0% found this document useful (0 votes)
13 views18 pages

OSY Microproject Report

operating system project

Uploaded by

Suraj Nalawade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views18 pages

OSY Microproject Report

operating system project

Uploaded by

Suraj Nalawade
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Ajeenkya DY Patil School of Engineering

(Charholi)Via Lohegaon, Pune 412 105

Department of Computer Engineering


2024-25 [5th Sem]

Micro Project Report of


Operating System
On
Different Operating System Tools Used to Perform Various Functions
Submitted by:

Roll No. Name Enrolment No.

61 Suraj Nalawade 2216490234


62 Mukesh Purohit 2216490235
63 Ankesh Purohit 2216490236
64 Abhishek Goyal 2216490240

Under the Guidance of


Mrs. Mayuri Narudkar
Ajeenkya DY Patil School of Engineering (Charholi)

Department of Computer Engineering


2024-25 [5th Sem]

CERTIFICATE
This is to certify that Project report entitled " Different Operating System Tools
Used to Perform Various Functions" is submitted in the partial fulfillment of
requirement for the award of the Diploma in ComputerEngineering by Maharashtra
State Board of Technical Education as record of student’s ownwork carried out by
them under the guidance and supervision at Ajeenkya DY Patil School ofEngineering
(Charholi), during the academic year 2023-24.

Roll No. Name Enrolment No.

61 Suraj Nalawade 2216490234


62 Mukesh Purohit 2216490235
63 Ankesh Purohit 2216490236
64 Abhishek Goyal 2216490240

Place: Charholi(Bk) Date: / / 2024

(Mrs. Mayuri Narudkar) (Mrs. Nita Pawar)


Guide Head of Computer Department
ACKNOWLEDGEMEMT

It is with profoundly sense of gratitude that we acknowledge from our


guide Mrs. Mayuri Narudkar She has been guide in the true sense of word, a
guide who satisfaction from our word & progress.

We are highly obliged to Mrs. Nita Pawar Head of Computer Department


for aberrance & good co-operation given to us for bringing this project to almost
standard.

We are grateful to our principal Dr. Nagesh Shelke for proceeding


acknowledgement to us in the connection of this project concluding. We
appreciate the assistance of all staff that helps us in for their sincere & obliging
help to make our project successfully.
Micro Project Proposal
Part A

1. Brief Introduction

Operating systems (OS) are crucial software that manage computer hardware and software resources,
providing essential services for computer programs. They act as intermediaries between users and the
computer hardware, enabling efficient operation and utilization of resources. Within operating
systems, various tools and utilities are available to perform specific functions that enhance system
management, user interaction, and application support.This report explores key tools found in major
operating systems—Windows, macOS, and Linux—highlighting their functions and how they
contribute to overall system performance and user experience. Understanding these tools is essential
for effective system administration, troubleshooting, and optimizing workflows, whether in personal
computing or enterprise environments.

2. Aim of the Microproject

Aim:-

• Enhance System Performance: Optimize resource allocation and efficiency.


• Facilitate User Interaction: Provide intuitive access to system features.
• Support System Administration: Manage user accounts and settings.
• Encourage Troubleshooting: Help identify and resolve issues quickly.
• Promote Data Security: Protect user data and ensure secure access.

Benefits:-

1)Improved Efficiency: Streamline processes and reduce task time.


2) Increased Productivity: Enable quicker task completion and focus on higher-level functions.
3) Enhanced Stability: Identify performance issues to prevent crashes.
4)Better Resource Management: Track usage for informed decisions on upgrades.
5)Empowered Users: Encourage customization and deeper understanding of the system.
6)Effective Collaboration: Facilitate file sharing and teamwork.
3. Action Plan

Sr.no Details of activity Planned start Planned end Name of responsible


date date group members

1. Searching for the topic Abhishek Goyal

Confirmed the topic we


2. searched for the micro All Members
project

3.. Collecting information Suraj Nalawade

4. Making proposal Mukesh Purohit

Testing and analysis of


5. Abhishek Goyal
test result

Preparation of final
6. All Members
project report

Final submission of the


7. All Members
project
4. Name of Team Members:

Roll No. Name Enrolment No.

