M02 Install and Optimise Oper - Syst
M02 Install and Optimise Oper - Syst
M02 Install and Optimise Oper - Syst
Level-II
Based on March 2021, Curriculum Version 1
Ministry of Labor and Skills and Ministry of Health wish to extend thanks and appreciation
to the many representatives of TVET instructors and respective industry experts who donated
their time and expertise to the development of this Teaching, Training and Learning Materials
(TTLM).
OS - Operating System
FAT- File Allocation Table
An operating system (OS) is system software that manages computer hardware, software
resources, and provides common services for computer programs.
Time-sharing operating systems schedule tasks for efficient use of the system and may also
include accounting software for cost allocation of processor time, mass storage, printing, and
other resources.
For hardware functions such as input and output and memory allocation, the operating system
acts as an intermediary between programs and the computer hardware, although the application
code is usually executed directly by the hardware and frequently makes system calls to an OS
function or is interrupted by it. Operating systems are found on many devices that contain a
computer – from cellular phones and video game consoles to web servers and supercomputers.
This module is designed to meet the industry requirement under the hardware and Networking
service occupational standard, particularly for the unit of competency: Install and optimize
operating system software.
This module covers the units:
Function of operating system
Operating system
Installation, configuration and optimization of operating system
new software requirements
Learning Objective of the Module
Determine function of operating system
Obtain operating system
Install, configure and optimize operating system
Provide instruction to meet new software requirements
An operating system is the most important software that runs on a computer. It manages the
computer's memory and processes, as well as all of its software and hardware. It also allows you
to communicate with the computer without knowing how to speak the computer's language.
Without an operating system, a computer is useless.
Your computer's operating system (OS) manages all of the software and hardware on the
computer. Most of the time, there are several different computer programs running at the same
time, and they all need to access your computer's central processing unit (CPU), memory,
and storage. The operating system coordinates all of this to make sure each program gets what it
needs. To explain this in more specific way an operating system is a computer program that is
initially loaded into a processor by a boot program. It then manages all the other programs in the
processor. The other programs are called applications or tasks.
Job accounting – Operating system Keeps track of time and resources used by various tasks and
users, this information can be used to track resource usage for a particular user or group of users.
Error detecting aids – The operating system constantly monitors the system to detect errors and
avoid the malfunctioning of a computer system.
Coordination between other software and users – Operating systems also coordinate and
assign interpreters, compilers, assemblers, and other software to the various users of the
computer systems.
Memory Management – The operating system manages the Primary Memory or Main Memory.
Main memory is made up of a large array of bytes or words where each byte or word is assigned
a certain address. Main memory is fast storage and it can be accessed directly by the CPU. For a
program to be executed, it should be first loaded in the main memory. An Operating System
performs the following activities for memory management:
It keeps track of primary memory, i.e., which bytes of memory are used by which user program.
The memory addresses that have already been allocated and the memory addresses of the
memory that has not yet been used. In multiprogramming, the OS decides the order in which
File Management – A file system is organized into directories for efficient or easy navigation
and usage. These directories may contain other directories and other files. An Operating System
carries out the following file management activities. It keeps track of where information is
stored, user access settings and status of every file, and more… These facilities are collectively
known as the file system.
A. Microsoft Windows
Microsoft created the Windows operating system in the mid-1980s. There have been many
different versions of Windows, but the most recent ones are Windows 10 (released in 2015),
Windows 8 (2012), Windows 7 (2009), and Windows Vista (2007). Windows comes pre-loaded
on most new PCs, which helps to make it the most popular operating system in the world.
Operability
MacOS has been more operable than Windows given its proprietary nature. As Apple develops
both the hardware and the OS there are fewer issues facing macOS. Apple has thus been able to
provide consistent performance, security, and support to its home users. Providing quality user
experience has been a top priority for macOS and they have been delivering it consistently.
Features
MacOS uses proprietary hardware. With OS X, you get a completely integrated system in which
hardware and software interact flawlessly to provide you with the finest Mac experience
possible. The fact that your Mac's apps can communicate with those on your iOS devices is due
to the practical iCloud. To give you an example, anything you do in apps on your Mac will also
be reflected on your other iOS devices. (Poole, 2021)
Competitive Edge
Linux’s competitive edge comes from its’ appeal to a specific category of customers and users.
