This provides a list of frequently used Run Commands for MS Windows XP Operating Systems in an easy and understandable format.This is very useful for improving the productivity of System Users.
This document provides information about various categories, menus, and features available in Windows Explorer, Control Panel, Skype, and Adobe Photoshop. It describes the basic information category in Windows Explorer, the file, edit, and view menus, and features like date and time, devices and printers, and display in Control Panel. It also explains the contacts window and chat features in Skype and tools to adjust brightness, levels, and crop images in Photoshop.
This document provides step-by-step instructions for installing the Windows 7 operating system on a personal computer. It outlines 21 steps for installing Windows 7, including entering the computer's BIOS, booting from the Windows 7 DVD, selecting language and time preferences, accepting license terms, selecting the installation drive, and completing post-installation setup such as creating a user account. The instructions are intended to guide a technician through an easy Windows 7 installation that is compatible with the computer's hardware.
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It begins with entering the computer's BIOS setup to select booting from the installation DVD. The user then inserts the Windows 7 DVD and begins the installation process, selecting language and time settings. The installation process copies and expands files, installs features and updates, and restarts the computer multiple times. It concludes by personalizing the installation with a username, password, and product key before completing the setup process.
Windows 7 installation involves a multi-step process:
1) Booting from the Windows 7 DVD and selecting installation options;
2) Selecting the drive to install Windows 7 and partitioning if desired;
3) Installing Windows 7 files and features which takes the most time;
4) Completing the setup by creating a user account and configuring network and time settings.
Step by Step Window 7 Installation ! Designed By :- Ramandeep KaurRamankaurs
The document provides contact information for Batra Computer Centre including their phone number, website, and email address. It also contains instructions on how to install Windows 7 on a computer, with 10 steps that include entering the BIOS, selecting the CD-ROM drive as the boot device, powering on from the disc, choosing setup options, and installing Windows on the preferred hard drive and partition. Contact details are provided at the end for any queries.
The document provides step-by-step instructions for installing Windows 7 on a computer. It involves booting from the Windows 7 DVD, selecting language and keyboard preferences, accepting license terms, selecting a drive to install to, and completing the installation process which includes restarting the computer multiple times. Upon completion, the user will be prompted to create an account with a username and optionally set a password.
Windows 7 installation involves a 20 step process:
1. Enter the BIOS and select booting from the Windows 7 DVD
2. Insert the Windows 7 DVD and start up the computer to begin installation
3. Select language, time, and keyboard preferences before clicking install
4. Choose whether to upgrade an existing Windows version or do a fresh install
5. Select the drive to install Windows 7 and any partitioning preferences
This document provides information about various categories, menus, and features available in Windows Explorer, Control Panel, Skype, and Adobe Photoshop. It describes the basic information category in Windows Explorer, the file, edit, and view menus, and features like date and time, devices and printers, and display in Control Panel. It also explains the contacts window and chat features in Skype and tools to adjust brightness, levels, and crop images in Photoshop.
This document provides step-by-step instructions for installing the Windows 7 operating system on a personal computer. It outlines 21 steps for installing Windows 7, including entering the computer's BIOS, booting from the Windows 7 DVD, selecting language and time preferences, accepting license terms, selecting the installation drive, and completing post-installation setup such as creating a user account. The instructions are intended to guide a technician through an easy Windows 7 installation that is compatible with the computer's hardware.
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It begins with entering the computer's BIOS setup to select booting from the installation DVD. The user then inserts the Windows 7 DVD and begins the installation process, selecting language and time settings. The installation process copies and expands files, installs features and updates, and restarts the computer multiple times. It concludes by personalizing the installation with a username, password, and product key before completing the setup process.
Windows 7 installation involves a multi-step process:
1) Booting from the Windows 7 DVD and selecting installation options;
2) Selecting the drive to install Windows 7 and partitioning if desired;
3) Installing Windows 7 files and features which takes the most time;
4) Completing the setup by creating a user account and configuring network and time settings.
Step by Step Window 7 Installation ! Designed By :- Ramandeep KaurRamankaurs
The document provides contact information for Batra Computer Centre including their phone number, website, and email address. It also contains instructions on how to install Windows 7 on a computer, with 10 steps that include entering the BIOS, selecting the CD-ROM drive as the boot device, powering on from the disc, choosing setup options, and installing Windows on the preferred hard drive and partition. Contact details are provided at the end for any queries.
The document provides step-by-step instructions for installing Windows 7 on a computer. It involves booting from the Windows 7 DVD, selecting language and keyboard preferences, accepting license terms, selecting a drive to install to, and completing the installation process which includes restarting the computer multiple times. Upon completion, the user will be prompted to create an account with a username and optionally set a password.
Windows 7 installation involves a 20 step process:
1. Enter the BIOS and select booting from the Windows 7 DVD
2. Insert the Windows 7 DVD and start up the computer to begin installation
3. Select language, time, and keyboard preferences before clicking install
4. Choose whether to upgrade an existing Windows version or do a fresh install
5. Select the drive to install Windows 7 and any partitioning preferences
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It outlines 21 steps, beginning with entering the computer's BIOS to select the DVD drive for booting, inserting the Windows 7 installation DVD, selecting language and keyboard preferences, choosing an installation type (upgrade or custom), selecting the drive to install to, and completing the installation process which includes setting up a user account, password, product key, Windows update settings, and network location if connected to a network.
