0% found this document useful (0 votes)
90 views99 pages

Introduction To Window 7 Operating System New PDF

Uploaded by

Avishkar Paringe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views99 pages

Introduction To Window 7 Operating System New PDF

Uploaded by

Avishkar Paringe
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 99

OPERATING SYSTEM

COURSE CODE CSE 305

BAHRA UNIVERSITY SHIMLA HILLS

SCHOOL OF COMPUTER SCIENCE AND ENGINEERING


Contents

1. Introduction to Window 7 operating system ............................................................................................... 2


2. Implementation of various aero features of window 7. ............................................................................... 3
3. Understanding window upgrade, window update and action center. ........................................................ 14
4. To create user account and setting up parental control on user account. .................................................. 23
5. Commands for window power shell and MSCONFIG. ............................................................................ 32
6. To understand system restore, recovery tool option, various safe mode options and MMC console
management. ................................................................................................................................................. 37
7. Introduction to window 7 upgrade advisor, windows defender and windows registry file. ...................... 45
Windows Registry ......................................................................................................................................... 45
8. Making a word file and how to protect it with password. ......................................................................... 47
9. To create a blog. ........................................................................................................................................ 52
10. Implementation of disk defragmenter and disk cleanup maintenance tools. ........................................... 57
11. What is bitlocker and TPM. How a bitlocker encrypt a file. ................................................................... 60
12. Introduction to sky drive and windows live mesh. .................................................................................. 72
13. Implementation of FCFS (First Come First Serve) scheduling algorithm .............................................. 85
14. Implementation of SJF (Shortest Job First) scheduling algorithm. ......................................................... 88
15. Implementation of priority scheduling algorithm.................................................................................... 91
16. Implementation of Round Robin scheduling algorithm. ......................................................................... 95
1. Introduction to Window 7 operating system
Windows 7 is an operating system produced by Microsoft for use on personal computers,
including home and business desktops, laptops, netbooks, tablet PCs, and media center PCs. It was
released to manufacturing on July 22, 2009 and became generally available for retail worldwide
on October 22, 2009, less than three years after the release of its predecessor, Windows Vista.
Windows 7's server counterpart, Windows Server 2008 R2, was released at the same time.
Windows 7 is succeeded by Windows 8.
Unlike Windows Vista's many new features, Windows 7 was an incremental upgrade designed to
work with Vista-compatible applications and hardware. Presentations given by Microsoft in 2008
focused on multi-touch support, an updated Windows shell with a new taskbar, referred to
internally as the Superbar, a home networking system called HomeGroup, and performance
improvements. Some standard applications that have been included with prior releases of
Microsoft Windows, including Windows Calendar, Windows Mail,Windows Movie Maker,
and Windows Photo Gallery, are not included in Windows 7; most are instead offered separately
at no charge as part of the Windows Essentials suite.
Minimum hardware requirements for Windows 7

If you are already a Vista user then the improvements to Windows 7 are going to be more subtle.
Vista users are likely already familiar with features like the Aero visual functions, the Start Menu
organization and Search. However, if you are currently using XP, then you may require a bit of an
adjustment period.

Improvements for both Vista and XP Users


• New Taskbar and System Tray
• Quick Desktop View button
• Improved Start Up, Sleep and Resume performance
• Improved power management saves memory and battery life
• Libraries to improve file access and organization
• Action Center for system maintenance, back ups, troubleshooting and more
• User Account customization of notifications
• Improved back up
• New wallpapers and themes
• Improved gadgets
• New premium games include Chess Titans, Mahjong Titans and Inkball
• Advanced Calculator functions including saving history
• Improved networking via HomeGroups
• Passkey protection with networks
• Device Stage for recognizing USB devices faster.

Changes and improvements from Windows XP only


• New Start Icon
• Aero Snap, Shake and Peek
• Desktop icons like “Computer” and “My Documents” are removed and accessed through
the Start Menu
• Larger icons and hidden icons in the Taskbar
• Quick Launch toolbar has been replaced by pinning a program to the Taskbar
• Jump Lists for easier access
• A Search Bar in the Start Up Menu
• The "Run" command is accessed through the Start Menu's Search Bar
• Faster and smoother gaming components
• Parental Controls for monitoring computer use
• Update feature that eliminates web surfing for patches

2. Implementation of various aero features of window 7.

Aero Features

Windows 7 uses a group of features called Windows Aero. Aero is a visual desktop experience
that combines translucent windows, appealing color and graphics effects with convenient
functionality. Aero includes Snap, Peek, Shake and Flip. Aero is an interface that makes your
visual interactions with the desktop fun and easy.
• Aero Peek makes your open windows transparent so you may see your desktop. It also
allows you to peek at items in your taskbar for a thumbnail preview.
• Aero Snap is a quick way to resize your windows to make them easier to read, organize
and compare.
• Aero Flip allows you to preview all your open windows from a central window or 3D
view that you can flip through.
• Aero Shake allows you to take your mouse and shake only the open window you want to
focus on and the rest will disappear.

Snap
Snap allows you to resize open windows to make reviewing and comparing easier.

Overlapping windows

Side-by-side Snap view

1. Place the mouse at the top of the window, drag to the left or right of the screen, wait for
the transparent window to appear and let go.
2. Your window should Snap into place.

3. To return to the full view, Snap the window to the top of the screen.
Peek
You can view your open windows on the taskbar by using Peek. Simply scroll the mouse over the
taskbar icons and a thumbnail preview of the open windows will appear.

Aero Peek

However the mouse over the windows in Peek and the full window will appear on your screen.
1. Click on the Peek preview to open the window or click on the "X" to close the window
from the Peek view.
Previewing a window with Aero Peek

Shake
When your desktop is cluttered with open windows, you can use Shake to select a single window
and close the rest.
1. Click on the top of the window you want to focus on, Shake it and the rest of the windows
will disappear.
2. Simply Shake the window again and the closed windows will reappear.

Cluttered screen
Shake to clear screen

Flip
Flip and Flip 3D are two more ways you can preview your open windows.

Aero Flip

1. Press and hold the Alt key and then press Tab to open the Flip view of your open
windows.
2. While still pressing the Alt key, you can Flip through the open windows by pressing the
Tab key.
3. Stop on the window you want to open and it will appear on the full screen.
Aero Flip 3D
1. Press and hold the Windows key and then press Tab for a 3D version of Flip.
2. Use the Tab key or Arrow keys to Flip through your open windows.

3.Implementation of snipping tool, sticky notes and task bar features.

Taskbar

Get immediateaccess with Jump Lists

The taskbar is now more convenient to use with larger views and easier access.
• Jump Lists allow you to right click on an icon in the taskbar and immediately access
items like music, videos or web pages that you use on a regular basis.
• Pin allows you to place programs on the taskbar and rearrange the order of the icons as
you wish.
• Action Center allows you to control the alerts and pop-ups you receive regarding
maintenance and security.
Search

Find documentsfast with the new Search


As soon as you start typing in theSearch bar of the Start Menu you will instantly see a list of relevant
options grouped by categories with highlighted keywords and text. This allows you to easily scan for the
documents, music, pictures and email you are looking for.

Libraries

Access your files in Libraries


Libraries allow you to organize your files in one place so they are easy to search and access.

Windows 7 has four default Libraries for documents, music, pictures and videos, however you can
customize and create you own Libraries based on your needs.

Gadgets

Desktop gadgets

You can select or download gadgets such as a slide show, calendar or weather update to add to your
desktop. The live updates of some gadgets like weather, stocks and feed headlines are quite convenient.

Additional things you can do in Windows 7


• Device Stage: When you plug a device into your computer such as a camera, mobile
phone or flash drive, a window will open up with a menu of popular tasks, status
information and options for your device.
• Windows Live Essentials: Windows Live Essentials is free software that enhances the
Windows 7 experience. It replaces Windows Mail and allows you to email, instant
message, edit photos, blog, etc.
• Home Group: Home Group allows you to connect two or more PCs on a home network
in order to easily share and access files and printers.
• Windows Touch: You can use Windows Touch with a touch-screen PC to browse and
flick through the screen using your fingers with multitouch technology.
• Remote Media Streaming: With Remote Media Streaming you can access your music,
pictures
and videos stored on your home PC remotely using the Internet.

Viewing open windows with Aero Peek

• If you wish, you can change the order of the icons by clicking and dragging the icon to
whatever space you desire on the taskbar.

Pin a program to the taskbar


You may Pin programs to the taskbar and access them with a single click of the mouse.

• To Pin a program, drag it to the taskbar and release.

Pinning a program to the taskbar

• To Unpin programs, simply right click on the icon and select Unpin.

Unpinning a program

Access a Jump List

A Jump List is like a "mini-menu" for a program. It allows quick access to recent files,
frequently viewed items, performance tasks and more. For example, you may select
frequently used websites with a simple click from the Internet Explorer Jump List.

• Right click on an icon to open the program's Jump List.

A Jump List for Internet Explorer


More Taskbar Features
Click the buttons in the interactive below to learn more about the additional taskbar icons.
Show Desktop
To Peek at the desktop without closing windows:
1. Hover the mouse over the Show desktopbutton.

The Show desktopbutton

2. The windows will become transparent allowing you to see the desktop.

Viewing the desktop


3. Click on the Show desktop button to close the windows.
4. Click again and the windows will return.

3. Understanding window upgrade, window update and action center.

Upgrading to Windows 7
Windows 7 Versions and Pricing The major upgrade versions of Windows 7 are Home
Premium, Professional, and Ultimate. Home Premium is the most popular version of Windows 7
and will likely suit the needs of most users. The Professional version may appeal to small to
medium business owners as it has extras like Windows XP mode and networking back up
features. Ultimate is the most powerful version with added security features, such as Bitlocker
and the flexibility of use in 35 languages.

Major upgrade versions To see which features each version of Windows 7 has, go to
Microsoft's Compare Windows 7 page.
• You may come across a Windows 7 Starter version. This version is made for smaller
laptops (sometimes called netbooks) and will have limited performance and features
compared to Home Premium.
• There is also a Windows 7 Home Premium Family Pack ($149.99) for upgrading up to
three PCs in the home.
• Full versions of the above products are more expensive, but will only be required if you
are not already running Windows XP or Vista.

Windows 7 Requirements for Upgrade

In order to run Windows 7, your PC must have the following:


• 1 gigahertz (GHz) or faster 32-bit (x86) or 64-bit (x64) processor
• 1 gigabyte (GB) RAM (32-bit) or 2 GB RAM (64-bit)
• 16 GB available hard disk space (32-bit) or 20 GB (64-bit)
• DirectX 9 graphics device with WDDM 1.0 or higher driver
Additional System Requirements may be needed to run certain features.
Windows 7 Upgrade Advisor

Microsoft is providing a tool called the Windows 7 Upgrade Advisor so customers can
determine if their PC is able to run Windows 7. It is a good idea to download the Windows 7
Upgrade Advisor before upgrading upgrading. It will analyze your computer's processor,
memory, storage, graphics capabilities and any other compatibility issues. If possible, it will
also provide guidance for resolving issues. You should plug in and connect all USB devices,
printers, external hard drives, etc. when running the Upgrade Advisor. This will provide the
best analysis of your system.