These are people who would prioritize security, speed, cost, and ease of maintenance. For
example, speaking to LinuxLine about the benefits of switching to Linux on IBM, Kuznetsova
points out that clients can benefit from both the inherent attributes of Linux and the underlying
Capabilities of IBM servers by switching to Linux on IBM. "Due to its improved flexibility with
subscription-based pricing, lack of fees for version upgrades, and compact footprint, Linux
generally presents exceptional cost reduction opportunities. Additionally, Linux operating on all
IBM servers fully utilizes the features of the underlying platforms, such as dynamic memory
upgrade on mainframes and live partition mobility on Power Systems, to offer clients exceptional
performance, virtualization, and system management capabilities." (Linux and IBM Provide
Competitive Edge, 2009)
Virtual memory is a technique that allows the execution of processes which are not completely
available in memory. The main visible advantage of this scheme is that programs can be larger
than physical memory. Virtual memory is the separation of user logical memory from physical
memory. This separation allows an extremely large virtual memory to be provided for
programmers when only a smaller physical memory is available. Following are the situations,
when entire program is not required to be loaded fully in main memory.
User written error handling routines are used only when an error occurred in the data or
computation.
Certain options and features of a program may be used rarely.
Many tables are assigned a fixed amount of address space even though only a small amount of
the table is actually used.
The ability to execute a program that is only partially in memory would counter many benefits.
Less number of I/O would be needed to load or swap each user program into memory.
A program would no longer be constrained by the amount of physical memory that is available.
Each user program could take less physical memory, more programs could be run the same
time, with a corresponding increase in CPU utilization and throughput.
Name:- Date: -
Instruction: Answer all the questions listed below, if you have some clarifications-
feel free to ask your teacher.
I. Say TRUE or FALSE
1. Linux is an OS where you would battle less with obstacles like viruses and malware.T
2. Modern operating systems use a CLI.F
3. The users of a batch operating system do not interact with the computer directly. T
4. Security is one the operating system functionality. T
5. Compared to Linux and macOS windows operability is poor yet still, it is the most
popular OS.T
1. ___________is a technique that allows the execution of processes which are not
completely available in memory.
2. One of the following is the need to time-share the CPU to ensure that things are
happening in time.
A B
1. Program Execution B A. uses password protection to protect user data
2. Security A B. execute of all types of programs
3. Job accounting F C. organized into directories
4. Device Management D D. communication via their respective drivers.
5. File Management C E. decides the order in which processes have access to the processor
F. Keeps track of time and resources used by various tasks and users
G. OS decides the order in which processes have access to the
processor
For example, you created an online word processing software and developed it so it only works
for a specific web browser because of an important integration system that allows your software
to function properly on that web browser. In this scenario, having to use the software in a
specific browser is the technical requirement.
Technical requirements are important because they describe how software should function and
what its behavior should be. This helps developers and users to understand the best way to use
the software. A document of clearly defined specifications helps to create a project or software
that has a proper process for implementation. Developers and other technicians refer to this as
technical requirement documentation.
The purpose or look of a technical requirement document may vary depending on the specific
project, but they need to all perform for the same universal goal. That is, to ensure that the
owners of the software and its developers have an established understanding of its future details
and project estimations. Project estimations refer to an important part of project planning that
involves cost estimates, resource allocating and the duration of development. Knowing what
technical requirements you need for your software can help you determine these factors more
precisely.
Technical requirements vary depending on the product or industry. Though there is no all-
encompassing list of technical requirements that apply to every project or development, here is a
sample list of 17 technical requirement examples:
Accessibility
Availability
Availability is a technical requirement that functions more like a metric. This metric tracks time
as a percentage and verifies how long a software or resource is available for users to operate.
Data quality
Data quality is a technical requirement that refers to data and information that is of a certain
quality. Ideally, you want high-quality data that you can use for operational and decision-making
processes.
Human error
This is a technical requirement where software can detect when people have inputted inaccurate
information. If the software detects this error, it notifies the user and advises them to fix the
discrepancy.
Information security
This technical requirement refers to the encryption and security of user credentials and personal
private information within an online storage base or transit system. This level of security would
also involve a requirement for encrypting highly classified information as well.