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It begins by explaining the need to enter the computer's BIOS setup and configure it to boot from the installation DVD. It then outlines the 21 steps to complete the Windows 7 installation, which includes selecting language and region settings, accepting license terms, selecting upgrade or custom installation options, installing to the selected drive, setting up a user account, and configuring Windows update settings.
Control Panel is one of the most important locations in Windows XP for managing utilities. It contains categories for configuring accessories like display, sound, keyboards, mice, and networking. It also allows adding or removing programs, configuring user accounts and regional settings, maintaining security and performance, and adding new hardware. Control Panel provides centralized access to customize many aspects of the operating system.
The Control Panel allows users to configure and manage various system settings and components in Windows. It has two main views: Category View and Classic View. Category View organizes settings into categories like Appearance and Personalization, Hardware and Sound, Network and Internet, and Programs. Classic View provides direct access to individual settings like Display, Date and Time, Sounds and Audio Devices. The Control Panel provides options to configure components, add/remove programs, set preferences, and manage user accounts, networking, security and other system settings.
Batra Computer Centre is An ISO certified 9001:2008 training Centre in Ambala.
We Provide Best Window 7 Training in Ambala. BATRA COMPUTER CENTRE provides best training in C, C++, S.E.O, Web Designing, Web Development and So many other courses are available.
Hi friends today I am here with a power point presentation showing how to install Windows 7 in our PC with the help of its file stored in a media (i.e.pen drive)
This is a presentation about how Windows 7 is installed fresh, using a memory stick. This is a basic step-by-step with images.
This is part of my IT coursework*
As a technician, you must understand how to install operating systems that are compatible with computer hardware. The document outlines the 20 step process for installing Windows 7 on a personal computer, including entering the BIOS, booting from the installation disc, selecting language and time preferences, accepting license terms, selecting partitions for installation, copying and expanding files, setting up user accounts and passwords, and configuring network and Windows update settings.
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It outlines 20 steps for the installation process, including preparing the computer by entering the BIOS setup and changing boot options, inserting the Windows 7 DVD, selecting language and time settings, selecting the drive to install Windows 7, and completing the installation process which includes several automatic restarts. The instructions indicate the installation process is designed to be easy to follow for a technician installing an operating system.
This document provides an introduction to basic operating system concepts. It defines what an operating system is and discusses its main goals of executing user programs, making the computer convenient to use, and efficiently utilizing computer hardware. It then describes different types of systems that operating systems support, including mainframe, desktop, multiprocessor, distributed, clustered, and real-time systems. The key aspects and features required of operating systems to support these different system types are also outlined.
Windows 10 will include a customizable Start menu, allow apps to run in resizable windows, feature multiple desktops and enhanced snap layouts. It will launch in April 2015 and work across devices from PCs and tablets to smartphones, adjusting its interface accordingly. Early adopters can join the Windows Insider Program to help shape Windows 10 ahead of its release.
The document discusses operating systems and Windows. It defines an operating system as the most important program that runs a computer and manages other programs. It describes operating system functions like recognizing input/output, tracking files, and controlling devices. It outlines four main types of operating systems and provides examples like Windows and MacOS. It explains how operating systems provide platforms for applications and manage memory, hardware, and resources. It provides details on the boot process, graphical user interfaces, desktop components like the taskbar and windows, and basic window features.
Evolution of Microsoft windows operating systemsSai praveen Seva
- Microsoft Windows is a series of graphical interface operating systems developed, marketed, and sold by Microsoft. It introduced the concept of using a mouse and iconic windows to drive a computer's graphical user interface.
- Early versions included Windows 1.0 in 1985, Windows 2.0 in 1987, and Windows 3.0 in 1990. Windows 3.0 became the first widely successful version.
- Later major releases included Windows 95 in 1995, Windows 98 in 1998, Windows 2000 in 2000, Windows XP in 2001, Windows Vista in 2007, Windows 7 in 2009, Windows 8 in 2012, and Windows 10 in 2015. Each new version built upon the previous with updated features, improved security, and new capabilities.
The document discusses the history and features of various Windows operating systems, including:
- Windows was developed by Microsoft to overcome limitations of MS-DOS and the first successful version was Windows 3.0 in 1990. Common versions included Windows 95, 98, 2000, XP, Vista, 7, 8, and 8.1.
- Early systems included MS-DOS, Windows 95 which included a DOS emulator, and Windows NT which did not use DOS.
- Windows 2000 was the last to use the "Windows NT" designation before being succeeded by Windows XP for desktops and Windows Server 2003 for servers.
- Newer versions like Windows 7, 8, and 8.1 focused on improvements
Windows 10 won’t be launching for quite a while but we already know a lot about Microsoft’s upcoming OS. From Xbox for Windows and Cortana for desktop to a resurrected Start Menu and new multitasking tools, the new platform will offer a bevy of new features. These are the 10 best.
The document discusses the functions and types of operating systems. It defines an operating system as the most important program that runs on a computer and performs basic tasks like recognizing input/output and managing files. The major functions of an operating system are providing an interface for users, managing system resources like memory and CPU time, running applications, and handling security and access rights. The document outlines different types of operating systems including real-time, single-user/multi-tasking, multi-user, distributed, and embedded operating systems. Examples of specific operating systems are also provided.
The document provides an overview of operating systems, including what constitutes an OS (kernel, system programs, application programs), storage device hierarchy, system calls, process creation and states, process scheduling, inter-process communication methods like shared memory and pipes, synchronization techniques like mutexes and semaphores, readers-writers problem, and potential for deadlocks. Key concepts covered include kernel mode vs user mode, process control blocks, context switching, preemption, and requirements for deadlock situations.