61 Suraj Nalawade 2216490234

62 Mukesh Purohit 2216490235

63 Ankesh Purohit 2216490236

64 Abhishek Goyal 2216490240

Mrs. Mayuri Narudkar


(Under the guidance of)
Micro Project Proposal
Part B

1. Title: Different Operating System Tools Used to Perform Various Functions

1. Introduction:

Operating systems (OS) are crucial software that manage computer hardware and software resources,
providing essential services for computer programs. They act as intermediaries between users and the
computer hardware, enabling efficient operation and utilization of resources. Within operating systems,
various tools and utilities are available to perform specific functions that enhance system management,
user interaction, and application support.
This report explores key tools found in major operating systems—Windows, macOS, and Linux—
highlighting their functions and how they contribute to overall system performance and user
experience. Understanding these tools is essential for effective system administration, troubleshooting,
and optimizing workflows, whether in personal computing or enterprise environments.

2. Aim of the Microproject:

Aims:-
1)Enhance System Performance: Optimize resource allocation and efficiency.
2)Facilitate User Interaction: Provide intuitive access to system features.
3)Support System Administration: Manage user accounts and settings.
4)Encourage Troubleshooting: Help identify and resolve issues quickly.
5)Promote Data Security: Protect user data and ensure secure access.

Benefits:-

1)Improved Efficiency: Streamline processes and reduce task time.


2) Increased Productivity: Enable quicker task completion and focus on higher-level functions.
3) Enhanced Stability: Identify performance issues to prevent crashes.
4)Better Resource Management: Track usage for informed decisions on upgrades.
5)Empowered Users: Encourage customization and deeper understanding of the system.
6)Effective Collaboration: Facilitate file sharing and teamwork.
3. Course Outcomes Addressed:-
1. Knowledge Acquisition: Students will demonstrate a clear understanding of key concepts related to
operating system tools and their functions.
2. Skill Development: Students will apply learned concepts in practical scenarios, effectively utilizing
various OS tools to manage system resources.
3. Critical Thinking: Students will analyze and evaluate the effectiveness of different tools, making
informed decisions on their use in various contexts.
4. Effective Communication: Students will articulate their understanding of OS tools through
presentations and written reports, conveying complex information clearly.
5. Problem-Solving: Students will employ troubleshooting techniques using OS tools to identify and
resolve system issues.
6. Collaboration Skills: Students will work in teams to explore and implement solutions using
operating system tools, enhancing their collaborative abilities.
Preventive Measures for Future Incidents:

4. What is Operating System ?


An operating system (OS) is essential software that manages computer hardware and software
resources, serving as an intermediary between users and the computer. It performs crucial functions
such as resource management, user interface facilitation, file organization, and process control,
allowing multiple applications to run simultaneously. Additionally, it ensures security by managing
user access and protecting data integrity. Operating systems come in various forms, including desktop
OS (like Windows and macOS), mobile OS (like Android and iOS), and server OS (like Linux), each
designed to meet specific user needs and hardware requirements. Overall, the OS is fundamental for
enabling efficient computing and enhancing user experience.

• Key Functions of an Operating System:-

Resource Management:
• Allocates CPU time, memory space, disk storage, and other hardware resources to various
applications, ensuring efficient usage.
User Interface:
• Provides a means for users to interact with the computer, typically through graphical user interfaces
(GUIs) or command-line interfaces (CLIs).
File Management:
• Organizes data storage and retrieval, allowing users to create, modify, delete, and access files and
directories.
Security and Access Control:
• Protects system resources from unauthorized access, enforcing permissions and user authentication to
safeguard data integrity.
Networking:
• Facilitates communication between devices over local networks and the internet, enabling file
sharing, printing, and online access.

• Operating system tools:-

1) Computer Management:-
Computer management refers to the processes and practices used to oversee and control computer
systems and networks, ensuring they operate efficiently and securely. This includes activities such as
system administration, which involves managing user accounts and permissions; resource
management, where CPU, memory, and storage are allocated effectively; and software management,
which covers the installation and maintenance of applications. Additionally, network management
ensures reliable connectivity and protects against unauthorized access, while data backup and
recovery strategies safeguard against data loss. Performance monitoring tools help identify
bottlenecks and optimize system efficiency, and security measures protect against threats. Overall,
effective computer management enhances productivity, increases security, minimizes downtime, and
improves user satisfaction, making it essential for any organization’s IT infrastructure.
• Key Components of Computer Management:-

1. System Administration:
o Involves managing user accounts, permissions, and system settings. Administrators configure
systems to ensure secure access and proper functionality.
2. Resource Management:
o Focuses on the efficient allocation and monitoring of resources such as CPU, memory,
storage, and network bandwidth to optimize system performance.
3. Software Management:
o Includes the installation, configuration, and maintenance of software applications. This also
involves managing licenses and ensuring compliance with software policies.
4. Network Management:
o Encompasses the management of network resources, including routers, switches, and
firewalls. This ensures reliable connectivity and protects against unauthorized access.
5. Data Backup and Recovery:
o Involves creating regular backups of data and developing recovery plans to safeguard against
data loss due to hardware failures or cyber incidents.
6. Performance Monitoring:
o Uses tools to track system performance metrics, identify issues or bottlenecks, and implement
optimizations for improved efficiency.

