SlideShare a Scribd company logo
Managing Applications, Services, Folders,Managing Applications, Services, Folders,
and Librariesand Libraries
Lesson 4
ObjectivesObjectives
Objective Domain Matrix
Technology Skill Objective Domain Description Objective Domain
Number
Understanding Local versus Network
Applications
Understanding Local versus Network
Applications
3.1.1
Removing or Uninstalling an Application Removing or Uninstalling Applications 3.1.3
Understanding Group Policy and Application
Installation
Understanding Group Policy 3.1.2
Understanding Service Startup Types Understanding Service Startup Types 3.4.1
Understanding Service Accounts Understanding Service Accounts 3.4.2
Understanding Service Dependencies Understanding Service Dependencies 3.4.3
Understanding MSCONFIG Understanding MSCONFIG 1.3.5
Understanding FAT, FAT32, and NTFS Understanding FAT, FAT32, and NTFS 4.1.1
Adding Multiple Local Locations to a Library Adding Multiple Local Locations to a Library 4.4.2
Adding Networked Locations Adding Networked Locations 4.4.3
Understanding Encrypting File System (EFS) Understanding Encrypting File System (EFS) 4.3.2
Understanding Security (Encryption) Understanding Security (Encryption) 5.2.2
Understanding Compression Understanding Compression 4.3.3
Understanding BitLocker Understanding BitLocker 4.3.1
Installing and Managing ApplicationsInstalling and Managing Applications
• An application is a program that:
– Runs “on top” of the operating system or
from a server
– Helps a user perform a specific task, such as
word processing, appointment scheduling, or
accounting
Installing and Managing ApplicationsInstalling and Managing Applications
• Applications installed at the local level or the
network level
– Local installation = software files running
directly from a computer
– Network installation = software files are
made available from an application server on
a network
Uninstalling Local ApplicationsUninstalling Local Applications
Applications Installed over a NetworkApplications Installed over a Network
• Group Policy
• Active Directory
• Group Policy objects (GPOs)
Assigning/Publishing ApplicationsAssigning/Publishing Applications
• Windows 2008 R2 Active Directory Domain
Services (AD DS) uses Group Policy to push
applications to users or computers.
• Using Group Policy, you can assign or
publish an application to all users or
computers in a designated site, domain,
organizational unit (OU), or to a local,
individual user or computer.
Assigning ApplicationsAssigning Applications
• If Group Policy assigns software on each
computer, the software is installed the next
time the computer starts and any users with
the correct permissions who log on to the
computer may run the software.
• If Group Policy assigns software to users, the
next time an authorized user clicks the
Microsoft Office shortcut or menu item (for
example), the software installs on the user’s
computer and Office opens.
Publishing ApplicationsPublishing Applications
• Group Policy can publish an application to
users.
– The next time a user logs on, he can choose
to install the software from a dialog box that
appears.
ServicesServices
• Run in the background on a Windows
system to help the operating system run
other programs
• Services console is the central management
point of services in Windows Vista and
Windows 7
ServicesServices
The General TabThe General Tab
The Log On TabThe Log On Tab
The Recovery TabThe Recovery Tab
The Dependencies TabThe Dependencies Tab
The Print Spooler Service in the ServicesThe Print Spooler Service in the Services
ConsoleConsole
Selecting a Startup TypeSelecting a Startup Type
MSCONFIGMSCONFIG
• Also known as the System Configuration
Utility
• Lets you:
– Enable or disable startup services
– Set boot options such as booting into Safe
Mode
– Access tools like Action Center and Event
Viewer
– More
The General TabThe General Tab
The Boot TabThe Boot Tab
Checking the Safe Boot Option onChecking the Safe Boot Option on
the Boot Tabthe Boot Tab
The Services TabThe Services Tab
Disabling an Unneeded ServiceDisabling an Unneeded Service
The Startup TabThe Startup Tab
Disabling an Unneeded Startup ItemDisabling an Unneeded Startup Item
Selective Startup EnabledSelective Startup Enabled
The Tools TabThe Tools Tab
File SystemsFile Systems
• FAT, FAT32, and NTFS
• NTFS-formatted disks best for Windows 7
• Can convert from one file system to another
• Some conversions destroy existing data
File SystemsFile Systems
File
System
Maximum
Partition
Size
Maximum File Size
FAT 2 GB 2 GB
FAT32 32 GB 4 GB
NTFS 256 TB Limited by size of volume on
which it resides
File SystemsFile Systems
Windows 7 LibrariesWindows 7 Libraries
• A virtual folder that can display content from
different locations (folders, for example) on
your computer or an external drive
• Looks like an ordinary folder but simply
points to files and folders that are located
elsewhere
Windows 7 LibrariesWindows 7 Libraries
Selecting a Library in WhichSelecting a Library in Which
to Include a Folderto Include a Folder
The Locations HyperlinkThe Locations Hyperlink
The Pictures Library Locations Dialog BoxThe Pictures Library Locations Dialog Box
The Pictures Library Locations DialogThe Pictures Library Locations Dialog
Box with a Newly Added FolderBox with a Newly Added Folder
Creating a New LibraryCreating a New Library
EncryptionEncryption
• Encrypted data is “scrambled” but still
readable and usable by the user who
encrypted the file
• That user and other authorized users can
open and change the file as necessary
• Unauthorized users who try to open the file
or copy it receive “Access Denied” message
EncryptionEncryption
• Only the original owner and the computer’s
designated recovery agent can access
encrypted files
• Encryption uses:
– Encryption keys
– Certificates
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypting File System (EFS)
– Encrypts information on hard disks, external
flash disks, CDs, DVDs, backup tapes, and
other types of physical media
• Users can enforce encryption on data files,
folders, and entire drives
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to encrypt files and folders
Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7
• Encrypted (EFS) files and folders are
displayed in green in Windows Explorer
Personal Certificates in Certificate ManagerPersonal Certificates in Certificate Manager
Using the Certificate Export WizardUsing the Certificate Export Wizard
CompressionCompression
• The process of decreasing the size of files or
folders without affecting the files’ content
• Decreases large files that would otherwise
use a lot of storage space
• Compressing files replaces repeated data
with pointers to the data; pointers take up
much less space than the repeated data, so
the size of the file is reduced
Compressing Files and Folders in Windows 7Compressing Files and Folders in Windows 7
• Advanced Attributes dialog box enables
users to compress files and folders
BitLocker Drive EncryptionBitLocker Drive Encryption
• Encrypts an entire fixed disk to prevent
access by unauthorized users
• BitLocker To Go protects removable drives,
such as external flash drives
• BitLocker is available in Windows Ultimate
and Enterprise editions only
Turning on BitLockerTurning on BitLocker
SummarySummary
• You install applications, or programs, at the local
level or the network level.
• Use Control Panel to uninstall a local application.
• Group Policy lets you control who can install
software, and on which computers, and helps you
push software updates and security configurations
across the network.
• Services run in the background on a Windows
system to help the operating system run other
programs.
SummarySummary
• Use MSCONFIG (System Configuration utility) to
troubleshoot and diagnose startup problems.
• The three primary types of file systems for Windows
are FAT, FAT32, and NTFS.
• A library is a virtual folder that points to resources.
• Encrypting files and folders protects them from
unwanted access. Microsoft uses the Encrypting
File System (EFS) and BitLocker.
• Compression reduces the size of files and folders
without affecting their content.