The document discusses operating systems and real-time operating systems. It defines an operating system as software that manages computer hardware resources and provides common services for programs. It then describes the main functions of an operating system including managing resources and devices, running applications, and providing a user interface. The document also discusses different types of operating systems including single-user/single-tasking, single-user/multi-tasking, and multi-user/multi-tasking. It defines a real-time operating system as one intended for real-time applications that has advanced scheduling algorithms to ensure deterministic timing behavior.
The operating system is system software that monitors, controls, and maintains the overall functions of the computer. It performs key functions such as process management, resource management, file management, communication management, security management, and memory management. Process management involves starting and stopping processes from boot up to shutdown. Resource management installs drivers and coordinates peripherals. File management handles file naming, organization, location, and attributes. Communication management facilitates interaction between users, applications, and hardware both internally and between networked computers. Security management provides virus protection, passwords, firewalls, and access controls.
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It outlines 21 steps, beginning with entering the computer's BIOS to select the DVD drive for booting, inserting the Windows 7 installation DVD, selecting language and keyboard preferences, choosing an installation type (upgrade or custom), selecting the drive to install to, and completing the installation process which includes setting up a user account, password, product key, Windows update settings, and network location if connected to a network.
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It begins by explaining the need to enter the computer's BIOS setup and configure it to boot from the installation DVD. It then outlines the 21 steps to complete the Windows 7 installation, which includes selecting language and region settings, accepting license terms, selecting upgrade or custom installation options, installing to the selected drive, setting up a user account, and configuring Windows update settings.
Control Panel is one of the most important locations in Windows XP for managing utilities. It contains categories for configuring accessories like display, sound, keyboards, mice, and networking. It also allows adding or removing programs, configuring user accounts and regional settings, maintaining security and performance, and adding new hardware. Control Panel provides centralized access to customize many aspects of the operating system.
The Control Panel allows users to configure and manage various system settings and components in Windows. It has two main views: Category View and Classic View. Category View organizes settings into categories like Appearance and Personalization, Hardware and Sound, Network and Internet, and Programs. Classic View provides direct access to individual settings like Display, Date and Time, Sounds and Audio Devices. The Control Panel provides options to configure components, add/remove programs, set preferences, and manage user accounts, networking, security and other system settings.
Batra Computer Centre is An ISO certified 9001:2008 training Centre in Ambala.
We Provide Best Window 7 Training in Ambala. BATRA COMPUTER CENTRE provides best training in C, C++, S.E.O, Web Designing, Web Development and So many other courses are available.
Hi friends today I am here with a power point presentation showing how to install Windows 7 in our PC with the help of its file stored in a media (i.e.pen drive)
This is a presentation about how Windows 7 is installed fresh, using a memory stick. This is a basic step-by-step with images.
This is part of my IT coursework*
As a technician, you must understand how to install operating systems that are compatible with computer hardware. The document outlines the 20 step process for installing Windows 7 on a personal computer, including entering the BIOS, booting from the installation disc, selecting language and time preferences, accepting license terms, selecting partitions for installation, copying and expanding files, setting up user accounts and passwords, and configuring network and Windows update settings.
The document provides step-by-step instructions for installing Windows 7 on a personal computer. It outlines 20 steps for the installation process, including preparing the computer by entering the BIOS setup and changing boot options, inserting the Windows 7 DVD, selecting language and time settings, selecting the drive to install Windows 7, and completing the installation process which includes several automatic restarts. The instructions indicate the installation process is designed to be easy to follow for a technician installing an operating system.
This document provides an introduction to basic operating system concepts. It defines what an operating system is and discusses its main goals of executing user programs, making the computer convenient to use, and efficiently utilizing computer hardware. It then describes different types of systems that operating systems support, including mainframe, desktop, multiprocessor, distributed, clustered, and real-time systems. The key aspects and features required of operating systems to support these different system types are also outlined.
Windows 10 will include a customizable Start menu, allow apps to run in resizable windows, feature multiple desktops and enhanced snap layouts. It will launch in April 2015 and work across devices from PCs and tablets to smartphones, adjusting its interface accordingly. Early adopters can join the Windows Insider Program to help shape Windows 10 ahead of its release.
The document discusses operating systems and Windows. It defines an operating system as the most important program that runs a computer and manages other programs. It describes operating system functions like recognizing input/output, tracking files, and controlling devices. It outlines four main types of operating systems and provides examples like Windows and MacOS. It explains how operating systems provide platforms for applications and manage memory, hardware, and resources. It provides details on the boot process, graphical user interfaces, desktop components like the taskbar and windows, and basic window features.
Evolution of Microsoft windows operating systemsSai praveen Seva
- Microsoft Windows is a series of graphical interface operating systems developed, marketed, and sold by Microsoft. It introduced the concept of using a mouse and iconic windows to drive a computer's graphical user interface.
- Early versions included Windows 1.0 in 1985, Windows 2.0 in 1987, and Windows 3.0 in 1990. Windows 3.0 became the first widely successful version.
- Later major releases included Windows 95 in 1995, Windows 98 in 1998, Windows 2000 in 2000, Windows XP in 2001, Windows Vista in 2007, Windows 7 in 2009, Windows 8 in 2012, and Windows 10 in 2015. Each new version built upon the previous with updated features, improved security, and new capabilities.