Internal controls
The internal controls technical requirement means that only certain users can access the
decryption keys for encrypted user and highly classified data. These individuals, called data
stewards, can only access the data when a higher official allows it.
Interoperability
The interoperability technical requirement states that software must offer comprehensive
compatibility. This means that it needs to work on all the major operating systems, web browsers
and technical devices. These requirements may function based on the technology needs of
customers.
Maintainability
Performance
The performance technical requirement determines average wait times and how long it takes for
software or a page to load. For example, it is best practice to set a technical requirement for loads
times to exceed only two seconds.
Privacy
Privacy refers to protecting a customer's sensitive data from internal data professionals and
employees. For example, a privacy technical requirement may not allow employees to view a
customer's social security number stored within a customer database.
Productivity
The productivity technical requirement refers to processes that allow users to be more
productive. For example, creating a system that auto generates data so users can skip inputting
data multiple times.
Reliability
Reliability refers to the average time that a system or software operates between downtimes or
failures. This a metric that averages the time for applications and services that are critical to
operations.
Serviceability
Serviceability is an important technical requirement because most software and systems undergo
regular updates or some kind of modification. This technical requirement states systems must not
completely shut down when software upgrades or changes.
Standards
The standards technical requirement states that a system or software must follow and comply
with the security and architectural requirements. This refers to how to design and structure a
system for flexibility, reusability and feasibility.
Vendor lock-in
Vendor lock-in is a technical requirement that means software or system is open-sourced. Open-
sourced software means that it is not owned by a proprietary or private company, but is available
to be manipulated with custom code by any user.
USB: One should know that with the absence of a CD or DVD, one might prefer to use a USB
drive as a boot media. However, so as to boot from a USB, one should create a bootable USB
version through the help of some programs. After that, one should now copy the operating
system on the USB flash drive ready to commence installation. This is quite advantageous since
it gives an allowance for updating any information in the flash drive especially if there are many
computers to be installed with the OS where updating them is required.
CD-ROM: One should understand that many at times, the windows installation media is
normally stored in a CD-ROM. In such a scenario, the computer onto which one are installing
the OS must possess an in-built CD-ROM reader or it can be external in cases where it is not in-
built.
DVD: One might find out that the DVD boot method is quite similar to that of a CD-ROM. This
is due to the fact that the specific computer must have a DVD-ROM reader. If the reader is
absent, then it automatically means one cannot install an OS stored on such media.
PXE: The Pre boot Execution Environment is a capability that is present in most computers
which allows for automatic installation of an operating system whose files are on a network
drive. In this case, physical media is not required.
2.1.5. Partitioning
Hard drive partitioning is a prompt that one should come across when installing any windows
operating system especially if it is a first time installation. Presently, most of the available
computers run a Master Boot Record Partition Table which supports four partitions on one hard
disk. The newer Globally Unique Identifier partition table supports 128 partitions.
Dynamic: A dynamic disk partition is one that has the capability to deny addition of any new
drive in addition to spanning of data from the basic partition into the newly installed drive.
This dynamic disk partition can be supported by several Windows operating systems.
An Operating System license is almost like a proof of purchase. Operating System licenses are
sometimes called an “OS License Key”. After entering a valid OS license that you purchased,
you will be able to use the OS without any limitations thereafter.
Majority of Operating System licenses are long not just because there are many people who use
the OS, but there are also some values that are invalid. Sometimes OS license values are recycled
(reused) after all the valid values are used up, however this happens after a very long period of
time (usually a lot more than just a couple of years).The reason why OS license keys are sold, is
to prevent the sale of pirated OS copies from being sold. Pirated OS copies are copies of OS, but
the when sold none of the commissions go to the developers of the OS.
There always needs to be a balance on the number of licenses to get. Having a low amount could
result in last minute purchasing or possibly halting hiring process. Having an overabundance
would be wasted money that can be used for something else. It would be helpful to work with
your colleagues on seeing the growth of the company and getting an appropriate amount of OS
licensing based off of that.
This is arguably one of the most important steps depending on how big your infrastructure is. For
example Microsoft declares that a license for Windows Server is per core versus per processor.