Windows Experience Index


It is another indicator of how well your computer will respond to window 7.the window
experience indedx tests your system and rates it with a score between 1 and 7.9. The higher the
score the better your computer’s performance.
1. To check your windows experience index, click on the start menu and select computer.
The computer window will appear.
2. Select system properties in the button bar at the top of the screen. The system window
displays your computer’s windows experience index rating. It also shows other system
information, including whether your computer has a 32 bit or 64 bit processor.

3. Select windows experience index link to view the rating of individual computer
components that are scored. The rating is determined by lowest subscore.
If you are currently using Windows Vista then your upgrade experience might be quite easy. If you
have XP, then upgrading will likely be more complicated. Either way, it is probably best to download
and run the Windows Upgrade Advisor before proceeding.

Based on the current version of your operating system, you will need to figure out if you have to
perform a simple upgrade or a custom (clean) installation. You can visit Microsoft's Upgrade to
Windows 7 page to determine what type of upgrade you need and what additional information should
be considered before performing the upgrade.

Even if you do not need to do the custom (clean) installation, it is a good idea to back up your files
before upgrading. For more information, read Backing Up Your Computer in our Computer Basics
tutorial. Microsoft provides instructions for doing a custom (clean) installation. However, you may
want to consider using a computer service professional if you are not comfortable with this process.
In this case, the score of 4.3 should be sufficient to experience most of the new windows features. If
your system scores lower than a 3, you may miss out on some of the digital media and graphics
features, including Window's Aero.
What Kind of Upgrade do I Need?

Once you have determined which Windows 7 version you want and what kind of upgrade you need to
perform, you may go to a retail outlet or the online Microsoft Store to purchase your upgrade.
Conclusion

Now that you know what it takes to upgrade, you have a better idea of whether Windows 7 is right for
you. Depending on your circumstances, upgrading may be an easy or complicated process. As
previously mentioned you should weigh any complications you may experience with your desire for the
improvements and features that Windows 7 has to offer. Time and cost are also factors, especially if
you are considering purchasing a new computer.
Personalize Font Settings

You may adjust the Font Settings and ClearType on your desktop based on your
preferences.
To Change the Font:

1. From the Search bar in the Start Menu, type and select Fonts.
2. Select the Font you desire from the Fonts

To Change the Font Size:


1. Adjust the Font Size by selecting Change Font Size from the menu on the left of the Fonts
pane.
2. Select the desired font size and click Apply.
Changing the font size
Please note that a larger font size may interfere with how some items are displayed on the
screen.
ClearType

You may also adjust the ClearType for your screen. ClearType helps improve the readability
of text on LCD monitors and screens.
• To adjust ClearType, select Adjust ClearType text from the menu on the left of the Fonts pane
and following the steps for selecting the text that appears the best to you.

Action Center:
What is the Action Center?
The Action Center is a centralized place to view Security and Maintenance messages, and it
also makes it easy to find and fix problems with your computer.
To Use the Action Center: If you have any important messages, the flag icon on the taskbar
will display a red "X" symbol.
1. To open the Action Center, click on the small flag icon on the taskbar.
2. Review the messages.
3. Click Open Action Center to respond to messages.

Open the
Action Center

To Access the Action Center from the Control Panel:


1. Click Start.
2. Go to the Control Panel.
3. Click Review Your Computer's Status under System and Security.

Fixing problems using the Action Center:


Your messages are displayed in the Action Center pane. Important messages will have a red bar,
and less important ones will have a yellow bar. If a security or maintenance issue has a solution,
there will be a button on the right side of the message.
Some messages are just notifications and do not indicate a problem with your computer. Those
messages will not include a solution button, but they may still have important information or
instructions.
Respond to messages in the Action Center
Changing Your User Account Control Settings

What is User Account Control?


User Account Control warns you when a program or user is trying to change your computer's settings.
It puts a temporary lock on your computer until you confirm that you want to allow the changes. This
helps to protect your computer frommalicious software. When it was introduced in Windows Vista, many
users found that it generated too many disruptive pop -up warnings. Windows 7 now lets the user
decide how often they will receive those warnings.

To Change Your User Account Control Settings:


1. Open the Action Center.
2. Click Change User Account Control settings.
Change User Account Control Settings

4. Use the slider to choose the level of protection you want from User Account
Control. It is recommended that you use one of the top two settings. The other two
should only be used in special circumstances. It may be best to choose the highest setting
and if you end up getting too many popups, you can always lower it to the second setting.

Adjust how you receive notification messages


Windows 7 Troubleshooting

Not all computer problems will be shown in the Action Center. For example, you may be
having trouble with aparticular program or device, or with connecting to the internet. For
these types of problems, you will want to view the Troubleshooting options.
To get there, click Troubleshooting at the bottom of the Action Center pane.

Access Troubleshooting

In the Troubleshooting pane you will see a number of programs called troubleshooters, which
help you identify and fix problems with your software and hardware.

Click the buttons in the interactive below to see information about some useful troubleshooters.
Note that your computer may have a slightly different list of troubleshooters.
4. To create user account and setting up parental control on user account.

To create a new account:

1. From the Manage Accounts pane, click Create a new account.


2. Type an account name.

Creating an account

3. Select Standard user or Administrator.


4. Click Create Account.

Changing an Account's Settings


Once you've created a new account, you may want to add a password or make other changes to
the account'ssettings.
To Create a Password:

1. From the Manage Accounts pane, click the account name or picture.

2. Click Create a password.

Create a password

3. Type a password in the New password field and retype it in the Confirm new password
field.
Type a password and hint

4. If you want, you can type a password hint to help you remember your password.
5. Click Create password.
6. To go back to the Manage Accounts pane, click Manage another account.
Account passwords are case sensitive, which means that capital and lowercase letters are treated
as different characters. For example, aBc1 is not the same as abc1.

To Change Your Account Picture:


You can also change the picture for any account. This picture appears next to the account name
and helps you easily identify the account.
1. From the Manage Accounts pane, click the account name or picture.
2. Click Change the picture.
Change the picture

3. Select a picture, or click Browse for more pictures to select one of your own.

Account pictures

4. Click Change Picture.

Standard vs. Administrator Accounts


Before you start making new user accounts, it's important to understand the two types of accounts:
 Standard: Standard accounts are the basic accounts you use for normal, everyday tasks.
As a Standard user, you can do just about anything you would need to do, such as running
software or personalizing your desktop. Also, Parental Controls can be placed on Standard
accounts.
 Administrator: Administrator accounts are special accounts used for making certain
changes to system settings or managing other people's accounts. They have full access to
every setting on the computer. Every computer will have at least one Administrator
account.

So as you can see, Administrator accounts are more powerful. But for the same reason, Standard
accounts are safer, so they are generally better for everyday use. In fact, you can make
Administrator-level changes while logged into a Standard account; you will just need to
provide an Administrator password when making the changes.

To Go to Your User Accounts:


1. Go to your Control Panel from the Start Menu.
2. Click Add or remove user accounts.

3. The Manage Accounts pane will appear. You will see all of the user accounts here, and you
can add more accounts or manage existing ones.
The Manage Accounts pane

Using Parental Controls

Windows 7 offers various Parental Controls to help you control the types of content that your
children can access. You can place parental controls on any Standard account, and each account can
have different settings. If you have more than one child, each child can have access to different types
of content, and you can always change the Parental Controls settings as your child gets older.

Learn more about Parental Controls in this video.


Before You Set Up Parental Controls
You'll need to create an account for your child, if you haven't already. It should be a Standard
account; you can't apply Parental Controls to an Administrator account.

When you're setting up Parental Controls, it doesn't matter which account you're logged into, but if
you're logged into a Standard account, then you'll need to provide an Administrator password before
making any changes.

Make sure that your child does not know your Administrator password, as it would allow them to
change or disable Parental Controls for any user account.
To Set up Parental Controls:
1. Go to your Control Panel from the Start Menu.
2. Click Set up parental controls for any user.
Getting to Parental Controls

3. Click on any Standard Account.

Choose an account

4. Click On to turn Parental Controls on.


Parental Controls main page

5. Now you can click Time limits, Games or Allow and block specific programs to set the
Parental Controls. We'll explore each of these on the next page.
Changing Your Parental Controls Settings

Time Limits

The Time limits settings allow you to control when your child can use the computer. Click and drag
from any box to allow or block a section of time. If you want, you can set different time limits on different
days. For example, you may want to allow more computer use on weekends.

Time limits
Games

The Games settings allow you to select which game ratings to allow, and you can also allow or block
specific games. First you'll have to click Yes to allow your child to play games, then you can change your
Games settings.

Games settings

Here we have selected "Everyone" as the highest rating allowed. That means thechild can play games rated
"Everyone" OR "Early Childhood."

Game ratings
To Allow or Block Specific Programs:

Allow and block specific programs controls which non-game programs your child can use. By
default, your child can use all non-game programs. But there may be some programs you don't
want your child to use like a financial or email program. Here's how to block specific programs:

1. Click Will Jr can only use the programs I allow.


2. Click Check All.
3. Uncheck the programs you want to block.

Non-game
programs

5. Commands for window power shell and MSCONFIG.

How to use MSCONFIG in Windows 7


Here is how to use MSCONFIG in Windows 7 to disable some of the unnecessary programs
that automatically load on start-up. Disabling these programs will help your computer boot
faster.
1. Click on the Windows 7 start icon in the bottom left corner of your screen.
2. Type MSCONFIG in the search box and then either press enter on your keyboard or
double-click on the MSCONFIG program that appears in the search results.
3. Windows 7 will launch Microsoft's System Configuration Utility. Click on the Startup tab.

4. This takes you to a page with a list of "startup items." Startup items are programs that
are automatically loaded every time you turn on your computer. Some startup programs
are absolutely necessary, others are simply a waste of RAM.
In Windows 7, allmost all of Windows' essential programs are loaded through something
called "Windows Services." This means that most of the startup items you see in
Windows 7 are completely optional and can be turned off. However, a good rule of
thumb is to disable only those programs that you recognize and don't need to have
running all the time. When in doubt, leave it on. Or, better still, check out Paul "PacMan"
Collins' huge "Startup Applications" list at http://www.pacs-
portal.co.uk/startup_search.php. This list of over 25,000 startup items you may encounter
in MSCONFIG tells you which items are absolutely necessary, which items are optional,
and which items you should definitely uncheck.