The document discusses the history and features of various Windows operating systems, including:
- Windows was developed by Microsoft to overcome limitations of MS-DOS and the first successful version was Windows 3.0 in 1990. Common versions included Windows 95, 98, 2000, XP, Vista, 7, 8, and 8.1.
- Early systems included MS-DOS, Windows 95 which included a DOS emulator, and Windows NT which did not use DOS.
- Windows 2000 was the last to use the "Windows NT" designation before being succeeded by Windows XP for desktops and Windows Server 2003 for servers.
- Newer versions like Windows 7, 8, and 8.1 focused on improvements
Windows 10 won’t be launching for quite a while but we already know a lot about Microsoft’s upcoming OS. From Xbox for Windows and Cortana for desktop to a resurrected Start Menu and new multitasking tools, the new platform will offer a bevy of new features. These are the 10 best.
The document discusses the functions and types of operating systems. It defines an operating system as the most important program that runs on a computer and performs basic tasks like recognizing input/output and managing files. The major functions of an operating system are providing an interface for users, managing system resources like memory and CPU time, running applications, and handling security and access rights. The document outlines different types of operating systems including real-time, single-user/multi-tasking, multi-user, distributed, and embedded operating systems. Examples of specific operating systems are also provided.
The document provides an overview of operating systems, including what constitutes an OS (kernel, system programs, application programs), storage device hierarchy, system calls, process creation and states, process scheduling, inter-process communication methods like shared memory and pipes, synchronization techniques like mutexes and semaphores, readers-writers problem, and potential for deadlocks. Key concepts covered include kernel mode vs user mode, process control blocks, context switching, preemption, and requirements for deadlock situations.
The document discusses operating systems and real-time operating systems. It defines an operating system as software that manages computer hardware resources and provides common services for programs. It then describes the main functions of an operating system including managing resources and devices, running applications, and providing a user interface. The document also discusses different types of operating systems including single-user/single-tasking, single-user/multi-tasking, and multi-user/multi-tasking. It defines a real-time operating system as one intended for real-time applications that has advanced scheduling algorithms to ensure deterministic timing behavior.
The operating system is system software that monitors, controls, and maintains the overall functions of the computer. It performs key functions such as process management, resource management, file management, communication management, security management, and memory management. Process management involves starting and stopping processes from boot up to shutdown. Resource management installs drivers and coordinates peripherals. File management handles file naming, organization, location, and attributes. Communication management facilitates interaction between users, applications, and hardware both internally and between networked computers. Security management provides virus protection, passwords, firewalls, and access controls.
Jakob Nielsen developed the method of 'Heuristic Evaluation' to help identify problems with an interface. This presentation explains the 10 rules of thumb or heuristics with examples.
The command prompt for Windows is probably one of the most powerful applications in this operating system, but is far from the eyes of most users yet! Go beyond the more modern features of Windows
2 Module - Operating Systems Configuration and Use by Mark John LadoMark John Lado, MIT
This document outlines Module 2 of an Operating Systems course, which covers configuration and use of operating systems. It includes learning objectives, content on operating system wake up calls and booting processes, discussions of graphical user interfaces (GUIs) in Windows and Mac operating systems, and descriptions of common GUI components like icons, windows, menus, pointers, and data sharing between programs. The module concludes with learning activities to test understanding of acronyms, operating system advantages, and the differences between tools and utilities.
This document provides instructions for basic computer use, including starting up a computer, logging in, using a mouse and keyboard, opening programs from the start menu like Calculator and Paint, and shutting down. It explains that hardware are physical computer components while software are programs and applications. It also outlines topics to be covered in future sessions such as laptops vs desktops, internal computer components, and word processing.
Os and network activity javier guerreroJGuerreroM96
This document provides information about various Windows XP tools and computer networking topics. It includes sections on mouse properties, adding/removing programs, user accounts, security center, regional options, how to set up a basic computer network with 7 PCs and a printer, MS-DOS commands like ipconfig and ping to test the network, and solutions for common security problems like ransomware infections. The document serves as a guide to understanding and working with basic Windows and networking functions.
A computer is a machine that processes data based on a set of instructions provided by software. It has components like a CPU, hard drive, RAM, and monitor. Software includes programs for games, documents, and multimedia. Operating systems run basic computer operations and come pre-installed on purchased computers like Windows, Mac OS, and Linux. Computers are turned on by pressing the power button and turned off through the start menu or keyboard shortcut. Mice are used by left clicking to select and right clicking for shortcuts.
Steps to fix remote desktop connection has stopped working in windows 10scarlet christer
You would generally get this error when you are trying to connect your computer to other computer remotely. But this can be fixed by following the methods mentioned in it.
Steps to fix remote desktop connection has stopped working in windows 10scarlet christer
The document provides two methods to fix the "Remote Desktop Connection has stopped working" error in Windows 10. Method 1 involves allowing Remote Desktop through the Windows Firewall. Method 2 involves checking that all services containing "remote" in the name are set to Automatic or Manual and are not disabled. It also recommends using a PC repair tool to automatically diagnose and fix errors that may be preventing Remote Desktop from working properly.
This document provides an introduction to the Windows XP Professional and Knoppix-STD operating systems. It discusses important commands for each OS, including ipconfig, regedit, netstat, and Task Manager for Windows XP, and ls, cd, mkdir for Knoppix. It also covers establishing a directory structure in Windows XP and logging into Knoppix to use basic file and system commands.