More Related Content

What's hot

Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
Jab Vtl
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
Rakesh Kadu
 
Programa Everest
Programa EverestPrograma Everest
Programa Everest
Katsura Kotonoha
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
Tanveer Malik
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingGene Carboni
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
Lavanya Sharma
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
Chiawei Wang
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
vwchu
 
windows 10
windows 10 windows 10
windows 10
karthi keyan
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
Tuan Yang
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
Gera Paulos
 
VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual
Sanjeev Kumar
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
Veeral Bhateja
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)
Tuan Yang
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storagesagaroceanic11
 
Windows Registry Analysis
Windows Registry AnalysisWindows Registry Analysis
Windows Registry Analysis
Himanshu0734
 
3. CPU virtualization and scheduling
3. CPU virtualization and scheduling3. CPU virtualization and scheduling
3. CPU virtualization and scheduling
Hwanju Kim
 

What's hot (20)

Backup & restore in windows
Backup & restore in windowsBackup & restore in windows
Backup & restore in windows
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
 
Programa Everest
Programa EverestPrograma Everest
Programa Everest
 
Windows file system
Windows file systemWindows file system
Windows file system
 
Lecture 8 disk management
Lecture 8 disk managementLecture 8 disk management
Lecture 8 disk management
 
Lesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print SharingLesson 6 - Understanding File and Print Sharing
Lesson 6 - Understanding File and Print Sharing
 