Commands for window power shell:

1: Get-Help

The first PowerShell cmdlet every administrator should learn is Get-Help. You can use
this command to get help with any other command. For example, if you want to know
how the Get-Process command works, you can type:

Get-Help -Name Get-Process

You can also use Get-Help with individual nouns and verbs. For example, to find out all
the commands you can use with the Get verb, type:

Get-Help -Name Get-*

2: Set-ExecutionPolicy

Although you can create and execute PowerShell scripts, Microsoft has disabled
scripting by default in an effort to prevent malicious code from executing in a
PowerShell environment. You can use the SetExecutionPolicy command to control the
level of security surrounding PowerShell scripts. Four levels of security are available to
you:

• Restricted -- Restricted is the default execution policy and locks PowerShell down
so that commands can be entered only interactively. PowerShell scripts are not
allowed to run.
• All Signed -- If the execution policy is set to All Signed then scripts will be allowed
to run, but only if they are signed by a trusted publisher.
• Remote Signed -- If the execution policy is set to Remote Signed, any PowerShell
scripts that have been locally created will be allowed to run. Scripts created remotely
are allowed to run only if they are signed by a trusted publisher.
• Unrestricted -- As the name implies, Unrestricted removes all restrictions from the
execution policy.

You can set an execution policy by entering the Set-ExecutionPolicy command followed
by the name of the policy. For example, if you wanted to allow scripts to run in an
unrestricted manner you could type:

Set-ExecutionPolicy Unrestricted

3: Get-ExecutionPolicy

If you're working on an unfamiliar server, you'll need to know what execution policy is
in use before you attempt to run a script. You can find out by using the Get-
ExecutionPolicy command.

4: Get-Service

The Get-Service command provides a list of all of the services that are installed on the
system. If you are interested in a specific service you can append the -Name switch and
the name of the service (wildcards are permitted) When you do, Windows will show you
the service's state.

5: Convert To-HTML

PowerShell can provide a wealth of information about the system, but sometimes you
need to do more than just view the information onscreen. Sometimes, it's helpful to
create a report you can send to someone. One way of accomplishing this is by using the
ConvertTo-HTML command.

To use this command, simply pipe the output from another command into the
ConvertTo-HTML command. You will have to use the -Property switch to control which
output properties are included in the HTML file and you will have to provide a filename.
To see how this command might be used, think back to the previous section, where we
typed Get-Service to create a list of every service that's installed on the system. Now
imagine that you want to create an HTML report that lists the name of each service along
with its status (regardless of whether the service is running). To do so, you could use the
following command:

Get-Service | ConvertTo-HTML -Property Name, Status > C:\services.htm

6: Export-CSV

Just as you can create an HTML report based on PowerShell data, you can also export
data from PowerShell into a CSV file that you can open using Microsoft Excel. The
syntax is similar to that of converting a command's output to HTML. At a minimum, you
must provide an output filename. For example, to export the list of system services to a
CSV file, you could use the following command:

Get-Service | Export-CSV c:\service.csv

7: Select-Object

If you tried using the command above, you know that there were numerous properties
included in the CSV file. It's often helpful to narrow things down by including only the
properties you are really interested in. This is where the Select-Object command comes
into play. The Select-Object command allows you to specify specific properties for
inclusion. For example, to create a CSV file containing the name of each system service
and its status, you could use the following command:

Get-Service | Select-Object Name, Status | Export-CSV c:\service.csv

8: Get-EventLog

You can actually use PowerShell to parse your computer's event logs. There are several
parameters available, but you can try out the command by simply providing the -Log
switch followed by the name of the log file. For example, to see the Application log, you
could use the following command:

Get-EventLog -Log "Application"

Of course, you would rarely use this command in the real world. You're more likely to
use other commands to filter the output and dump it to a CSV or an HTML file.

9: Get-Process
Just as you can use the Get-Service command to display a list of all of the system
services, you can use the Get-Process command to display a list of all of the processes
that are currently running on the system.

10: Stop-Process

Sometimes, a process will freeze up. When this happens, you can use the Get-Process
command to get the name or the process ID for the process that has stopped responding. You
can then terminate the process by using the Stop-Process command. You can terminate a
process based on its name or on its process ID. For example, you could terminate Notepad by
using one of the following commands:
Stop-Process -Name notepad
Stop-Process -ID 2668
Keep in mind that the process ID may change from session to session.

11. Get-Date Get current date and time

12. Clear-Host clear/cls Clear the screen

6. To understand system restore, recovery tool option, various safe mode


options and MMC console management.

Recovering Your Settings with System Restore

What is System Restore?

Programs that you install can make changes to your system settings, and occasionally this can
cause problems with your computer. System Restore is often the easiest way to fix these
problems. System Restore allows you to "rewind" your system settings to an earlier point in
time, called a restore point. Keep in mind, this will not erase your recent documents, and it
cannot be used to recover lost documents or other files. However, it may uninstall recent
programs and drivers.
To Run System Restore:
1. Click Recovery at the bottom of the Action Center.
Opening System Restore

2. Click Open System Restore.


3. Follow the instructions on the screen.
4. You will be asked to select a restore point. If you've just installed a program that seems
to be causing problems, you will probably want to restore your system to the point just
before that program was installed.

Choose a system restore point


Microsoft Management Console 3.0

Microsoft has based most of its management applications on the Microsoft Management
Console, or the MMC. The MMC provides a framework for building management consoles. This
framework has been used by Microsoft and many third-party application vendors for creating
their management consoles. In fact, many of configuration tools available in Windows 7 are
really MMC consoles with pre-added snap-ins. The consoles are then saved in such a way that
they cannot be directly altered by users.

The MMC contains snap-ins that are used for system and application management. As seen in
Figure 5.22, Windows 7comes with many built-in MMC snap-ins that can be used to manage the
system. These snap-ins can

Figure 5.22: Windows 7 MMC Snap-ins be used to manage user settings, Windows

applications, security, and many other vital aspects of the system.

Windows 7 contains the following built-in MMC snap-ins:

• ActiveX Control – This snap-in allows you to add individual ActiveX controls to view and
configure.
ActiveX controls are Internet Explorer plug-ins that are used to add functionality to the
browser.
• Authorization Manager – This snap-in allows you to set permissions for Authorization
Managerenabled applications.
• Certificates – This snap-in allows you to configure the different certificate stores available
on the system. Certificates help provide a secure operating environment for your system.
You can use them for identification, securing data, and securing communications. There are
certificate stores in place for users, applications, and the system itself.
• Component Services – This snap-in is used to manage the system's COM+, or Component
Services configuration. You can also configure Distributed Computer Object Model
(DCOM) and Distributed Transaction Coordinator (DTC) settings using this snap-in. These
are especially important when programs need to communicate between multiple computers.
• Computer Management – This snap-in is actually a collection of snap-ins used for task
scheduling, disk management, performance monitoring, and many other configuration and
management tasks.
These snap-ins are grouped together under Computer Management for ease of use.
• Device Manager – This snap-in is used for viewing and configuration of hardware devices
installed on the system. You disable devices, update drivers, and troubleshoot potential
issues with your hardware devices.
• Disk Management – This snap-in is used for disk and volume management. You can create
volumes, format disks, and enable fault tolerance.
• Event Viewer – This snap-in is used to view the system event logs. These logs can help you
determine if your system or applications are having problems. The Security log can also be
used to determine if there is unauthorized access to your system.
• Folder – This snap-in is used to add a folder than can be used for organizing your snap-ins.
This can come in very handy if you have added many snap-ins to a single MMC console.
OS Lab manual

Group Policy Object Editor – This snap-in is used for configuring the Group Policy Objects on the
system. Group policies are used to provide a centralized way for managing your systems.

IP Security Monitor – This snap-in is used to monitor the status of your IP Security(IPsec)
configuration. IPsec is used to secure communications between computers. This snap-in can
help you determine which IPsec policies are being applied to your systems.

IP Security Policy Management – This snap-in is used to understand and configure the settings
in your IPsec policy.

Link to Web Address – This snap-in allows you to add a Web page to the MMC. This can be
useful for applications and systems with Webbased management.

Local Users and Groups – This snap-in allows you to configure users and groups on the local
system.
You can add user accounts, delete user accounts, and configure various user properties.

NAP Client Configuration – This snap-in allows you to configure Network Access Protection
(NAP) client configuration settings. NAP is a security feature that is used to limit who can gain
access to your network.

Performance Monitor – This snap-in allows you to monitor your system performance, including
memory, hard disks, processors, and many other components.

Print Management – This snap-in is used to manage print servers and printers connected to the
system.

Resultant Set of Policy – This snap-in is used to show what settings will be applied to the
system after all policies have been applied. This helps when you want to test out your Group
Policy settings without actually applying them to the system.

Security Configuration and Analysis – This snap-in provides configuration and analysis of
security templates being applied to the system.

Security Templates – This snap-in allows you to edit the security templates that can be applied to
the system.

Services – This snap-in allows to you view and configure the properties for services running
on the system. You can disable, start, stop, or restart services. You can also configure
authentication and fault tolerance for services.
OS Lab manual
Shared Folders – This snap-in allow you to view properties and status information for file shares
that exist on the system. You can see what folders are beings shared and who is accessing them.

Task Scheduler – This snap-in allows you to sche

dule tasks to be automatically run at specified times and/or at specified intervals.

TPM Management – This snap-in allows you to configure the Trusted Platform Module, if
one exists in the system. Trusted Platform Modules are used to generate keys for cryptographic
operations.

Windows Firewall with Advanced Security – This snap-in allows you to configure
Windows Firewall settings on the system. You can control what processes, applications, and
systems can access your system or generate network traffic from your system.

• WMI Control – This snap-in allows you to configure and manage the Windows Management
Instrumentation (WMI) service. WMI is used for management and monitoring of Windows
systems. To add snap-ins to an MMC console, do the following:

1. Run the command MMC.exe from a command prompt or from the Windows 7 Search bar.
2. If prompted by UAC to allow the MMC to make changes to the computer, click Yes. This
should bring up a blank MMC console.
3. From the File menu, select Add/Remove Snap-in.
4. From the Add or Remove Snap-ins window, choose the snap-in you want to add.
ClickAdd. Depending on the snap-in you add, you may be prompted for additional
information.
5. After you have added all your snap-ins, click OK. You snap-ins should now appear in the
MMC. The MMC can be very flexible. You can add whatever snap-ins you want to a blank
MMC console. You can also modify one of the predefined management tools that use the
MMC. After you have modified an MMC console, you have the option to save your
changes. Simply select File | Save or File | Save As, whichever is appropriate.

There are also other options available for controlling what can and cannot be done inside an
MMC console. If you choose File | Options, you will be presented with the MMC Options
window, as seen in Figure 5.23. Here, you can change the icon used for console, or set the
console mode. The console mode determines what users can and cannot see within the console
and what changes they can make. The following are the four basic console modes available for
the MMC:
OS Lab manual
• Author mode – This mode gives you full access to do anything in the MMC. You can add
and remove snap-ins, create views, and open new windows.
• User mode – full access – This mode give you full access to the tree within the MMC. But,
you cannot add or remove snap-ins.
• User mode – limited access, multiple window – This mode prevents you from being able
to view contents of the tree that are not visible in the console window.
• User mode – limited access, single window – This mode opens the console with just a
single window.
Users cannot view items that do not appear in that window.
The Options window allows you to specify if changes to the console can be saved. There is
also an option for whether or not to allow the user to customize the console views.