This document provides an introduction to computers by defining what a computer is, listing the types and components of computers, describing basic software and operating systems, and how to turn a computer on and off and use a mouse. A computer processes input data based on instructions from software to produce output. Types include desktops, laptops, notebooks, PDAs and tablets. Components are the CPU, drives, RAM, ports, printer, monitor and scanners. Software includes games, documents and multimedia. Operating systems run basic computer operations and come pre-installed. Users turn computers on by pressing the power button and off through menus or keyboard shortcuts. Mice are used through left and right clicking.
Computer is an electronic machine that can store and process data like numbers, letters, and special characters. It has hardware components like the CPU, memory, storage devices, and input/output devices. Software programs allow the computer to perform tasks. Common software includes operating systems like Windows and application programs. Files are used to store data on the computer and have file extensions to identify the program used to create them. Folders help organize files on the storage drives of the computer.
This document provides an introduction to computer programming. It discusses why computers can be programmed, and defines what a program is. It then explains the basic hardware components of a computer like the CPU, memory, and input/output devices. It also discusses software, the program development cycle of analyzing a problem, designing an algorithm, writing code, testing and debugging. It provides examples of flowcharts and pseudocode to design algorithms. The overall summary is an introductory overview of computer programming concepts.
This document provides a basic guide to computer fundamentals, covering topics such as using a mouse and keyboard, understanding the desktop interface, setting up user accounts, connecting to the internet, installing and uninstalling software, and an introduction to Microsoft Office applications. It explains how to navigate the desktop, start a web browser, locate and follow installation instructions for software, and remove unwanted programs. Common MS Office applications like Word, Excel, PowerPoint and Outlook are also introduced along with their basic functions.
This document provides instructions and explanations for various Linux processes and commands. It begins with a prayer, then discusses initializing processes as foreground or background. It explains how to view active processes using commands like ps and top. The document discusses the different states a process can be in, and how to stop, kill, or renice processes. It includes screenshots demonstrating the top command and its various options. Finally, it discusses the cat and ls commands along with examples of using their options.
A computer is a machine that processes input data and produces output based on a set of instructions provided by software. Computers come in different forms like desktops, laptops, notebooks, PDAs, and tablets. The main components of a computer are the CPU, storage drives, RAM, ports, keyboard, mouse, monitor, and optional devices like printers and scanners. Software provides instructions to the computer on how to process information and includes programs like games, office applications, and operating systems, which run basic computer operations. To use a computer, you turn it on by pressing the power button and turn it off through the start menu or by pressing control-alt-delete. The mouse is used for selection and navigation through left
This document provides an overview of getting started with Windows 7, including how to start Windows 7, what is on the desktop, how to use the taskbar, arrange icons and windows, use the Start menu and search, learn about basic Windows controls, check your Windows version, understand updates, access help, and shut down Windows 7. The document contains information on these topics in the form of descriptive text and screenshots.
Windows key not working fix this in minutes by these effective 9 methods!Technograhx
The document provides 9 methods to fix an unresponsive Windows key on a keyboard. Some potential causes of the Windows key not working include having the keyboard set to gaming mode, issues with the Start menu or File Explorer, and outdated or corrupted keyboard drivers. The methods include checking the Start menu, using PowerShell commands, disabling gaming mode, restarting Windows/File Explorer, and reinstalling keyboard drivers. The document also recommends checking for malware and viruses as potential causes.
Practical work 3. Sofware OS. Kind of sofware (1).pptxssuserd2a022
This document discusses operating systems and using the command prompt in Windows 10. It defines an operating system as software that manages a computer's memory, processes, and hardware/software to allow users to interact with a computer without knowing its programming language. It lists common operating systems like Windows, Mac OS, Linux, and provides examples of system software and application software. It then explains how to open the command prompt in Windows 10 and lists some common commands like dir, cd, cls, mkdir, rmdir for navigating directories and managing files. It provides tasks for creating subdirectories, deleting and renaming files using these commands.
This document provides information about module 2 of the ECDL syllabus which covers using the computer and managing files. It includes sections on starting and shutting down the computer, using windows, file management tasks like creating folders and moving files, and other operating system functions like setting the date and time or changing display settings. The document is an educational reference for students taking the ECDL certification course.
Computer hardware includes the physical parts of a computer, such as the case, central processing unit (CPU), random access memory (RAM), monitor, mouse, keyboard, computer data storage, graphics card, sound card, speakers and motherboard.[1][2]
By contrast, software is the set of instructions that can be stored and run by hardware. Hardware is so-termed because it is hard or rigid with respect to changes, whereas software is soft because it is easy to change.
Hardware is typically directed by the software to execute any command or instruction. A combination of hardware and software forms a usable computing system, although other systems exist with only hardware.