File system in operating system e learning
File system in operating system e learningFile system in operating system e learning
File system in operating system e learning
 
Virtualisation basics
Virtualisation basicsVirtualisation basics
Virtualisation basics
 
Disk forensics
Disk forensicsDisk forensics
Disk forensics
 
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVMHypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
Hypervisors and Virtualization - VMware, Hyper-V, XenServer, and KVM
 
windows 10
windows 10 windows 10
windows 10
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
Configuring and administrate server
Configuring and administrate serverConfiguring and administrate server
Configuring and administrate server
 
VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual VMware Horizon (view) 7 Lab Manual
VMware Horizon (view) 7 Lab Manual
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)Understanding the Windows Server Administration Fundamentals (Part-2)
Understanding the Windows Server Administration Fundamentals (Part-2)
 
Introduction to storage
Introduction to storageIntroduction to storage
Introduction to storage
 
Windows Registry Analysis
Windows Registry AnalysisWindows Registry Analysis
Windows Registry Analysis
 
3. CPU virtualization and scheduling
3. CPU virtualization and scheduling3. CPU virtualization and scheduling
3. CPU virtualization and scheduling
 

Viewers also liked

Basic networking
Basic networkingBasic networking
Basic networking
ajeeshr3
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networks
Rhenan Belisario
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
Hanzel Metrio
 
TMC1
TMC1TMC1
TMC1
evelyn
 
Final cblm
Final cblmFinal cblm
Final cblm
darylformentera
 
computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs
Rogelio Alvarez
 
Installing computer systems and networks Module
Installing computer systems and networks ModuleInstalling computer systems and networks Module
Installing computer systems and networks Module
Myra Ramos
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS Kak Yong
 

Viewers also liked (9)

Basic networking
Basic networkingBasic networking
Basic networking
 
Css Major computer systems and networks
Css Major computer systems and networksCss Major computer systems and networks
Css Major computer systems and networks
 
Computer systems servicing cbc
Computer systems servicing cbcComputer systems servicing cbc
Computer systems servicing cbc
 
TMC1
TMC1TMC1
TMC1
 
Final cblm
Final cblmFinal cblm
Final cblm
 
computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs computer systems servicing cbc ncii for vtvs
computer systems servicing cbc ncii for vtvs
 
Installing computer systems and networks Module
Installing computer systems and networks ModuleInstalling computer systems and networks Module
Installing computer systems and networks Module
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 

Similar to Lesson 4 - Managing Applications, Services, Folders, and Libraries

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
ssusera432ea1
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
Bibekananada Jena
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
gameaxt
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network Administrator
Gina Alfaro
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Ahmed El-Arabawy
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
Luis R Castellanos
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
solarisyougood
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
sdrayin
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
OnyemaobiAmarachi
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
OnyemaobiAmarachi
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
Geo Marian
 
Linux Installation
Linux InstallationLinux Installation
Linux Installation
BIT DURG
 
Hiding files.pptx
Hiding files.pptxHiding files.pptx
Hiding files.pptx
KashifHussain647755
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User GuideDirectReader
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installation
IshworKhatiwada
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"EPAM Systems
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5rohassanie
 
Expo ciberseguridad
Expo ciberseguridadExpo ciberseguridad
Expo ciberseguridad
LuisFranciscoLopez4
 

Similar to Lesson 4 - Managing Applications, Services, Folders, and Libraries (20)

Poking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And ProfitPoking The Filesystem For Fun And Profit
Poking The Filesystem For Fun And Profit
 
6421 b Module-10
6421 b  Module-106421 b  Module-10
6421 b Module-10
 
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
 
windows.pptx
windows.pptxwindows.pptx
windows.pptx
 
Description Of A Network Administrator
Description Of A Network AdministratorDescription Of A Network Administrator
Description Of A Network Administrator
 
Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)Course 102: Lecture 27: FileSystems in Linux (Part 2)
Course 102: Lecture 27: FileSystems in Linux (Part 2)
 
INT 1010 04-5.pdf
INT 1010 04-5.pdfINT 1010 04-5.pdf
INT 1010 04-5.pdf
 
Vmware thin app architecture
Vmware thin app architectureVmware thin app architecture
Vmware thin app architecture
 
Vista Presentation
Vista PresentationVista Presentation
Vista Presentation
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
CA_Module_3.pptx
CA_Module_3.pptxCA_Module_3.pptx
CA_Module_3.pptx
 