2) Device Manager:-
Device Manager is a system utility in Windows operating systems that provides a centralized
interface for managing the hardware devices installed on a computer. It allows users to view and
control the various hardware components, such as printers, graphic cards, network adapters, and
more. Through Device Manager, users can check the status of devices, update drivers, disable or
enable hardware, and troubleshoot issues. The tool displays devices organized by category, making it
easy to identify any problems indicated by warning icons. By ensuring that all hardware is
functioning correctly and that drivers are up to date, Device Manager plays a crucial role in
maintaining system stability and performance, allowing users to effectively manage their computer's
hardware resources.
Key Functions of Device Manager:-
1. Device Overview:
o Displays a list of all hardware devices organized by category, making it easy to identify
components.
2. Status Monitoring:
o Indicates the status of each device, highlighting any issues with warning icons (e.g., yellow
triangles for problems).
3. Driver Management:
o Allows users to update, uninstall, or roll back device drivers, ensuring that hardware operates
efficiently and is compatible with the system.
4. Device Configuration:
o Enables users to disable or enable hardware devices, which can be useful for troubleshooting
or managing system resources.
5. Troubleshooting:
o Provides tools and resources to help diagnose and resolve hardware-related issues, facilitating
better system performance.
6. Installation of New Devices:
o Automatically detects and configures new hardware when it is connected to the system.
3) User and groups:-
In operating systems, users and groups are fundamental concepts for managing access to resources
and ensuring security. They define who can access the system and what permissions they have.

• Users:-
Definition: A user is an individual account that has access to the operating system and its resources.
Each user account typically has a unique username and password.

• Types of Users:
o Administrator: Has full control over the system, including the ability to install software,
change system settings, and manage other user accounts.
o Standard User: Has limited permissions, primarily focused on their own files and
applications. They cannot make system-wide changes or manage other accounts.
o Guest User: A temporary account with very restricted access, allowing basic functions
without altering system settings.

• Groups:-
Definition: A group is a collection of user accounts that can be managed collectively. Permissions
can be assigned to a group, allowing all members to inherit those permissions.
• Types of Groups:
o Administrative Groups: Groups that have elevated permissions to manage system settings
and resources (e.g., Administrators group).
o User Groups: Standard groups that provide shared access to specific resources, facilitating
collaboration (e.g., Users, Power Users).

• Benefits of Using Users and Groups:-


1. Enhanced Security: By defining user roles and permissions, systems can limit access to sensitive
data and critical functions.
2. Simplified Management: Groups allow for easier management of permissions, as changes can be
applied to the group rather than individual users.
3. Improved Collaboration: Groups facilitate resource sharing and collaboration among users, enabling
them to work together effectively.
4. Customizable Access Control: Administrators can tailor permissions based on organizational needs,
ensuring users have appropriate access.
4) Local security policy:-
The Local Security Policy is a feature in Windows operating systems that allows administrators to
manage security settings on a local computer. It provides a framework for defining and enforcing security
policies that govern user access, system privileges, and audit settings.

• Key Components of Local Security Policy:-

1. User Rights Assignment:


o Specifies which users or groups have permission to perform certain actions, such as logging
on locally, accessing the computer from the network, or shutting down the system.
2. Security Options:
o Configures various security settings related to account policies, password requirements,
account lockout policies, and more. These options help enhance the overall security posture of
the system.
3. Audit Policy:
o Determines which events are logged by the system, such as successful or failed login attempts,
file access, and policy changes. This is essential for monitoring and responding to potential
security threats.
4. Account Policies:
o Includes settings for password complexity, maximum password age, and account lockout
duration. These policies help enforce strong security practices among users.
5. Local Group Policy:
o Defines settings that apply to the local computer, allowing administrators to configure user-
specific settings without affecting other computers in a network.