Von Neumann architecture
Main articles: Von Neumann architecture and Stored-program computer
Von Neumann architecture scheme
The template for all modern computers is the Von Neumann architecture, detailed in a 1945 paper by Hungarian mathematician John von Neumann. This describes a design architecture for an electronic digital computer with subdivisions of a processing unit consisting of an arithmetic logic unit and processor registers, a control unit containing an instruction register and program counter, a memory to store both data and instructions, external mass storage, and input and output mechanisms.[3] The meaning of the term has evolved to mean a stored-program computer in which an instruction fetch and a data operation cannot occur at the same time because they share a common bus. This is referred to as the Von Neumann bottleneck and often limits the performance of the system.[4]
Personal computer
Basic hardware components of a personal computer, including a monitor, a motherboard, a CPU, a RAM, two expansion cards, a power supply, an optical disc drive, a hard disk drive, a keyboard and a mouse
Inside a custom-built computer: power supply at the bottom has its own cooling fan
The personal computer is one of the most common types of computer due to its versatility and relatively low price. Desktop personal computers have a monitor, a keyboard, a mouse, and a computer case. The computer case holds the motherboard, fixed or removable disk drives for data storage, the power supply, and may contain other peripheral devices such as modems or network interfaces. Some models of desktop computers integrated the monitor and keyboard into the same case as the processor and power supply. Separating the elements allows the user to arrange the components in a pleasing, comfortable array, at the cost of managing power and data cables between them.
Laptops are designed for portability but operate similarly to desktop PCs.[5] They may use lower-power or reduced size components, with lower performance than a similarly priced desktop computer.[6] Laptops contain the keyboard, display, and processor in one case. The monitor in the folding upper cover of the case can be closed for transportation, to protect the screen and keyboard. Instead of a mouse, laptops may have a touchpad or pointing
Difference between wcf and asp.net web apiUmar Ali
WCF is Microsoft's unified programming model for building service-oriented applications that supports multiple transport protocols and message exchange patterns. It enables building secure and reliable services that can integrate across platforms. ASP.NET Web API is a framework for building HTTP services and is optimized for browser and mobile access. It only supports HTTP protocol but provides MVC features like routing and controllers. WCF supports advanced protocols like reliable messaging while ASP.NET Web API is best for resource-oriented HTTP services that need to support a broad range of clients. The document compares key differences between WCF and ASP.NET Web API across areas like protocols, hosting, description, and when to choose each technology.
Difference between ActionResult() and ViewResult()Umar Ali
ActionResult() is an abstract base class that defines the general result type for MVC actions. ViewResult() is a concrete subclass of ActionResult() that renders a specified view to the response stream. Some key subtypes of ActionResult() include ViewResult(), PartialViewResult(), EmptyResult(), RedirectResult(), and JsonResult(). ActionResult() allows for polymorphism and dynamic behavior by returning different result types from an action. It should be used as the return type when an action may have different behaviors, while ViewResult() can be used when an action will definitely return a view.
Difference between asp.net mvc 3 and asp.net mvc 4Umar Ali
The document compares ASP.NET MVC 3 and ASP.NET MVC 4 across 12 categories. Some key differences include:
- Bundling and minification, display modes, and custom controller locations are only supported in MVC 4.
- The empty project template is truly empty in MVC 4, unlike MVC 3.
- Features like WebSockets, SignalR, recipes, mobile project templates, and Web API are new to MVC 4.
- Asynchronous controller implementation is simpler using async/await in MVC 4 versus AsyncController in MVC 3.
- MVC 4 has better support for Azure, Facebook/Twitter authentication, and various new project templates.
Difference between asp.net web api and asp.net mvcUmar Ali
The document compares ASP.NET Web API and ASP.NET MVC. ASP.NET Web API is focused on outputting raw data through HTTP services, while ASP.NET MVC is focused on outputting HTML views. Some key differences include: ASP.NET Web API assumes data comes from the query string or form body, while MVC assumes multiple sources; Web API supports content negotiation and self-hosting, while MVC does not; and Web API is better for non-browser clients while MVC is optimized for browsers. Both can be used together in a single project.
Difference between asp.net web forms and asp.net mvcUmar Ali
The document compares ASP.NET WebForms and ASP.NET MVC across 14 criteria. Some key differences include:
- ASP.NET WebForms uses a "Page Controller" pattern where each page has a code-behind class controller, while ASP.NET MVC uses a "Front Controller" pattern with a single central controller.
- ASP.NET WebForms is tightly coupled with the controller dependent on the view, while ASP.NET MVC is loosely coupled with separate and independent controller and view.
- This loose coupling makes ASP.NET MVC easier to test through test-driven development compared to WebForms.
- ASP.NET MVC gives developers full control over HTML, JavaScript and
ASP.NET MVC difference between questions list 1Umar Ali
The document lists 41 questions asking about differences between various concepts in ASP.NET MVC, web development and design patterns including:
- Differences between MVC and MVP, ViewBag and ViewData, routing in webforms vs MVC, MVC and Web API, Razor and ASPX view engines, MVC and Web Forms.
- Differences between TempData and Session, MVC project templates, asynchronous controller implementations between MVC versions.
- Differences between ways to render views and redirect in MVC, ViewData vs ViewBag vs TempData vs Session, ActionResult and ViewResult.
- Differences between MVC versions, partial and strongly typed views, MVC vs MVP vs M
This document provides two reference links to websites that can be used to quickly check if file hosting links are working or dead without having to manually check each link. The referenced sites allow for bulk checking of file hosting links to determine their status in a fast and efficient manner.
This document lists the Alexa global rankings and brief descriptions of various affiliate marketing network sites. It includes top-ranking sites like Google and Amazon affiliates as well as smaller networks ranging from the hundreds to tens of thousands in global rank. The document provides a high-level overview of major affiliate networks for people to consider and get more details by visiting the listed sites.
This document lists the Alexa global rankings and brief details of various online learning and tutorial sites. The top ranked sites include TutsPlus at 1,062, Lynda at 2,495, and Udemy at 5,818. Other popular sites mentioned are Teamtreehouse, Video2Brain, Pluralsight, Informit, VTC, Infiniteskills, Total Training, Educator, and Tekpub. The document directs to a site for further updates on global rankings of online learning sites.