Windows Operating System.pptx
Windows Operating System.pptxWindows Operating System.pptx
Windows Operating System.pptx
 
File System Implementation & Linux Security
File System Implementation & Linux SecurityFile System Implementation & Linux Security
File System Implementation & Linux Security
 
Linux Installation
Linux InstallationLinux Installation
Linux Installation
 
Hiding files.pptx
Hiding files.pptxHiding files.pptx
Hiding files.pptx
 
OfficeBox User Guide
OfficeBox User GuideOfficeBox User Guide
OfficeBox User Guide
 
Operating system and installation
Operating system and  installationOperating system and  installation
Operating system and installation
 
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
Вячеслав Кабак "Microsoft Sysinternals-Useful Utilities"
 
FP 202 - Chapter 5
FP 202 - Chapter 5FP 202 - Chapter 5
FP 202 - Chapter 5
 
Expo ciberseguridad
Expo ciberseguridadExpo ciberseguridad
Expo ciberseguridad
 

More from Gene Carboni

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResumeGene Carboni
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessGene Carboni
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingGene Carboni
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsGene Carboni
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting ProcessGene Carboni
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business TransactionsGene Carboni
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business EnvironmentGene Carboni
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
Gene Carboni
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
Gene Carboni
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGene Carboni
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
Gene Carboni
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
Gene Carboni
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7
Gene Carboni
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1Gene Carboni
 
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to HardwareGene Carboni
 

More from Gene Carboni (20)

CarboniGoogleTrainerResume
CarboniGoogleTrainerResumeCarboniGoogleTrainerResume
CarboniGoogleTrainerResume
 
Chapter 3 - The Adjusting Process
Chapter 3 - The Adjusting ProcessChapter 3 - The Adjusting Process
Chapter 3 - The Adjusting Process
 
Lesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and ProtectingLesson 7 - Maintaining, Updating, and Protecting
Lesson 7 - Maintaining, Updating, and Protecting
 
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery MethodsLesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
 
CHAPTER 3 Measuring Business Income: The Adjusting Process
CHAPTER 3  Measuring Business Income:  The Adjusting ProcessCHAPTER 3  Measuring Business Income:  The Adjusting Process
CHAPTER 3 Measuring Business Income: The Adjusting Process
 
CHAPTER 2 Recording Business Transactions
CHAPTER 2  Recording Business TransactionsCHAPTER 2  Recording Business Transactions
CHAPTER 2 Recording Business Transactions
 
CHAPTER 1 Accounting and the Business Environment
CHAPTER 1  Accounting and the Business EnvironmentCHAPTER 1  Accounting and the Business Environment
CHAPTER 1 Accounting and the Business Environment
 
7th ed ppt ch07
7th ed ppt ch077th ed ppt ch07
7th ed ppt ch07
 
Introducing Widows 7
Introducing Widows 7Introducing Widows 7
Introducing Widows 7
 
Guide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File SystemsGuide to Windows 7 - Managing File Systems
Guide to Windows 7 - Managing File Systems
 
Guide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing DisksGuide to Windows 7 - Managing Disks
Guide to Windows 7 - Managing Disks
 
Guide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System UtilitiesGuide to Windows 7 - Using the System Utilities
Guide to Windows 7 - Using the System Utilities
 
Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7Guide To Windows 7 - Installing Windows 7
Guide To Windows 7 - Installing Windows 7
 
Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7Guide To Windows 7 - Introduction to Windows 7
Guide To Windows 7 - Introduction to Windows 7
 
Accounting - Chapter 1
Accounting - Chapter 1Accounting - Chapter 1
Accounting - Chapter 1
 
Introduction to Hardware
Introduction to HardwareIntroduction to Hardware
Introduction to Hardware
 
7th ed ppt ch10
7th ed ppt ch107th ed ppt ch10
7th ed ppt ch10
 
7th ed ppt ch09
7th ed ppt ch097th ed ppt ch09
7th ed ppt ch09
 
7th ed ppt ch08
7th ed ppt ch087th ed ppt ch08
7th ed ppt ch08
 
7th ed ppt ch06
7th ed ppt ch067th ed ppt ch06
7th ed ppt ch06
 

Recently uploaded

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Lesson 4 - Managing Applications, Services, Folders, and Libraries