This can dramatically change the price of licensing given you have beefy servers with many
multi-core processors (common with today’s standards). That’s why it is imperative to plan out
your setup on a few factors. Things to consider such as
Is it able to run on older Server OS (Windows Server 2012 or 2016 versus 2019)?
Are there other ways to improve performance of the server (RAM, SSD, GPU, etc.)?
What it truly boils down to is making the decision to invest in the hardware upgrades or software
upgrades. That is when proper planning comes into play and comparing the costs.
It’s important to consider what version of Windows your company is going to use. With the
announcement of Windows 7 reaching end of support this year, your options are down to
Windows 8,8.1, or 10. Windows 10 is the recommended option being its Microsoft’s project they
constantly improve for the world. However, there’s the decision of which type of Windows 10
operating system to buy. For Enterprise level, it usually comes down to Pro or Enterprise.
Comparing the two, Enterprise includes a few more features for security, but costs more money.
The decision will need to be made of what the company wants their OS to come with natively.
Microsoft offers many options for regulating the license count you purchased for your
organization. It’s very important to make sure you utilize the licenses in an appropriate manner.
Otherwise, you may reach the limit quicker than expected forcing deactivation or fork over more
money for additional licensing. Controlling activation with Volume Activation Management
Tools, can help monitor your inventory.
Name:- Date: -
Instruction: Answer all the questions listed below, if you have some clarifications-
feel free to ask your teacher.
I. Say TRUE or FALSE
1. Operating System licenses are sometimes called an “OS License Key”. T
2. During Windows installation, there is a prompt to ensure that one's date, time and region
are set. F
3. The newer Globally Unique Identifier partition table supports 100 partitions. F
5. A primary partition is basically a partition that one's operating system can boot from.T
1. From type of OS installation one is begins with the presence of the previous OS
A. Clean Installation C. Upgrade
B. Unattended installation D. Creating image
2. One of the following boot method is suitable for operating system whose files are on a
network drive.
A. PXE C. DVD
B. CD-ROM D. USB
3. _________ technical requirement states that a system or software must follow and comply
with the security and architectural requirements.
A. Serviceability C. Reliability
B. Standards D. Productivity
4. _________ technical requirement protecting a customer's sensitive data from internal data
professionals and employees
A. Serviceability C. Reliability
B. Privacy D. Productivity
A B
1. Accessibility E A. system must abide by certain authentication and authorization policies
2. Availability C B. data and information that is of a certain quality
3. Human error D C. functions more like a metric
4. Information security G D. software can detect when people have inputted inaccurate
5. Internal controls F E. seeks to make a service, software or technology accessible to all users
and parties
F. only certain users can access the decryption keys for encrypted user
and highly classified data
G. encryption and security of user credentials and personal private
information
Instruction: Ask for software and necessary materials from your instructor and implement the
following steps
Precautions: insert the disk in appropriate manner and follow safety rules.
Steps:
1. First input the windows 10 installer media you are using (flash or DVD).
Then turn on the computer, then go first to the BIOS to set up First Boot. The way when the new
computer is on, press the F2 key, or some existing computer uses the DEL key to enter the BIOS.
Just adjust it. After setting the first boot, press F10, save and restart. The computer will boot
through the Windows 10 installer media, and if the prompt Type any key to boot from CD or
DVD appears, press any key directly, don’t be late! Then the process will be continued soon.
4. Setup is starting, wait for the process to continue at the next stage.
6. In this section, you can customize the Windows 10 that you will install. Adjust it to
each of your choices or needs! If it is selected, click next.
9. Then we will continue with a split of partitions. Urgent! Here I hope you are very
careful, especially for the first time. Because if it’s wrong, your data might be lost
(therefore, don’t forget to backup data before reinstalling the computer/laptop).
11. Then the computer will ask to restart itself. Just click Restart now.
14. Create an account for your computer. Enter your username, password, and HINT (for a
reminder if you forget your password), don’t leave it blank because if forget your password
have to format the data. When it is selected, click next.
16. Congratulations you guys have successfully installed windows 10 on your computer or
laptop!