This document lists the Alexa global rankings and brief details of the top 20 news websites, including Google News at #2, Yahoo News at #4, CNN at #8, Huffington Post at #15, New York Times at #17, and Fox News at #19. It concludes by providing a URL for more information on global website rankings.
How to create user friendly file hosting link sitesUmar Ali
This document provides tips for creating effective file hosting link sites using WordPress. It recommends using responsive themes for mobile access, creating unique content to improve search engine indexing, keeping posts SEO optimized with plugins, adding image alt text, checking links before posting with checker tools, removing broken links daily with plugins, and regularly updating dead links to maintain a high number of working downloads. The goal is to effectively share verified file links across devices while maintaining good rankings over time.
The document discusses a collection of weak hadiths that contradict and confuse Muslims. It notes that some hadiths contain errors or fabrications. The author argues that Muslims should critically examine hadiths to distinguish authentic ones from inauthentic ones, in order to have sound religious beliefs and practices based on reliable Islamic sources.
This document contains 23 hadith (sayings or traditions of the Prophet Muhammad) related to purification and cleanliness as narrated by various Sahabah (companions of the Prophet). The hadith cover topics like the parts of the body to be washed during purification, maintaining cleanliness in the home and clothes, and the virtues of being clean. The hadith are brief, usually only a few sentences, and emphasize the importance of physical and spiritual purification in Islam.
This provides a brief statistics of how many websites in the world are developed with ASP.Net Technology and the current Job Opportunities of studying the .NET.
This document lists the Alexa rankings of various Indian news websites along with brief details about each site. It provides the site name, global Alexa ranking, and a brief description for over 15 Indian news sites, with Indiatimes ranking the highest at 126 and Telegraphindia ranking the lowest at over 21,000. It concludes by providing a URL for more regular updates on global site rankings.
This document lists the Alexa global rankings and brief details for 15 photo sharing and hosting websites, ranging from Tumblr at rank 32 to Snapfish at rank 52,040. It also provides a link for further updates on website rankings and information.
There comes need to find files hosted on file hosting sites alone like rapidshare.com,mediafire.com,extabit.com etc., . Users who want to search effectively, then the following list of file hosting search engines will be useful.
AJAX allows asynchronous data loading without page reloads, while jQuery is a JavaScript library that simplifies AJAX calls and DOM manipulation. AJAX uses multiple technologies like CSS, HTML, DOM to provide new functionality by combining server-side processing with client-side changes. jQuery can access the front-end more easily without needing to understand the full AJAX procedure. AJAX can overload servers due to many connections, while jQuery is lighter weight and causes less overload.
The document discusses several differences between ADO.NET concepts including:
1) DataReader allows reading one record at a time in a forward-only manner while DataAdapter allows navigating records and updating data in a disconnected manner.
2) DataSet allows caching and manipulating disconnected data across multiple tables while DataReader requires an open connection and only retrieves data from a single query.
3) DataSet.Copy() copies both structure and data of a DataSet while DataSet.Clone() only copies the structure without any data.
4) ADO.NET uses XML, disconnected architecture, and the DataSet object while classic ADO uses binary format, requires active connections, and the Recordset object.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the “Temporal Event Neural Networks: A More Efficient Alternative to the Transformer” tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChip’s Akida neuromorphic hardware IP further enhances TENNs’ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
This talk will cover ScyllaDB Architecture from the cluster-level view and zoom in on data distribution and internal node architecture. In the process, we will learn the secret sauce used to get ScyllaDB's high availability and superior performance. We will also touch on the upcoming changes to ScyllaDB architecture, moving to strongly consistent metadata and tablets.
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...Jason Yip
The typical problem in product engineering is not bad strategy, so much as “no strategy”. This leads to confusion, lack of motivation, and incoherent action. The next time you look for a strategy and find an empty space, instead of waiting for it to be filled, I will show you how to fill it in yourself. If you’re wrong, it forces a correction. If you’re right, it helps create focus. I’ll share how I’ve approached this in the past, both what works and lessons for what didn’t work so well.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
LF Energy Webinar: Carbon Data Specifications: Mechanisms to Improve Data Acc...DanBrown980551
This LF Energy webinar took place June 20, 2024. It featured:
-Alex Thornton, LF Energy
-Hallie Cramer, Google
-Daniel Roesler, UtilityAPI
-Henry Richardson, WattTime
In response to the urgency and scale required to effectively address climate change, open source solutions offer significant potential for driving innovation and progress. Currently, there is a growing demand for standardization and interoperability in energy data and modeling. Open source standards and specifications within the energy sector can also alleviate challenges associated with data fragmentation, transparency, and accessibility. At the same time, it is crucial to consider privacy and security concerns throughout the development of open source platforms.
This webinar will delve into the motivations behind establishing LF Energy’s Carbon Data Specification Consortium. It will provide an overview of the draft specifications and the ongoing progress made by the respective working groups.
Three primary specifications will be discussed:
-Discovery and client registration, emphasizing transparent processes and secure and private access
-Customer data, centering around customer tariffs, bills, energy usage, and full consumption disclosure
-Power systems data, focusing on grid data, inclusive of transmission and distribution networks, generation, intergrid power flows, and market settlement data
"$10 thousand per minute of downtime: architecture, queues, streaming and fin...Fwdays
Direct losses from downtime in 1 minute = $5-$10 thousand dollars. Reputation is priceless.