  • 1. Managing Applications, Services, Folders,Managing Applications, Services, Folders, and Librariesand Libraries Lesson 4
  • 2. ObjectivesObjectives Objective Domain Matrix Technology Skill Objective Domain Description Objective Domain Number Understanding Local versus Network Applications Understanding Local versus Network Applications 3.1.1 Removing or Uninstalling an Application Removing or Uninstalling Applications 3.1.3 Understanding Group Policy and Application Installation Understanding Group Policy 3.1.2 Understanding Service Startup Types Understanding Service Startup Types 3.4.1 Understanding Service Accounts Understanding Service Accounts 3.4.2 Understanding Service Dependencies Understanding Service Dependencies 3.4.3 Understanding MSCONFIG Understanding MSCONFIG 1.3.5 Understanding FAT, FAT32, and NTFS Understanding FAT, FAT32, and NTFS 4.1.1 Adding Multiple Local Locations to a Library Adding Multiple Local Locations to a Library 4.4.2 Adding Networked Locations Adding Networked Locations 4.4.3 Understanding Encrypting File System (EFS) Understanding Encrypting File System (EFS) 4.3.2 Understanding Security (Encryption) Understanding Security (Encryption) 5.2.2 Understanding Compression Understanding Compression 4.3.3 Understanding BitLocker Understanding BitLocker 4.3.1
  • 3. Installing and Managing ApplicationsInstalling and Managing Applications • An application is a program that: – Runs “on top” of the operating system or from a server – Helps a user perform a specific task, such as word processing, appointment scheduling, or accounting
  • 4. Installing and Managing ApplicationsInstalling and Managing Applications • Applications installed at the local level or the network level – Local installation = software files running directly from a computer – Network installation = software files are made available from an application server on a network
  • 6. Applications Installed over a NetworkApplications Installed over a Network • Group Policy • Active Directory • Group Policy objects (GPOs)
  • 7. Assigning/Publishing ApplicationsAssigning/Publishing Applications • Windows 2008 R2 Active Directory Domain Services (AD DS) uses Group Policy to push applications to users or computers. • Using Group Policy, you can assign or publish an application to all users or computers in a designated site, domain, organizational unit (OU), or to a local, individual user or computer.
  • 8. Assigning ApplicationsAssigning Applications • If Group Policy assigns software on each computer, the software is installed the next time the computer starts and any users with the correct permissions who log on to the computer may run the software. • If Group Policy assigns software to users, the next time an authorized user clicks the Microsoft Office shortcut or menu item (for example), the software installs on the user’s computer and Office opens.
  • 9. Publishing ApplicationsPublishing Applications • Group Policy can publish an application to users. – The next time a user logs on, he can choose to install the software from a dialog box that appears.
  • 10. ServicesServices • Run in the background on a Windows system to help the operating system run other programs • Services console is the central management point of services in Windows Vista and Windows 7
  • 12. The General TabThe General Tab
  • 13. The Log On TabThe Log On Tab
  • 14. The Recovery TabThe Recovery Tab
  • 15. The Dependencies TabThe Dependencies Tab
  • 16. The Print Spooler Service in the ServicesThe Print Spooler Service in the Services ConsoleConsole
  • 17. Selecting a Startup TypeSelecting a Startup Type
  • 18. MSCONFIGMSCONFIG • Also known as the System Configuration Utility • Lets you: – Enable or disable startup services – Set boot options such as booting into Safe Mode – Access tools like Action Center and Event Viewer – More
  • 19. The General TabThe General Tab
  • 20. The Boot TabThe Boot Tab
  • 21. Checking the Safe Boot Option onChecking the Safe Boot Option on the Boot Tabthe Boot Tab
  • 22. The Services TabThe Services Tab
  • 23. Disabling an Unneeded ServiceDisabling an Unneeded Service
  • 24. The Startup TabThe Startup Tab
  • 25. Disabling an Unneeded Startup ItemDisabling an Unneeded Startup Item
  • 27. The Tools TabThe Tools Tab
  • 28. File SystemsFile Systems • FAT, FAT32, and NTFS • NTFS-formatted disks best for Windows 7 • Can convert from one file system to another • Some conversions destroy existing data
  • 29. File SystemsFile Systems File System Maximum Partition Size Maximum File Size FAT 2 GB 2 GB FAT32 32 GB 4 GB NTFS 256 TB Limited by size of volume on which it resides
  • 31. Windows 7 LibrariesWindows 7 Libraries • A virtual folder that can display content from different locations (folders, for example) on your computer or an external drive • Looks like an ordinary folder but simply points to files and folders that are located elsewhere
  • 33. Selecting a Library in WhichSelecting a Library in Which to Include a Folderto Include a Folder
  • 34. The Locations HyperlinkThe Locations Hyperlink
  • 35. The Pictures Library Locations Dialog BoxThe Pictures Library Locations Dialog Box
  • 36. The Pictures Library Locations DialogThe Pictures Library Locations Dialog Box with a Newly Added FolderBox with a Newly Added Folder
  • 37. Creating a New LibraryCreating a New Library
  • 38. EncryptionEncryption • Encrypted data is “scrambled” but still readable and usable by the user who encrypted the file • That user and other authorized users can open and change the file as necessary • Unauthorized users who try to open the file or copy it receive “Access Denied” message
  • 39. EncryptionEncryption • Only the original owner and the computer’s designated recovery agent can access encrypted files • Encryption uses: – Encryption keys – Certificates
  • 40. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Encrypting File System (EFS) – Encrypts information on hard disks, external flash disks, CDs, DVDs, backup tapes, and other types of physical media • Users can enforce encryption on data files, folders, and entire drives
  • 41. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Advanced Attributes dialog box enables users to encrypt files and folders
  • 42. Encrypting Files and Folders in Windows 7Encrypting Files and Folders in Windows 7 • Encrypted (EFS) files and folders are displayed in green in Windows Explorer
  • 43. Personal Certificates in Certificate ManagerPersonal Certificates in Certificate Manager
  • 44. Using the Certificate Export WizardUsing the Certificate Export Wizard
  • 45. CompressionCompression • The process of decreasing the size of files or folders without affecting the files’ content • Decreases large files that would otherwise use a lot of storage space • Compressing files replaces repeated data with pointers to the data; pointers take up much less space than the repeated data, so the size of the file is reduced
  • 46. Compressing Files and Folders in Windows 7Compressing Files and Folders in Windows 7 • Advanced Attributes dialog box enables users to compress files and folders
  • 47. BitLocker Drive EncryptionBitLocker Drive Encryption • Encrypts an entire fixed disk to prevent access by unauthorized users • BitLocker To Go protects removable drives, such as external flash drives • BitLocker is available in Windows Ultimate and Enterprise editions only
  • 49. SummarySummary • You install applications, or programs, at the local level or the network level. • Use Control Panel to uninstall a local application. • Group Policy lets you control who can install software, and on which computers, and helps you push software updates and security configurations across the network. • Services run in the background on a Windows system to help the operating system run other programs.
  • 50. SummarySummary • Use MSCONFIG (System Configuration utility) to troubleshoot and diagnose startup problems. • The three primary types of file systems for Windows are FAT, FAT32, and NTFS. • A library is a virtual folder that points to resources. • Encrypting files and folders protects them from unwanted access. Microsoft uses the Encrypting File System (EFS) and BitLocker. • Compression reduces the size of files and folders without affecting their content.