MMC Options Window

Computer Management Console

• System Tools – Task Scheduler, Event Viewer, Shared Folders, Local Users and Groups,
Performance, Device Manager
• Storage – Disk Management
• Services and Applications – Services, WMI Control

Figure 5.24: Computer Management Console

These snap-ins are used to manage the system. Again, these snap-ins can be used individually.
The Computer Management console just puts them all together to make management easier. If
you need to, you can create a custom MMC console with these snap-ins in addition to others.
OS Lab manual
Local Group Policy Editor

Setting individual settings can be quite cumbersome. To help Windows uses the concept of
group policies. Group policies can be used to easily set multiple settings. Windows 7 comes
with an MMC snap-in called Group Policy Object Editor. You can add this snap-in to the
MMC and choose Local Computer when asked which Group Policy Object to edit. Now, you
can edit the computer's local group policy.

As seen in Figure 5.25, the local computer policy is divided into two main sections:Computer
Configuration and User Configuration.

Figure 5.25: Local Computer Policy Snap-in

Computer Configuration

The Computer Configuration section is used for computer-wide settings. Many of these
settings are applied when the system first boots up. These settings will apply to any user who
logs into the system. The Computer Configuration section contains three subfolders:

• Software Settings – By default, there is nothing to be configured here.


• Windows Settings – These are general Windows settings that can be configured for all
users. There are subnodes for Name Resolution Policy, Scripts(Startup/Shutdown),
Deployed Printers, Security Settings, and Policy-based QoS.
• Administrative Templates – These are registry-based settings that can be set for the
system. There are subnodes for Control Panel, Network, Printers, System, andWindows
Components.
User Configuration

The User Configuration section is used for user-specific settings. Most of these settings are
not applied until a user logs into a system. These settings will apply no matter what system a
user logs into. The User Configuration section contains three subfolders:

• Software Settings – By default, there is nothing to be configured here.


• Windows Settings – These are general Windows settings that can be configured for all
users. There are subnodes for Scripts(Logon/Logoff), Security Settings, Policy-based
QoS, Deployed Printers, and Internet Explorer Maintenance.
OS Lab manual
• Administrative Templates – These are registry-based settings that can be set for the
system. There are subnodes for Control Panel, Desktop, Network, Shared Folders, Start
Menu, and Taskbar,
System, and Windows Components.

7. Introduction to window 7 upgrade advisor, windows defender and windows


registry file.

Windows Registry
The registry has long been the central configuration store for Windows systems. The registry is
divided in categories called hives. These hives are where the actual configuration settings are
stored.

There are five main hives in the registry are as follows:


• HKEY_CLASSES_ROOT – This maintains file type associations.
• HKEY_CURRENT_USER – This maintains user settings for the user currently logged
into the system.
• HKEY_LOCAL_MACHINE – This maintain system-wide settings.
• HKEY_USERS – This maintains user settings for all users.
• HKEY_CURRENT_CONFIG – This maintains information about the current hardware
configuration.
The registry can be modified directly or indirectly. You must be careful when modifying the
registry directly. Any misconfigurations or typos can severely affect the functioning of your
system. Regedt32 is the primary tool provided with Windows 7 for modifying the registry. You
can use Regedt32 to configure registry settings and to set registry permissions.

Simplified Configuration and Management of Desktops

Microsoft developers included an undocumented method for simplifying administration by


combining shortcuts. It is a simple and single container with multiple shortcuts to Windows 7
options that are available through other methods as seen in Figure 5.26. This may be helpful
for administrators and power users alike to configure and manage single Windows 7 desktops.
OS Lab manual

Combined Shortcut Window

Windows Task Scheduler

1. Open Task Scheduler by clicking the Start button , clicking Control Panel, clicking System
and Security, clickingAdministrative Tools, and then double-clicking Task Scheduler. If
you're prompted for an administrator password or confirmation, type the password or provide
confirmation.

2. Click the Action menu, and then click Create Basic Task.

3. Type a name for the task and an optional description, and then click Next.

4. Do one of the following:

• To select a schedule based on the calendar, click Daily, Weekly, Monthly, or One time,
click Next; specify the schedule you want to use, and then click Next.

• To select a schedule based on common recurring events, click When the computer starts or
When I log on, and then click Next.

• To select a schedule based on specific events, click When a specific event is logged, click
Next; specify the event log and other information using the drop-down lists, and then click
Next.

5. To schedule a program to start automatically, click Start a program, and then click Next.

6. Click Browse to find the program you want to start, and then click Next.

7. Click Finish.

To schedule a task to run automatically when the computer starts

If you want a task to run when the computer starts, whether a user is logged on or not, follow
these steps.

1. Open Task Scheduler by clicking the Start button , clicking Control Panel, clicking System
and Security, clickingAdministrative Tools, and then double-clicking Task Scheduler. If
you're prompted for an administrator password or confirmation, type the password or provide
confirmation.
OS Lab manual
2. Click the Action menu, and then click Create Basic Task.

3. Type a name for the task and an optional description, and then click Next.

4. Click When the computer starts, and then click Next.

5. To schedule a program to start automatically, click Start a program, and then click Next.

6. Click Browse to find the program you want to start, and then click Next.

7. Select the Open the Properties dialog for this task when I click Finish check box and click
Finish.

8. In the Properties dialog box, select Run whether user is logged on or not, and then click
OK.

8. Making a word file and how to protect it with password.

The following part shows you a simply instruction of password protecting Microsoft Excel
2013 files.

• Open the Microsoft Excel 2013 spreadsheet that you want to password protects. And click on
the "FILE" on the left tip of the interface.

• Select the "Info" option from the left-side panel of the File menu. Select "Protect Workbook"
and then the "Encrypt with Password" on the drop down menu.
OS Lab manual

• Type your password in the Encrypt Document dialog window. Remember that the password
should be strong and unforgettable.
Note: A strong password needs to contain special character such as @#$%^& and must be at
least 8 characters long.

• Re-enter your password in the Conform password window and click "OK".
OS Lab manual

How to Password Protect Excel 2013 Read Only Option?

Microsoft Excel 2013 also let users to secure their documents from changing by using edit
restriction options. Thus others can only read but cannot change your Excel 2013 files.

Here is how:

• 1. Click on the "FILE"-> "Info" option -> "Protect Workbook" -> Restrict Editing

• 2. Set the formatting as well as editing restrictions on the document.

• 3. Check the "Allow only this type of editing document" within the Editing Restrictions and
choose the No change (Read only) option in the dropdown list and then select "Everyone" in
groups.
OS Lab manual

• 4. Enter your password in the "Start Enforcing Protection" box and click "OK".

Protecting an Excel 2013 workbook is easy with the steps above. In addition, a number of
Excel 2013 users complain that they often encounter the dilemma of forgetting Excel 2013
password. With that in mind, I will introduce a simple way for you to find your lost Excel 2013
password below.

How to Recover Password-protected Excel 2013 File?

• Download and install an Excel 2013 password recovery tool on your computer. Launch the
software after installation.
OS Lab manual
Download SmartKey Excel Password Recovery:

Size: 31.15MB

Secure Download

• Select an attack type to recover your forgotten MS Excel password. (Normally choose from
Brute-Force with Mask, Brute-Force Attack, and Dictionary).

• Your lost password will be appearing in the File Opening Password box of the pop-up
dialogue window after a few seconds.

Now following the tips we offered you can easily protect workbook in Excel 2013 whenever
you need to. And if unfortunately forgot MS Excel 2013 password, don't worry; the powerful
Microsoft Excel 2013 password recovery tool will recover your password effectively and
professionally.
OS Lab manual
9. To create a blog.

How To Create a Blog for Free in 4 Easy Steps


Step 1: Choose a free blogging software.

Step 2: Register for an account and create your blog

These articles from About.com Web Logs provide step-by-step instructions to help you start a blog
with either of the two most popular free blogging softwares - Blogger.com and Wordpress.com.

Step 3: Select Your Domain, Theme and Other Options.

During the registration process for your new blog account, you'll need to choose a domain name
and blog theme. You also might want to take a few minutes before you actually start blogging to
customize some of the other preferences for your blog that your blogging software allows you to
modify such as the author name, comment moderation process, and so on. However, you're not
required to do any customization before you start publishing blog posts.

Step 4: Start blogging.

Once you've completed steps 1-3, you're ready to join the blogosphere and start publishing content
on your blog. There are many more ways you can customize your blog with plug-ins, feeds,
blogrolls, and more, but these four easy steps are all you need to follow in order to start a simple
blog.

How to enable a pen drive to use on a system if it is disabled?


Right click on My computer; You will see manage.

Click on Manage, You will get the Computer management Local on the left and you will see
device manager;

Click on device manager; You will see Universal Serial Bus Controllers on the right;

Click on USB Controllers you will see storage, right click on it, you will see the enable menu, just
click it .

Remote Desktop Connection


Remote Desktop Connection is a technology that allows you to sit at a computer (sometimes called
the client computer) and connect to a remote computer (sometimes called the host computer) in a
different location. For example, you can connect to your work computer from your home computer
OS Lab manual
and have access to all of your programs, files, and network resources as though you were in front
of your computer at work. You can leave programs running at work and then, when you get home,
you can see your work computer's desktop displayed on your home computer, with the same
programs running.

A Remote Desktop connection between two


computers

You cannot use Remote Desktop Connection to connect to remote (host) computers running
the following editions ofWindows Vista:

• Windows Vista Starter


• Windows Vista Home Basic
• Windows Vista Home Basic N
• Windows Vista Home Premium
However, any edition of Windows Vista can be running on your computer (the one you want to
connect from).

You cannot use Remote Desktop Connection to connect to remote computers running
Windows XP.

You don't need to install it. In this version of Windows, Remote Desktop Connection is
installed by default.

• Open Remote Desktop Connection by clicking the Start button , clicking All
Programs, clicking Accessories, and then clicking Remote Desktop Connection.

To allow remote connections on the computer you want to connect to, follow these steps:

1. Open System by clicking the Start button , clicking Control Panel, clicking System
and Maintenance, and then clicking System.
OS Lab manual
2. Click Remote settings on the left.

3. In the System Properties dialog box, under Remote Desktop, select the one of the three
options, and then click Select Users. If you are prompted for an administrator
password or confirmation, type the password or provide confirmation.

If you are an administrator on the computer, your current user account will automatically
be added to the list of remote users and you can skip the next two steps.

4. In the Remote Desktop Users dialog box, click Add.

5. In the Select Users or Groups dialog box, do the following:

• To specify the search location, click Locations, and then select the location you want to
search.
• In Enter the object names to select, type the name of the user that you want to add, and
then click OK.
The name will be displayed in the list of users in the Remote Desktop Users dialog box.

Note

• You can’t connect to a computer that is sleeping or hibernating, so make sure the settings
for sleep and hibernation on the remote computer are set to Never. (Hibernation is not
available on all computers.) For information about making those changes, see Change,
create, or delete a power plan (scheme).