• Importance of Local Security Policy:-

• Enhanced Security: By defining strict access controls and monitoring policies, organizations can
better protect sensitive data and system resources.
• Compliance: Helps organizations meet regulatory requirements by enforcing policies related to data
protection and user access.
• Centralized Management: Provides a single point of control for managing security settings, making it
easier for administrators to implement and enforce policies.
5) Task Scheduler:-

Task Scheduler is a built-in Windows utility that allows users to automate the execution of tasks and
scripts at specified times or under certain conditions. It enables users to schedule system maintenance
tasks, run programs, send emails, or display messages, enhancing productivity and system efficiency.
With Task Scheduler, users can create tasks that trigger based on various events, such as system startup,
user logon, or specific time intervals. The tool provides a user-friendly interface for configuring task
settings, including the frequency of execution, conditions for running, and the ability to set up
notifications. Additionally, Task Scheduler can manage both basic tasks and complex workflows, making
it an invaluable tool for automating repetitive tasks and ensuring that important processes run without
user intervention. Overall, Task Scheduler helps streamline operations, improve resource management,
and optimize system performance.
• Key Features of Task Scheduler:-

1. Automated Task Execution:


o Users can schedule tasks to run at specific times, on a recurring basis, or triggered by specific
events, such as system startup or user logon.
2. Task Creation:
o The utility provides a user-friendly interface for creating and configuring tasks. Users can
specify details such as the action to be performed (e.g., running a program, sending an email),
triggers, and conditions.
3. Task Management:
o Users can view, edit, disable, or delete scheduled tasks, allowing for easy management of
automated processes.
4. Logging and History:
o Task Scheduler keeps a history of executed tasks, providing insights into successful runs,
failures, and any issues encountered, which aids in troubleshooting.
5. Flexible Conditions:
o Tasks can be set to run only if certain conditions are met, such as the computer being idle or
connected to a specific network.
6. Support for Scripts and Batch Files:
o Users can schedule scripts, batch files, or applications, making it versatile for various
automation needs.

• Importance of Task Scheduler:-

• Increased Efficiency: Automating repetitive tasks saves time and reduces manual effort, allowing
users to focus on more critical activities.
• Consistency: Scheduled tasks ensure that important maintenance and processes occur regularly
without user intervention.
• Resource Management: By scheduling tasks during off-peak hours, users can optimize system
performance and resource usage.
5. Course Outcomes Integrated:-
1. Understanding of Operating System Fundamentals:-
o Outcome: Students will explain the fundamental concepts of operating systems and their role
in managing hardware and software resources.
o Assessment: Written exam on OS concepts and functions.
2. Proficiency in Using System Tools:-
o Outcome: Students will demonstrate proficiency in utilizing various operating system tools,
such as Task Manager, Device Manager, and Disk Management.
o Assessment: Hands-on lab exercises where students perform specific tasks using these tools.
3. Effective Resource Management:-
o Outcome: Students will analyze and optimize system performance through effective resource
management techniques using built-in OS tools.
o Assessment: Group project where students diagnose performance issues and present
optimization strategies.
4. Security Configuration Skills:-
o Outcome: Students will configure security settings using tools such as Local Security Policy
and Windows Defender to protect systems from vulnerabilities.
o Assessment: Practical assessment involving the setup of security policies on a virtual machine.
5. Task Automation and Scheduling:-
o Outcome: Students will create and manage automated tasks using Task Scheduler to improve
system efficiency and reduce manual workload.
o Assessment: Assignment to develop a series of automated tasks for common maintenance
activities.
6. Troubleshooting and Problem-Solving:-
o Outcome: Students will apply troubleshooting techniques using system tools to resolve
common hardware and software issues.
o Assessment: Case study analysis where students troubleshoot simulated system problems
using appropriate tools.
7. Collaborative Projects and Communication:-
o Outcome: Students will work collaboratively to analyze and present findings on the
effectiveness of different OS tools for specific functions.
o Assessment: Group presentations showcasing research on OS tools and their applications in
real-world scenarios.
6. References: -

www.google.com

7.Conclusion:-

In conclusion, the various operating system tools play a crucial role in managing and optimizing
computer systems. From system monitoring tools like Task Manager and resource management tools
like Disk Management to security features such as Local Security Policy, each tool serves specific
functions that enhance overall system performance and security. Understanding how to effectively
utilize these tools enables users and administrators to troubleshoot issues, automate tasks, and
implement best practices for resource allocation.

As technology continues to evolve, the importance of proficiency in these tools becomes increasingly
vital for both IT professionals and everyday users. By mastering the diverse functionalities offered by
operating system tools, individuals can significantly improve system efficiency, ensure data security,
and enhance user productivity. This knowledge not only prepares students for real-world challenges in
information technology but also empowers them to make informed decisions regarding system
management and optimization. Ultimately, a solid foundation in operating system tools is essential for
anyone looking to thrive in today's digital landscape.

Mrs. Mayuri Narudkar


(Guide of Project)

You might also like