusted Platform Module (TPM) chip on the motherboard. If the chip is present, BitLocker uses the TPM chip to protect the BitLocker keys.