For example, a command to delete a file may cause the command interpreter to jump to a
section of its code that sets up the parameters and makes the appropriate system call. In this case,
the number of commands that can be given determines the size of the command interpreter, since
each command requires its own implementing code. An alternative approach—used by UNIX,
among other operating systems —implements most commands through system programs. In this
case, the command interpreter does not understand the command in any way; it merely uses the
command to identify a file to be loaded into memory and executed. Thus, the UNIX command to
delete a file rm file.txt would search for a file called rm, load the file into memory, and execute it
with the parameter file.txt. The function associated with the rm command would be defined
completely by the code in the file rm. In this way, programmers can add new commands to the
system easily by creating new files with the proper names. The command-interpreter program,
which can be small, does not have to be changed for new commands to be added.
However, graphical interfaces became more widespread with the advent of Apple Macintosh
computers in the 1980s. The user interface to the Macintosh operating system (Mac OS) has
undergone various changes over the years, the most significant being the adoption of the Aqua
interface that appeared with Mac OS X. Microsoft's first version of Windows—version 1.0—was
based upon a GUI interface to the MS-DOS operating system. The various versions of Windows
systems proceeding this initial version have made cosmetic changes to the appearance of the GUI
and several enhancements to its functionality, including the Windows Explorer. Traditionally,
UNIX systems have been dominated by command-line interfaces, although there are various
GUI interfaces available, including the Common Desktop Environment (CDE) and X-Windows
systems that are common on commercial versions of UNIX such as Solaris and IBM's AIX
system.
However, there has been significant development in GUI designs from various open source
projects such as K Desktop Environment (or KDE) and the GNOME desktop by the GNU
project. Both the KDE and GNOME desktops rim on Linux and various UNIX systems and are
available under open-source licenses, which means their source code is in the public domain. The
choice of whether to use a command-line or GUI interface is mostly one of personal preference.
As a very general rule, many UNIX users prefer a command-line interface as they often provide
powerful shell interfaces. Alternatively, most Windows users are pleased to use the Windows
GUI environment and almost never use the MS-DOS shell interface. The various changes
undergone by the Macintosh operating systems provides a nice study in contrast. Historically,
Mac OS has not provided a command line interface, always requiring its users to interface with
the operating system using its GUI.
Fig
However, with the release of Mac OS X (which is in part implemented using a UNIX kernel), the
operating system now provides both a new Aqua interface and command-line interface as well.
The user interface can vary from system to system and even from user to user within a system. It
typically is substantially removed from the actual system structure. The design of a useful and
friendly user interface is therefore not a direct function of the operating system. In this book, we
concentrate on the fundamental problems of providing adequate service to user programs. From
the point of view of the operating system, we do not distinguish between user programs and
system programs.
Contrary to popular belief, the Windows operating system is not any less in regard to
performance compared to its contemporary like macOS and Linux. In this article, we will look
into various ways you can optimize the performance of your Windows 10 machine. Here are
some ways you can optimize the performance of your Windows 10 computer.
Upgrading Windows
Updating Windows contains new features, better security, eliminate bugs, and also included
performance enhancements.
A device driver is a computer program that operates or works intermediate between the operating
system and particular devices to communicate. So, it is necessary to update device.
Fragmentation occurs when the allotted memory is larger than the memory requested by the
program, then the difference between allotted and requested memory is known as fragmentation.
So, we need to run a disk defragmenter to rearrange fragmentation which makes drives work
more efficiently.
Disk Clean-up
Disk Clean-up is a computer maintenance utility tool used to remove temporary files, files in the
recycle bin, and other items that you no longer need.
Lowering or customizing the settings of Windows visual effects will increase the performance of
your devices.
Transparency effects will make your Windows device slow as it consumes resources. You can
disable transparency to reclaim that resources.
Reclaim the hard disk space by uninstalling the programs which are not in use for a long time.
To reclaim your memory on the hard disk.
There may be some bloatware (pre-installed applications) on your Windows device which runs
in the background even if you are using them. You can even disable the background applications.
Start-up programs are the programs that are configured to start when you log in. In most cases,
apps will start minimized or may only start in background tasks.
Virus and spyware can not only slow down your device but even can corrupt your data and do
identity theft. So, it’s better to scan for viruses and spyware to remove it by using Windows
Defender/Security or other anti-spyware programs.