Editor's Notes

  1. The network method, along with Group Policy, gives an administrator more efficient control over who can use the software and who can remove it.
  2. Explain that in a Windows network in a domain environment, administrators can use Group Policy to ease the burden of administering and managing many users and client computers. Group Policy lets you control who may install software, and on which computers, and helps you push software updates and security configurations across the network. Group policies also exist in Windows 7 and other Windows operating systems. They are referred to as Local Group Policies and affect only the users who log on to a particular computer. This section focuses on Group Policy at the network domain level.
  3. Service startup types: Automatic (Delayed Start): The service starts approximately two minutes after the system has completed starting the operating system. Automatic: The service starts as the operating system starts. Manual: The service must be started manually, by a user, a dependent service, or a program. Disabled: The service is disabled and will not start.
  4. After changing options on the Startup tab, the Selective startup option is enabled on the General tab.
  5. The Disk Management MMC snap-in displays disks and partitions, and the file system in use.
  6. Libraries are accessed in Windows Explorer, just like files and folders. Windows 7 includes several default libraries: Documents, Music, Pictures, and Videos.
  7. When you add new files to a BitLocker-encrypted disk, the files are encrypted automatically. If you copy the files to another drive, BitLocker automatically decrypts the files, which means they’re no longer protected. Some computers have a Trusted Platform Module (TPM) chip on the motherboard. If the chip is present, BitLocker uses the TPM chip to protect the BitLocker keys.