How do I change Remote Desktop Connection settings?


1. Open Remote Desktop Connection by clicking the Start button , clicking All
Programs, clicking Accessories, and then clicking Remote Desktop Connection.

2. Before connecting, click Options, and then make the changes you want on the Display,
Local Resources, Programs,Experience, and Advanced tabs.

1. Note

To save these settings for future connections, on the General tab, click Save.

2. Click Connect.

How can I disconnect from a Remote Desktop session?


To disconnect without ending your Remote Desktop session

• You can temporarily disconnect from a session by clicking the Close button on the
connection bar (the horizontal bar at the top of your screen). This leaves your programs
running so that, next time you connect, you can continue where you left off.
OS Lab manual
To end your Remote Desktop session and disconnect

• In the Remote Desktop Connection window, click the Start button , click the arrow
next to the Lock button , and then click Log Off.

How can I reconnect after temporarily disconnecting from a Remote Desktop session?
Connect to the remote computer as you normally would. The next time you connect to the
same remote computer, Remote Desktop Connection automatically reconnects to the session
that was in progress (if the remote computer is set up to allow reconnecting of disconnected
sessions).

Can I use keyboard shortcuts with Remote Desktop Connection?


Yes. There are two ways to do this. You can set up the remote computer to recognize Windows
keyboard shortcuts that you type (for example, ALT+TAB), or you can use Terminal Server
keyboard shortcuts.

To use Windows keyboard shortcuts, follow these steps:

1. Open Remote Desktop Connection by clicking the Start button , clicking All
Programs, clicking Accessories, and then clicking Remote Desktop Connection.

2. Click Options, and then click Local Resources.

3. Under Keyboard, select On the remote computer to make the remote computer
recognize the Windows keyboard shortcuts that you type. (You can also choose In full
screen mode only to get the same result as long as you use Remote Desktop Connection
in full-screen mode. This is the default setting.)

What is Windows Remote Assistance?


Applies to Windows 7
Sometimes the best way to fix a problem is to have someone show you how. Windows Remote
Assistance is a convenient way for someone you trust, such as a friend or technical support
person, to connect to your computer and walk you through a solution—even if that person isn't
nearby. To help ensure that only people you invite can connect to your computer
usingWindows Remote Assistance, all sessions are encrypted and password protected.
OS Lab manual

Remote Assistance connection between two


computers

By following a few steps, you can invite someone to connect to your computer. After he or she
is connected, that person can view your computer screen and chat with you about what you
both see. With your permission, your helper can even use his or her own mouse and keyboard
to control your computer and show you how to fix a problem. You can also help someone else
the same way. For more information, see Get help with your computer using Windows
Remote Assistance and Help someone with a computer problem using Windows Remote
Assistance.

Sending a Remote Assistance Invitation

1. Open Help and Support Center by clicking Start, and then clicking Help and Support.
2. Under Ask for Assistance click Invite a friend to connect to your computer with
Remote
Assistance.
3. The Remote Assistance page is displayed. Click Invite someone to help you.
4. There are three available options for sending the Remote Assistance invitation: Windows
Messenger, email, or saving the invitation as a file. Choose one of the three options, and
then follow the directions. With the email or Save as Invitation methods, the Novice
will be given the opportunity to protect the session with a password. The Novice must
also select a time period when the invitation will automatically expire. The Novice can
expire any invitation at any time by clicking the View invitation status link on the
Remote Assistance page that is referred to in Step 3.
5. When the Expert receives the invitation, the Expert is prompted for the password which
the Novice set. After supplying this password, the Expert can initiate the Remote
Assistance session.
6. After the Expert initiates the session, the Novice's computer verifies the password that
the Expert entered.
7. The Novice's computer also checks to make sure that the invitation that the Expert used
is a valid invitation and that the invitation is still open.
OS Lab manual
8. If the invitation is open and the password is correct, the Novice receives a notification
stating that the Expert wants to start the session now and the Novice is prompted to start
the Remote Assistance session.
9. If the Novice chooses to start the session, the Remote Assistance Novice chat dialog
box will open on the Novice's computer and the Remote Assistance Expert console
opens on the Expert's computer. At this point, the Expert can see everything on the
Novice computer, in real time.
10. The Expert can request to take control of the Novices computer at this point by clicking
the Take
Control button on the Expert console. This sends a message to the Novice's computer notifying
the Novice that the Expert is requesting to take control of the computer. The message provides
the following three methods by which the Novice can stop the Experts control of their computer:
Press the ESC key. Hold down the CTRL key, and then press the C key.
Click the Stop Control button next to the Novice's chat window.
11. If the Novice chooses to give control of the computer to the Expert, the Novice and the
Expert share control of the keyboard and the mouse. It is best if the Novice does not
move the mouse or type when the Expert has control because the session responds to
both users inputs, which causes the mouse to behave erratically. If the Novice stops
control, the Remote Assistance session continues and the Expert can still see the
Novice's desktop.

10. Implementation of disk defragmenter and disk cleanup maintenance tools.

What is disk defragmentation?


Applies to Windows Vista
Disk defragmentation describes the process of consolidating fragmented files on your
computer's hard disk.

Fragmentation happens to a hard disk over time as you save, change, or delete files. The
changes that you save to a file are often stored at a location on the hard disk that's different
from the original file. Additional changes are saved to even more locations. Over time, both the
file and the hard disk itself become fragmented, and your computer slows down as it has to
look in many different places to open a file.

Disk Defragmenter is a tool that rearranges the data on your hard disk and reunites fragmented
files so your computer can run more efficiently. In this version of Windows, Disk
Defragmenter runs on a schedule so you don't have to remember to run it, although you can
still run it manually or change the schedule it uses.

To start Disk Defragmenter MMC, use one of the methods that is described in this article.

Method 1: Use the Properties of Your Local Disk

1. Open My Computer.
OS Lab manual
2. Right-click the local disk volume that you want to defragment, and then click
Properties.
3. On the Tools tab, click Defragment Now.
4. Click Defragment.

Method 2: Use Computer Management MMC

1. Start Computer Management MMC (Compmgmt.msc).


2. Click Disk Defragmenter.
3. Click the volume that you want to defragment, and then click Defragment.

Method 3: Use Disk Defragmenter MMC.

1. Start Disk Defragmenter MMC (Dfrg.msc).


2. Click the volume that you want to defragment, and then click Defragment.
The version of Disk Defragmenter MMC that is included with Windows XP has the following
limitations:
• It can defragment only local volumes.
• It can defragment only one volume at a time.
• It cannot defragment one volume while it is scanning another.
• It cannot be scheduled. If you need to schedule disk defragmentation, use the Defrag.exe
command line tool. For additional information about using the command line Defrag.exe
tool, click the following article number to view the article in the Microsoft Knowledge
Base:
283080 Description of the New Command Line Defrag.exe Included with
Windows XP It can run only one MMC snap-in at a time.

How to Defragment a Hard Drive on a Windows 7 PC


By Dan Gookin from Troubleshooting Your PC For Dummies, 3rd Edition

Defragmenting is commonly called defragging. No matter what you call it, defragging or
defragmenting your hard drive will speed up disk performance. If you haven’t defragmented
your PC’s hard drive in a while (or ever), you’re in for a treat. A freshly defragmented hard
drive makes your computer seem brand new.

Your PC’s main hard drive is automatically defragmented on a regular schedule when you use
Windows 7. Even so, you can manually defragment your hard drive or removable storage
media.

In Windows 7, follow these steps to pull a manual defrag of the PC’s main hard drive:

1. Open the Computer window.


2. Right-click the media you want to defragment, such as the main hard drive, C.
3. In the drive’s Properties dialog box, click the Tools tab.

1. Click the Defragment Now button.


OS Lab manual
The Disk Defragmenter window appears. Rather than plow ahead and potentially waste
time defragmenting a drive that doesn’t need it, check the media’s current
fragmentation.

2. Click the Analyze Disk button.


3. Wait while Windows checks the defragmentation on the media.

Check the Percent Fragmented value by the disk in the Disk Defragmenter window. If
it’s zero, there’s no point in continuing: Skip to Step 8.

Even when the drive shows 0 percent fragmented files, you can still proceed with
defragmentation. No media can be fully defragmented, so the Windows Defragmenter
will always find something to do.

4. Click the Defragment Disk button.

Windows defragments the media. Sit back and watch, or do something else, though you
shouldn’t do anything on your computer while the media is being defragmented.

5. Click the Close button, and close up any other windows you opened.
You may not notice any drastic improvement in disk performance, especially when the hard
drive is frequently defragmented. But if you just defragmented your PC’s hard drive for the
first time, prepare to be stunned.

• You cannot defragment a network drive.


• Do not defragment a media card or flash drive. These drives have a limited number of
“writes” available to them. That is, the media can support data being written to it a
finite number of times. This number can be huge, but it’s a real number; after reaching
the number, the media becomes useless. By not defragmenting a media card or flash
drive, you avoid accelerating the deadline. Optical drives cannot be defragmented.
• Even after running the Defragmentation utility, file fragments remain on the hard drive.
That’s just the nature of disk storage. Please don’t obsess and run the defragmentation
utilities over and over, trying to get a perfectly defragmented hard drive.

How to Use Disk Cleanup in Windows 7 and Vista

A handy way to remove lots of files you don’t need on a hard drive is to employ the aptly
named Disk Cleanup tool. What Disk Cleanup does is locate files that can easily be removed to
free up some disk space, especially files that may not be obvious to you, such as temporary
files used by Windows or when browsing the Internet.

To run Disk Cleanup in Windows 7 and Windows Vista, follow these steps:
1. From the Start button menu, choose All Programs→Accessories→System Tools→Disk
Cleanup.
2. In Windows Vista, choose the option My Files Only.
OS Lab manual
Start with your own files first. If that doesn’t remove enough files, repeat these steps
and choose the option Files from All Users on This Computer.

3. If prompted, choose the mass storage device that you want to clean up.

The prompt appears only when you have multiple storage media on your PC. You
probably want to choose drive C, the main storage device.

4. In the Disk Cleanup dialog box, place check marks by all the items you want to
remove.

It’s okay to place check marks by all items. Those things wouldn’t be listed if they
were crucial to the computer’s operation.

There’s one exception to placing check marks by all the items, however: Hibernation
File Cleaner.
Do not remove that item if you use hibernation on your computer.

5. Click OK.

You’re not quite there yet.

6. Click the Delete Files button to begin the cleanup process.

Wait while the disk is being cleaned. When the process is complete, the window goes
away.
In Windows 7, you can click the Clean Up System Files button to remove unneeded bits and
pieces of various Windows updates that may be littering the hard drive. Click the button before
Step 4, and then after the system files are cleaned up, you can proceed with removing other
disk detritus.

You can also access the Disk Cleanup utility from a disk drive’s Properties dialog box by
clicking the Disk Cleanup button on the General tab.