A paging file is an area on the hard disk that Window uses as if it were RAM. We can adjust this
paging file size to improve window performance.
Every running application consumes resources like CPU and memory. So, it is necessary to close
all the application which is not used to reclaim the allocated resources.
We can also stop some background services that provide tips and suggestions to use Windows.
Improve Hardware
To improve the performance of Windows PC we can also upgrade the hardware. Adding better
technology hardware will definitely improve the read and write speed of your device.
Name:- Date: -
Instruction: Answer all the questions listed below, if you have some clarifications-
feel free to ask your teacher.
I. Say TRUE or FALSE
1. We can adjust paging file size to improve window performance. T
2. You can even disable the background applications boost your computer performance. T
3. Rather than having users directly enter commands via a command-line interface, a GUI
allows provides a mouse-based window-and-menu system as an interface. T
4. All operating systems include the command interpreter in the kernel. F
5. When “I accept the license terms” section appear During OS installation you can click
and proceed “I don’t accept “button. F
II.Enumeration
1. Enumerate ways of Optimization
_________________________________
_________________________________
_________________________________
_________________________________
_________________________________
2. Enumerate the type of operating system interface
_________________________________
_________________________________
III. Explain the following
1. Disk Clean-up
2. Upgrading Windows
Instructions: Ask for all necessary templates, tools and materials you are required to perform the
following tasks within --- hour.
Task 1: Format and create two partition (C drive 70% and D drive 30%) of computer hard
drive
client feedback
This unit will also assist you to attain the learning outcomes stated in the cover page.
Specifically, upon completion of this learning guide, you will be able to:
Standardizing on your tech stack is key to making your practice efficient. To fully standardize,
you need to roll-out software to your entire client base. Migrating clients to new software is the
fifth stage in the workflow adoption curve. Getting this process right makes standardizing
significantly easier.
They don't just define and manage timelines. They are charged with maintaining or improving
client relationships as the tech roll-out happens. They look for efficiencies, make the workflow
cleaner and reduce client frustration.
They are accountable for responding to client issues if something breaks down. All staff should
be primed to over-communicate. They need to raise any issues to the point person right away.
A lot depends on the size and profile of your client base. And also on the size of your firm.
Rolling out to all clients at once can be resource intensive. If you have an onboarding and/or a
tech operations team, this may be a suitable strategy for you. But if you are a smaller firm with
more limited resources you may need to do it in chunks—say 25% of your clients at a time.
If you take the staged approach, you need to segment your clients. Sort them from easiest to
hardest in terms of the potential difficulty of onboarding. Consider their current frustration level
with the existing tech and workflow. Their level of tech competence. Their openness to new
processes and behaviors.
In your plan, identify the different needs of your clients. Consider what each of them will need to
know. Keep in mind people in different roles will have different needs. They will use the
technology for different things.
Customer feedback is information provided by customers about their experience with a product
or service. Collecting customer feedback can help product, customer success, customer support,
and marketing teams understand where there is room for improvement. Feedback can be
collected proactively by polling and surveying customers, interviewing them, asking for reviews,
or implementing the right tools that collect implicit feedback.
How do you know if what you are doing is right or wrong? How do you know the way your
customers are reacting? Customer feedback is the guiding light for your company.
It not just helps improve your product, but impacts every part of your business. Be it marketing,
sales, or customer service, customer feedback helps you understand what your customers truly
like and dislike. Being close to your customers will set you on a growth trajectory that you
haven’t experienced before.
But remember, there is no one-size-fits-all tactic to gain information from your users. Different
situations require different methods of collecting customer feedback. For example, a survey form
sent to an already disgruntled user will only make matters worse; a phone call works better here.
Name: - Date: -
Instruction: Answer all the questions listed below, if you have some clarifications-
feel free to ask your teacher.
I. Say TRUE or FALSE
1. Customer feedback is information provided by customers about their experience with a
product or service. T
2. Migrating clients to new software is the fifth stage in the workflow adoption curve.
Getting this process right makes standardizing significantly easier. T
3. A complex project like client migration needs a team member responsible for managing
it. T
1. Client feedback
2. Client base
III. Enumeration
____________________________________________
____________________________________________
____________________________________________
____________________________________________
____________________________________________