As part of the talk, we will consider the architectural strategies necessary for the development of highly loaded fintech solutions. We will focus on using queues and streaming to efficiently work and manage large amounts of data in real-time and to minimize latency.
We will focus special attention on the architectural patterns used in the design of the fintech system, microservices and event-driven architecture, which ensure scalability, fault tolerance, and consistency of the entire system.
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
AppSec PNW: Android and iOS Application Security with MobSFAjin Abraham
Mobile Security Framework - MobSF is a free and open source automated mobile application security testing environment designed to help security engineers, researchers, developers, and penetration testers to identify security vulnerabilities, malicious behaviours and privacy concerns in mobile applications using static and dynamic analysis. It supports all the popular mobile application binaries and source code formats built for Android and iOS devices. In addition to automated security assessment, it also offers an interactive testing environment to build and execute scenario based test/fuzz cases against the application.
This talk covers:
Using MobSF for static analysis of mobile applications.
Interactive dynamic security assessment of Android and iOS applications.
Solving Mobile app CTF challenges.
Reverse engineering and runtime analysis of Mobile malware.
How to shift left and integrate MobSF/mobsfscan SAST and DAST in your build pipeline.
Northern Engraving | Modern Metal Trim, Nameplates and Appliance PanelsNorthern Engraving
What began over 115 years ago as a supplier of precision gauges to the automotive industry has evolved into being an industry leader in the manufacture of product branding, automotive cockpit trim and decorative appliance trim. Value-added services include in-house Design, Engineering, Program Management, Test Lab and Tool Shops.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Important Run Commands
1. 1. How to go Run Command Window?
+R (or) Start-> Run
2. Why to know Run Commands?
There are several ways to perform the task(s) in Microsoft’s Windows Operating
Systems. But, using Run Commands to do the same improves the user’s productivity.
So, it is advisable to know at least few of them.
3. I am eager to know them. Do you list them in an easy and understandable
format?
Yes, Sure! Look at them below,
S.No Description
1 To be typed – winword
Result to be expected - Microsoft Word Document will be opened
Other Approaches –
1. Right Click the Mouse->New->Microsoft Word Document
2. Start->All Programs->Microsoft Office->Microsoft Office Word
2 To be typed – excel
Result to be expected - Microsoft Excel Document will be opened
Other Approaches –
1. Right Click the Mouse->New->Microsoft Excel Worksheet
2. Start->All Programs->Microsoft Office->Microsoft Office Excel
3 To be typed – powerpnt
Result to be expected - Microsoft PowerPoint Document will be opened
Other Approaches –
1. Right Click the Mouse->New->Microsoft PowerPoint Presentation
2. Start->All Programs->Microsoft Office->Microsoft Office PowerPoint
4 To be typed – write
Result to be expected – WordPad Document will be opened
Other Approach –
Start->All Programs->Accessories->WordPad
5 To be typed – notepad
Result to be expected – Notepad Document will be opened
Other Approach –
Start->All Programs->Accessories->Notepad
6 To be typed – pbrush (or) mspaint
Result to be expected – Microsoft Paint Document will be opened
2. Other Approach –
Start->All Programs->Accessories->Paint
7 To be typed – calc
Result to be expected – Calculator program will be opened
Other Approach –
Start->All Programs->Accessories->Calculator
8 To be typed – cmd
Result to be expected – Command Prompt window will be opened
Other Approach –
Start->All Programs->Accessories->Command Prompt
9 To be typed – mstsc
Result to be expected – Remote Desktop window will be opened for Remote
Machine Connection
Other Approach –
Start->All Programs->Accessories->Remote Desktop Connection
10 To be typed – osk
Result to be expected – On-Screen Keyboard will be opened
Other Approach –
Start->All Programs->Accessories->Accessibility->On-Screen Keyboard
11 To be typed – taskmgr
Result to be expected – Windows Task Manager will be opened
Other Approaches –
1. Ctrl+Shift+Esc
2. Right click the mouse in Taskbar->Task Manager
12 To be typed – logoff
Result to be expected – Windows will be logged off
Other Approaches –
1. Start->Log Off->Log Off
2. ->L->L
13 To be typed – shutdown
Result to be expected – Windows will be Shut Down
Other Approaches –
1. Start->Turn Off Computer->Turn Off
2. ->U->U
14 To be typed – shutdown -r
Result to be expected – Windows will be restarted
Other Approaches –
1. Start->Turn Off Computer->Restart
2. ->U->R
15 To be typed – control panel
Result to be expected – Control Panel will be opened
Other Approach –
Start->Control Panel
3. 16 To be typed – appwiz.cpl
Result to be expected – Add or Remove Programs window will be opened
Other Approach –
Start->Control Panel->Add or Remove Programs
17 To be typed – cleanmgr
Result to be expected – Disk Cleanup for particular drive will be performed
Other Approach –
Start->All Programs->Accessories->System Tools->Disk Cleanup
18 To be typed – iexplore
Result to be expected – MS Internet Explorer window will be opened
Other Approach –
Start->All Programs->Internet Explorer
19 To be typed – firefox
Result to be expected – Mozilla Firefox window will be opened
Other Approach –
Start->All Programs->Mozilla Firefox->Mozilla Firefox
20 To be typed – chrome
Result to be expected – Google Chrome window will be opened
Other Approach –
Start->All Programs->Google Chrome->Google Chrome