11. What is bitlocker and TPM. How a bitlocker encrypt a file.

What is BitLocker? What does it do? What does it not do?

BitLocker lets you encrypt the hard drive(s) on your Windows 7 and Vista Enterprise,
Windows 7 and Vista Ultimate or Windows Server 2008 and R2. BitLocker will not encrypt
hard drives for Windows XP, Windows 2000 or Windows 2003. Only Windows 7, Vista and
Server 2008 include BitLocker. BitLocker drives can be encrypted with 128 bit or 256 bit
encryption, this is plenty strong to protect your data in the event the computer is lost or stolen.
BitLocker protects your hard drive from offline attack. This is the type of attack where a
malicious user will take the hard drive from your mobile machine and connect it to another
OS Lab manual
machine so they can harvest your data. BitLocker also protects your data if a malicious user
boots from an alternate Operating System. With either attack method, BitLocker encrypts the
hard drive so that when someone has physical access to the drive, the drive is unreadable.
Now if you are a network admin and you need to harvest data from a hard drive when a
machine fails, our tools include the functionality to prompt the admin for the recovery key so
the hard drive can be accessed. We've done a good job at ensuring the data does not end up in
the wrong hands, while making it easy for authorized users to access the data in the event of a
failure.

What does BitLocker do?

Again, BitLocker encrypts the hard drive(s) to protect the Operating System from offline
attacks. Server
2008, 2008 R2, Windows 7 Enterprise, Windows 7 Ultimate, Windows Vista Enterprise, and
Windows Vista Ultimate all include BitLocker functionality. Windows 7 Professional and
Windows Vista Business Edition and the Home Editions do not include BitLocker. The RTM
versions of Vista only allow BitLocker encryption of the C: drive. SP1 for Vista, and
Windows 7 include the ability to encrypt all of the hard drives belonging to the Vista and
Windows 7 machine. Server 2008 (and R2) include the ability to encrypt all of its attached
hard drives as well. BitLocker on a Server 2008 (and R2) server might not make sense for
your servers in the Data Center, but using BitLocker on servers in remote offices makes a lot
of sense. How many remote offices have their servers in secure Data Centers? They don't! If
you're lucky, your server sits in a locked closet. If you're unlucky, it sits under someone's
desk. Deploying BitLocker to these machines makes perfect sense because if those machines
are stolen, their data is encrypted and protected from the types of attacks that they would be
exposed to. Another piece to protect these remote servers is the Read Only Domain Controller
functionality. I won't go into it here, but it gives you the ability to provide fast logon
experiences for your remote users while ensuring that all of the domain credentials are not
stored on these remote office servers.

Windows 7 extends BitLocker functionality to removable drives, we call that functionality


BitLocker to Go. BitLocker to Go gives you the ability to encrypt your thumb drives and
even USB hard drives. You even have the ability to enforce BitLocker to Go via Group
Policy, this Group Policy can ensure that users can only store corporate data on encrypted
drives.

What does BitLocker not do?

BitLocker does not protect the computers contents while Windows is running. Again,
BitLocker is built foroffline attacks, once the operating system is up and running. Windows 7
and Vista will protect your data from unauthorized access. When 7 (and Vista) is up and
running, unauthorized access can come in the form of:

1. A malicious user trying to log onto the local computer. Windows 7 (and Vista) can
protect itself by enforcing strict password policy and complexity. Please ensure that if
your data is important enough to encrypt, that you also require complex passwords
OS Lab manual
and/or two factor authentication. Two factor authentication takes the simple passwords
or easy to guess passwords out of the equation so that they are no longer a risk.
2. A malicious user connecting to the computer over the network to harvest data from the
local computer. If the user has access to your physical network, the malicious user can
try to connect to your machine over the network. Again, strict user permissions on the
local machine and on your network as a whole, will prevent malicious users from
accessing your network.

How To Use BitLocker on Drives without TPM


BitLocker is an encryption feature available in Ultimate and Enterprise versions of Windows 7
and Vista, but requires a Trusted Platform Module (TPM) on the system. Not all systems
include TPM and today we take a look at how to bypass it so you can use BitLocker.

Enable BitLocker

You can use BitLocker to encrypt an entire fixed drive, such as the local drive Windows is
installed on or an internal data drive. For removable flash or external USB drives you can use
its younger brother, BitLocker To Go. First let’s take a look at how to enable BitLocker on a
local hard drive.

To encrypt an entire drive, simply right-click on the drive and select Turn on BitLocker from
the context menu.

Next you’ll need to choose a secure password that will be used to access the drive.
OS Lab manual

You’re prompted to store the recovery key which is used in the event you lose your password
or smartcard.
If you store it as a file make sure that it’s not on the same drive that you’re encrypting.
OS Lab manual

Confirm you want the drive to be encrypted then wait until the process is complete. The
amount of time it takes will vary based on the size and amount of data on the drive.

To access the encrypted drive you’ll need to enter in the password to unlock it.
OS Lab manual

The drive icon will change to show it’s encrypted with BitLocker, where the gold lock
indicates it’s locked up and the gray lock is displayed after you have unlocked it.

Use BitLocker on a Drive Without TPM

What happens if you get this goofy error…and what is a TPM anyway? TPM stands for
Trusted Platform Module which is a microchip in a computer that supports advanced security
features. It’s where BitLocker stores the encryption key. If you have a drive that doesn’t have a
compatible TMP then you’ll need to use the following steps and have a flash drive.
OS Lab manual

Enter in gpedit.msc in the search box of the Start menu and hit Enter.

Under Local Computer Policy navigate to Computer Configuration \ Administrative Templates


\ Windows Components \ Bit Locker Drive Encryption \ Operating System Drives and double
click on Require additional authentication at startup.

Enable the feature and check the box next to Allow BitLocker without a compatible TPM,click
Apply and Ok, and close out of Local Group Policy Editor.
OS Lab manual

Go back to the hard drive you want to encrypt and turn on BitLocker. A restart will be required
to prepare the disk, and at this point make sure the flash drive is plugged in.

After the restart you’re prompted to use the startup key on the flash drive every time you start
the computer.
OS Lab manual

Select the drive you want to use to store the key.

After that the process is as we showed above. This method may not be as convenient but at least
you don’t have to go out and buy a new system that includes a TPM. If you don’t want to deal with
this process, read about how to encrypt your driving using TrueCrypt.
Also, you might want to check out our article on using BitLocker To Go for encrypting flash
drives.
OS Lab manual

Microsoft Enterprise Desktop Virtualization (MED-V)

Microsoft Enterprise Desktop Virtualization (MED-V) removes the barriers to Windows 7


upgrades by resolving application incompatibility. MED-V delivers applications in a Virtual
PC workspace running Windows XP. It does this in a way that is completely seamless for the
user; applications appear and function as though they were installed locally. MED-V enables
IT teams to simplify management and delivery by accelerating deployment of critical operating
system upgrades.
Benefits of Using MED-V
As previously stated, you can use MED-V to run Internet Explorer 7 or Internet Explorer 6 in a
virtual environment with a previous operating system version, seamlessly integrated into the
Windows 7 desktop. The following list addresses some of the benefits of using MED-V:

• MED-V is easy to provision and deploy. MED-V provides a way to automate the
first-time setup of virtual machines at the endpoint, including assignment of a unique
computer name, performing initial network setup, and joining the virtual machine to a
corporate domain.

With MED-V, you can customize images in heterogeneous desktop environments, and
you can adjust the Virtual PC memory allocation based on available RAM on the host
computer.

Application and website provisioning is based on Active Directory users/groups. You


can assign a virtual image and define which applications are available to the user and
which web sites should be redirected to Internet Explorer 6 or Internet Explorer 7.

• MED-V is centrally managed. You can centrally define usage permissions and virtual
machine settings and centrally monitor endpoint clients. There are also helpdesk tools
to diagnose and troubleshoot virtual machines.

• With MED-V, you can maintain a minimal inventory. While you do have additional
operating systems, you are generally not burdened with many extra images to manage.
While language packs or Internet Explorer 7 may require more images, many customers
find that they need only a single additional image.

MED-V provides an administrator console for virtual image management and a central
image repository for image storage, versioning, and delivery (which can be based on
Internet Information Services [IIS] web servers, System Center Configuration Manager,
or alternative deployment technologies). Integration with makes it possible to provision
virtual images based on group membership or user identity.

• You can use standard image maintenance. With MED-V, you can continue using
Windows Server® Update Services (WSUS) to deploy the latest Microsoft product
updates or System Center
OS Lab manual
Configuration Manager. The MED-V workspace is managed as any other desktop in the
enterprise.
For more information, see the Microsoft Enterprise Desktop Virtualization Evaluation Guide.
Also, see the Links for Further Information later in this document.
Limitations of MED-V
MED-V utilizes client machine resources, and this may be an issue for under-powered
hardware. Starting the virtual machine on the client side can take a few minutes; it therefore
might be beneficial to set the MED-V preference to leave the virtual machine running for the
best user experience.
MED-V requires that you manage an extra operating system, which means extra inventory,
patching, antivirus software, and so on. However, MED-V can be managed with the same tools
that you are managing the MED-V host with, as an example you can patch the MED-V
workspace with Windows Server Update Services (WSUS), as described in Appendix 5:
Updating Using Windows Server Update Services.
MED-V does not work on a virtualized operating system through virtualized desktop
infrastructure (VDI). VDI clients are already virtual, so they cannot host a virtual instance.
This means that if you are using VDI for user desktops, you cannot host MED-V.
How to Deploy and Configure MED-V
Instructions for deploying and configuring MED-V can be found at MED-V Deployment and
Configuration on TechNet. Following is a summary of the high-level steps:

1. Install and configure the MED-V Server component.

2. Configure the Image Web Distribution Server.

3. Install MED-V Client and MED-V Management Console.

4. Create Virtual PC Image for MED-V.

5. Create MED-V Workspace.

6. Test, pack, and upload Virtual PC Image.

7. Create and configure MED-V policy.

8. Test Internet Explorer access from client workstation.

Also see the MED-V Quick Start Guide and the Microsoft Enterprise Desktop Virtualization
(MED-V) Administration Video Series.
How to Define Internet Explorer 6 or Internet Explorer 7 URL Redirection with MED-V
A core function of MED-V is to redirect a URL from Internet Explorer 8 on a MED-V host to
Internet Explorer 6 or Internet Explorer 7 on the guest, allowing companies to move to
Windows® 7. This is done by configuring a policy in the MED-V Management Console where
it is then applied to MED-V users throughout the company. MED-V policy dictates the who,
what, and how of applications – who will receive the policy, what applications or websites they
will see or be redirected to, and how those will be seen by the user. In the case of redirecting
websites, an administrator defines which sites should be redirected to the guest and what
happens when the user types or selects a different site in the guest. The user simply interacts
OS Lab manual
with the browser they are presented with, and the MED-V policy defined by the administrator
manages the users’ experience.
The following screen shot shows a sample MED-V policy configuration in the MED-V
Management Console, which can be used to publish Internet Explorer 6 to the host operating
system. A workspace is defined and assigned to users (see the left pane for Workspaces in the
following screenshot), and then the administrator can define what applications can be seen on
the MED-V host from the MED-V workspace.
This is done by selecting the applications tab and identifying the shortcuts that will be created
on the MEDV host. In the published applications section, a shortcut to Internet Explorer 6 has
been created, which allows the user to seamlessly launch Internet Explorer6 from the MED-V
host. Publishing this shortcut is optional for automatic redirection but it demonstrates how any
applications from the guest can be published to the host.

Figure 2. Applications tab.


The following screen shot shows a sample MED-V policy configuration, which redirects all
guest browser requests for http://site1 to the MED-V Internet Explorer instance. An
administrator can define a domain name or an IP address that will be redirected automatically
from the MED-V host to the guest. Other features include the ability to force all other URLs
browsed in the guest to be automatically redirected to the MED-V host as well as any “mailto”
links. MED-V identifies the correct browser to deliver the content based on the MED-V policy.
OS Lab manual

Web tab.

12. Introduction to sky drive and windows live mesh.

Windows Live Mesh

Windows Live Mesh


OS Lab manual

Windows Live Mesh

Developer(s) Microsoft

Stable 2011 (15.4.3555.0308 Win,


release
15.4.5726.23 Mac) / March 22, 2012;
16 months ago

Operating system Windows (XP and later) andMac OS


X (Intel Only)

Type File sharing

Website
explore.live.com/windowmesh
s-live-

Windows Live Mesh


Windows Live Mesh (formerly known as Live Mesh, Windows Live Sync, and Windows Live
FolderShare) was a free-to-use Internet-based file synchronization application byMicrosoft
designed to allow files and folders between two or more computers be in sync with each other
on Windows (Vista and later) and Mac OS X (v. 10.5 Leopard and later, Intel processors only)
computers or the Web via SkyDrive.[1] Windows Live Mesh also enabled remote desktop
access via the Internet.
Access files in your Mesh online storage
OS Lab manual
Windows Live Mesh was retired on February 13, 2013, and remote desktop and peer-to-peer
syncing have stopped working. If you still have Mesh installed on a computer, you might see the
message, "Sorry, there is a problem with the Windows Live Mesh servers."

If you still have files in your Mesh online storage (called “Mesh synced storage” or “SkyDrive
synced storage”) make sure you have copies of them on your computer. On August 13, 2013,
all files in Mesh online storage will be permanently deleted.

Save copies of the files in your Mesh online storage

The latest versions of your files should already be on your computer. But if you stopped
syncing them on your computer before Mesh was retired, or if you uninstalledMesh, follow
these steps to access your files:

1. Go to the temporary Synced folders page. (You need to use this special link because the
address has changed and other links won’t work.)

2. Click View all synced folders.

3. Click a folder to view its contents.

4. Click each file to download it.

Skydrive
SkyDrive (officially Microsoft SkyDrive, previously Windows Live SkyDriveand Windows
Live
Folders) is a file hosting service that allows users to upload and sync files to a cloud storage
and then access them from a Web browser or their local device. It is part of the Windows Live
range of online services and allows users to keep the files private, share them with contacts, or
make the files public. Publicly shared files do not require a Microsoft account to access
How to Use SkyDrive
Edited by Codes for us, Aramanda, Kanhu, HaldirofLorien and 4 others

Article

EditDiscuss
Cloud computing means using off-site computer infrastructures that can be leased or freely
used to provide for computer requirements of individuals and organisation. That infrastructure
includes all resources of an in-site computer facility; that is, processors, physical memories
(RAMs) and storages known as drives.
OS Lab manual
It helps, as is believed, to reduce costs of maintenance and upgrading of in-site facility lower
on the idea of use it when you need and use it more when you need more.

Moreover, you are not attached to your fixed IT fascilities and can have access to required
resources on the go: on a variety mobile devices operating systems, and smartphones. One part
of those resources, drives, comes to be more handy for individual users. Microsoft SkyDrive is
among the most important ones.

Steps

1. 1

Sign using your Microsoft account.

o If you do not have an ID, one free will be offered to you to sign up and join. Just go to
windows.live.com Windows Live

2. 2

Select your desired ID. In the next stage you have the option to choose your ID.

o That could be at the "live dot", "outlook dot" or "hotmail dot" followed by your country URL
extension. In the US it follows by "com" only.
OS Lab manual

3. 3

Follow simple procedure to finish getting your ID.

o Now you are in your personal "outlook" page.

o Small
dialogue shows finishing update. At any time you can launch SkyDrive by Clicking on "Open your
SkyDrive folder."

4. 4
OS Lab manual

Look at the range of services available.

Go to top left corner "Outlook"

From the drop down menu select "Skydrive"

6.

Observe that it immediately creates your sky drive on the cloud.

You have place holder for your personal documents, pictures and public items. At the top there
are options for creating on-line (that is, on-cloud) Office documents for productivity. Please
also refer to Backup Your Important Files Using Hotmail SkyDrive.
Click on the "Get SkyDrive apps"
OS Lab manual

7.

Look at the different flavours of SkyDrive available for different devices.

That helps you to have access to your cloud storage on the SkyDrive from different pieces of
device you might use at any place.
In the next stage click on "Download the desktop app."

8.
OS Lab manual
Look at the bottom of your Browser.

Allow the install to "Run."

Installation proceeds.

9.

Click on "Get Started" button.

Fill the form according to your acquired Microsoft Account.


OS Lab manual

10.

Note that the "cloud hard disk" has been installed on your computer.

There is no need to change its location on a safer place in your computer. No failure on your
computer will touch that drive; except that you delete its content.
OS Lab manual

11.

Click on "Next" button

Update your other device pieces in sharing SkyDrive.

12.

Click on "Done" button.


OS Lab manual

Your SkyDrive is on your device.

13.

Click on the small caret on the quick launch.

It shows the hidden icons; among them SkyDrive icon. Moving green line means SkyDrive being
updated.

14.

Utilize your SkyDrive for share and team work.

Among your documents you have a place for "Public" files. Put some files there. Open the
"Public" to see them. In the Demo picture, there are two files.
OS Lab manual
One is actually SkyDive executable file that you can download and run to install SkyDrive. In the
demo it is shown to the reader that it is even possible to upload exe files in the SkyDrive. It is
important for the team works to have such a capacity for beta testing and other purposes.
Other file is just a notepad. It is a draft of this article to back it up.
Select this one by ticking the box in front of its name. If you like to embed it in your Blog or other
Internet pages click on "Embed" on the right side pane to get the embedding HTML code.
If you like to share it, then click on "Share" in the right side panel.

15.
Look at the widget that opens. It has different options.
You can send an email as a link to this file. o You can post it to Facebook
or Tweeter or LinkedIn. o Sharing link could allow people only "View" your
file without being able to modify it. o Sharing link could allow both
"View" and "Edit" of the file.
Besides, being a "Public" file allows people to search it and if found through the
Internet search engines to be viewed by the public. You can put your file in non-
public folders if you want it to be of access of you-only or you and your team-
only.
OS Lab manual

o For
any reason, you can shorten the link address to be more digestable, by clicking on the "Shorten"
button. You can put that address in your browser right now and find out a draft of this article.

Hotfix
A hotfix or Quick Fix Engineering update (QFE update) is a single, cumulative package that
includes information (often in the form of one or more files) that is used to address a problem in a
software product (i.e. a software bug).[1] Typically, hotfixes are made to address a specific
customer situation and may not be distributed outside the customer organization. The term hotfix
was originally applied to software patches that were applied to live (i.e. still running) systems.
Similar use of the terms can be seen in hot swappabledisk drives. The more recent usage of the
term is likely due to software vendors making a distinction between a hotfix and a patch.

How to Install Microsoft Hotfixes & Updates

Installing Windows updates are an important part of keeping your computer safe. Windows
updates allow you to pick and choose updates you want to install on your computer. These updates
OS Lab manual
can include fixes to software vulnerabilities, new Windows and program features, and hardware
updates. Windows XP uses the Windows Update website, while Windows Vista and Windows 7
utilize a built-in updating feature. Whether you have XP, Vista or Windows 7, you must keep your
system updated using Windows Update if you want to keep your computer safe from malware and
other attacks.

steps:
Windows Vista/Windows 7
Click the “Start” menu button at the bottom of the screen.
Click “Control Panel.”
Select “Check for updates” under “Security.”
View your high-priority and optional updates.
Click the “View available updates” link to view the high-priority and optional updates available
for download.
Click the boxes next to each update you want to install. This allows Windows to know which ones
you want to proceed with installing.
Click “Install” at the bottom of the window to begin the download and installation process. Follow
any onscreen instructions that may appear.

13. Implementation of FCFS (First Come First Serve) scheduling algorithm

Scheduling Algorithms: -
Scheduling: - CPU scheduling is defined as the process of moving the processes from job pool to the
main memory.
Scheduling Criteria: -

1. CPU-utilization: - Keep the CPU and other resources as busy as possible.


2. Throughput: - No. of processes that complete their execution per unit time.
3. Turnaround time: - It is defined as the amount of time to execute a particular process from
its entry time.

4. Waiting time: - It is defined as the amount of time a process has been waiting in the ready
queue.

5. Response time: - It is defined as the amount of time it takes from when a request was
submitted until the first response is produced but not output is known as the ‘response time’.

Different scheduling algorithms: -


OS Lab manual
Scheduling algorithms are mainly divided into two main types: -

1. Non-preemptive scheduling algorithms: - Once the CPU is given to a process it cannot be


preempted until it completes its CPU-burst.

2. Preemptive scheduling algorithms: - If a new CPU process arrives with CPU burst length
less than the remaining time of current executing processes preempt.

First come first serve (FCFS) scheduling algorithm: - With this scheme the process that
requests the CPU first is allocated the CPU first. The implementation of the FCFS policy is
easily managed with the FIFO queue. When a process enters the ready queue, its PCB is linked
onto the tail of the queue. When the CPU is free, it is allocated to the process at the head of the
queue. The running process is then removed from the queue. The code for FCFS is simple to
write and understand.

Example: -
Process Burst Time

P1 24

P2 3

P3 3

Now ganntt chart for this is as: -


P1 P2 P3

0 24 27 30
Waiting time of process P1 = 0.
Waiting time of process P2 = 24.
Waiting time of process P3 = 27.
OS Lab manual
Now Average Waiting time of all the processes = (0+24+27)/3 = 17 ms.
________________________________________________________________ Write a
program in C++ to implement FCFS scheduling algorithm.
#include<iostream.h>
#include<conio.h> void
main()
{ clrscr(); int bu[20],n,i;
float twt=0.0,awt,wt[10];
cout<<"Enter the number of processes:"<<endl; cin>>n;
cout<<"Enter the burst time of each process:"<<endl; for(i=1;i<=n;i++)
{ cin>>bu[i];
}
for(i=1;i<=n;i++)
{
cout<<"The burst time of process P"<<i<<" ="<<bu[i]<<endl;
} cout<<endl;
wt[1]=0;
cout<<"The waiting time of process P1 ="<<wt[1]<<endl; for(i=2;i<=n;i++)
{
wt[i]=bu[i-1]+wt[i-1];
cout<<"The waiting time of process P"<<i<<" ="<<wt[i]<<endl; twt=twt+wt[i];
} cout<<endl;
cout<<"The total waiting time of the processes is ="<<twt<<endl; awt=twt/n;
cout<<"The average time of process is ="<<awt<<endl;
getch(); }
_________________________________________________________________ Output of the
above program: -
OS Lab manual

________________________________________________________________

14. Implementation of SJF (Shortest Job First) scheduling algorithm.

Shortest Job first (SJF) scheduling: - It associates with each process the length of the process’s
next CPU burst. When CPU is available, it is assigned to the process that has the smallest next
CPU burst. If the next CPU burst of the two processes are the same, FCFS scheduling is used to
break the tie. A more appropriate term for this scheduling method would be the shortest-next-
CPU-burst algorithm, because scheduling depends on the length of the next CPU burst of a
process rather than its total length.
Example: -
Process Burst time
OS Lab manual
P1 6

P2 8

P3 7

P4 3

Now gantt chart is as: -


P4 P1 P3 P2

0 3 9 16 24
Waiting time of process P1 = 3
Waiting time of process P2 = 16
Waiting time of process P3 = 9
Waiting time of process P4 = 0

Now average waiting time = (3+16+9+0)/4 = 10.25 ms.


__________________________________________________________________ Write a
program in C++ to implement shortest-job-first scheduling.
#include<iostream.h>
#include<conio.h> void
main()
{ clrscr(); int bu[10],n,i,j;
char c[10]; float
twt=0.0,awt,wt[10];
cout<<"\tEnter the number of processes:"<<endl<<"\t";
cin>>n; cout<<endl;
cout<<"\tEnter the name of the processes:"<<endl<<"\t"; for(i=1;i<=n;i++)
{ cin>>c[i];
cout<<"\t";
}
for(i=1;i<=n;i++)
{
cout<<"Enter the burst time for process "<<c[i]<<" =\t";
cin>>bu[i]; cout<<endl; cout<<"\t"; }
int temp,b[10],temp1;
cout<<endl; for(i=1;i<=n;i++)
{ b[i]=bu[i];
OS Lab manual
cout<<"\tThe burst time for process "<<c[i]<<" =\t"<<b[i]<<endl;
} cout<<endl;
for(i=1;i<=n;i++)
{
j=i;
whi
le(b
[j-
1]>
b[j]
&&
j>1)
{ temp=b[j];
b[j]=b[j-1];
b[j-1]=temp;
temp1=c[j];
c[j]=c[j-1];
c[j-1]=temp1;
j--;
}
}
cout<<"\tNow the processes in the sotred order is as:"<<endl; for(i=1;i<=n;i++)
{
cout<<"\t"<<c[i]<<" =\t"<<b[i]; cout<<endl;
} wt[1]=0;
for(i=2;i<=n;i++)
{ wt[i]=wt[i-1]+b[i-1];
twt=twt+wt[i];
} awt=twt/n;
for(i=1;i<=n;i++)
{
cout<<"\tThe waiting time of process "<<c[i]<<" =\t"<<wt[i]<<endl;
}
cout<<"\tThe average waiting time of all the processes is =\t"<<awt<<endl; getch(); }
__________________________________________________________________ Output of the
above program: -
OS Lab manual

__________________________________________________________________

15. Implementation of priority scheduling algorithm.

Priority Scheduling: - SJF is a special case of the general priority scheduling algorithm. A
priority is associated with each process and the CPU is allocated to the process with the highest
priority. Equal priority processes are scheduled in FCFS order. The larger the CPU burst the
lower the priority and vice versa.
Example: -
Process Burst time Priority

P1 10 3

P2 1 1

P3 2 4
OS Lab manual
P4 1 5

P5 5 2

The ganntt chart is as: -


P2 P5 P1 P3 P4

0 1 6 16 18 19
Waiting time for process P2 = 0.
Waiting time for process P5 = 1.
Waiting time for process P1 = 6.
Waiting time for process P3 = 16.
Waiting time for process P4 = 18.
Now average waiting time (0+1+6+16+18)/5 = 8.2 ms.
__________________________________________________________________ Write a
program in C++ to implement priority scheduling algorithm.
#include<iostream.h>
#include<conio.h> void
main()
{
clrscr();
textmode(C4350);
int bu[10],n,i,j,p[10]; char
c[10];
float wt[10],twt=0.0,awt,temp,temp1,temp2;
textbackground(4); cout<<"\t";
cprintf("\n********** Program for Priority scheduling Algorithm ********** ");
textbackground(4); cout<<endl;
cout<<"\tEnter the number of processes"<<endl;
cout<<"\tÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍÍ = ";
cin>>n;
cout<<"\tEnter the name of the processes:"<<endl; for(i=1;i<=n;i++)
{
cout<<"\t";
cin>>c[i]; }
for(i=1;i<=n;i++)
{
cout<<"\tEnter the burst time of "<<c[i]<<" = "; cin>>bu[i];
} cout<<endl;
for(i=1;i<=n;i++)
OS Lab manual
{ cout<<"\t";
cout<<"Enter the priority of "<<c[i]<<" = "; cin>>p[i];
}
cout<<endl;
cout<<"\tProcess Data is as:"<<endl; cout<<endl;
cout<<"\t"<<"Name"<<"\t"<<"Burst Time"<<"\t"<<"Priority"<<endl; for(i=1;i<=n;i++)
{
cout<<"\t"<<c[i]<<"\t"<<bu[i]<<" \t"<<p[i]; cout<<endl;
}
for(i=1;i<=n;i++)
{
j=i;
while(p[j-1]>p[j] && j>1)
{ temp=p[j];
p[j]=p[j-1];
p[j-1]=temp;
temp1=c[j];
c[j]=c[j-1];
c[j-1]=temp1;
temp2=bu[j];
bu[j]=bu[j-1];
bu[j-1]=temp2;
j--;
}}
cout<<endl;
cout<<"\tNow the processes in the sotred order of their priorities is as:"<<endl; cout<<endl;
cout<<"\t"<<"Name"<<"\t"<<"Burst Time"<<"\t"<<"Priority"<<endl; for(i=1;i<=n;i++)
{
cout<<" \t"<<c[i]<<" \t"<<bu[i]<<" \t"<<p[i]; cout<<endl;
} cout<<endl;
wt[1]=0;
for(i=2;i<=n;i
++)
{ wt[i]=wt[i-1]+bu[i-1];
twt=twt+wt[i];
} awt=twt/n;
for(i=1;i<=n;i++)
{
cout<<"\tThe waiting time of process "<<c[i]<<" =\t"<<wt[i]<<endl;
}
cout<<"\tThe average waiting time of all the processes is =\t"<<awt<<endl; getch(); }
________________________________________________________________ Output of the
program is: -
OS Lab manual

__________________________________________________________________ Round
Robin scheduling algorithm: - It is for time sharing systems. It is similar to FCFS but
preemption is added to enable the system to switch between the processes. A small unit of
time, called a time quantum or time slice is defined. The ready queue is treated as a circular
queue. The CPU scheduler goes around the ready queue allocating the CPU to each process for
a time interval of upto 1 time quantum.
Example: - Given time quantum is = 4 ms.
Process Burst Time

P1 24

P2 3

P3 3

Now ganntt chart is as: -


P1 P2 P3 P1 P1 P1 P1 P1

0 4 7 10 14 18 22 26 30
Waiting time of process P1 = (10-4) = 6 ms.
OS Lab manual
Waiting time of process P2 = 4 ms.
Waiting time of process P3 = 7 ms.

Now average waiting time is (6+4+7)/3 = 5.66 ms.

16. Implementation of Round Robin scheduling algorithm.

Write a program in C++ to implement Round Robin scheduling.


#include<iostream.h>
#include<conio.h> void
main()
{
clrscr();
textmode(C4350);
textbackground(4); cout<<"\t";
cprintf("\n***** Program for Round Robin scheduling Algorithm ***** "); textbackground(4);
int i,j,tq,k,B[10],Rrobin[10][10],count[10]; int
n,Bu[20];
float Twt,Awt,A[10],Wt[10],w; int
max=0; int m;
Twt=0.0; cout<<endl;
cout<<endl;
textbackground(4);
cout<<"\t";
cprintf("Enter the no of processes:");
cin>>n; for(i=1;i<=n;i++)
{
cout<<"\tEnter The BurstTime for Process P"<<i<<"= ";
cout<<"\t"; cin>>Bu[i];
}
for(i=1;i<=n;i++)
{ B[i]=Bu[i];
textbackground(4);
cout<<"\tBurst time for process P"<<i<<"= ";
cout<<B[i]; cout<<endl;
if(max<B[i]) max=B[i]; Wt[i]=0; }
cout<<endl; cout<<"\t"; cprintf("Enter
the Time Quantum"); cout<<endl;
cout<<"\t"; cin>>tq; cout<<endl;
m=max/tq+1; cout<<endl;
OS Lab manual
for(i=1;i<=n;i++) { for(j=1;j<=m;j++)
{
Rrobin[i][j]=0;
} } i=1;
while(i<=n) {
j=1;
while(B[i]>0)
{ if(B[i]>=tq)
{
B[i]=B[i]-tq;
Rrobin[i][j]=tq;
j++; } else
{
Rrobin[i][j]=B[i];
B[i]=0; j++;
} } count[i]=j-1;
i++; }
textbackground(4);
cout<<"\t";
cprintf("Display");
cout<<endl;
for(i=1;i<=n;i++)
{ for(j=1;j<=m;j++)
{
cout<<"Rr["<<i<<","<<j<<"]="<<Rrobin[i][j];
cout<<" ";
}
cout<<""
; } int
x=1; i=1;
while(x<=n) {
for(int a=1;a<x;a++)
{
Wt[x]=Wt[x]+Rrobin[a][i];
} i=1; int z=x;
j=count[z];
k=1;
while(k<=j-1)
{ if(i==n+1) {
i=1; k++;
}
else {
if(i!=z
)
OS Lab manual
{
Wt[z]=Wt[z]+Rrobin[i][k];
}
i++;
}
} x++; } cout<<endl; for(i=1;i<=n;i++) {
textbackground(4); cout<<"\t";
cprintf("Weighting Time for process P");
cout<<i<<"="<<Wt[i]<<endl; cout<<endl; }
for(i=1;i<=n;i++) {
Twt=Twt+Wt[i];
}
Awt=Twt/n; textbackground(4);
cout<<"\t"; cprintf("Total Weighting
Time=");
cout<<Twt; cout<<endl; cout<<endl;
cout<<"\t"; cprintf("Average Weighting
Time="); cout<<Awt<<""; cout<<endl;
getch(); }
Output of the above program: -
OS Lab manual

You might also like